- 13 Dec 2024
- 2 Minutes to read
- Print
- DarkLight
- PDF
Axiad Mesh End-user Onboarding
- Updated on 13 Dec 2024
- 2 Minutes to read
- Print
- DarkLight
- PDF
Welcome to Axiad Mesh! As a first-time user, this is what you can expect.
Note
This is the onboarding experience for a Standard Mesh user (no administrative privileges in Axiad Mesh). For an admin user, please refer to the Axiad Mesh Admin Onboarding guide.
You can log into the tool by using the step-by-step guide below.
First Time Login
To kick off your Axiad journey, you will have access to the Axiad Mesh environment set up by your admins. You’ll receive an invite email from Axiad with a link that takes you directly to the web application.
From the Axiad welcome email, click on the login link, which opens a web browser
On the login page, enter your email address and click Next
After you authenticate through your IdP, you will land on the Axiad Mesh homepage
Depending on how much your admins have completed, you could immediately see the bubble chart visualization, or you may see a Things are getting set up page
Subsequent Logins
Once the Connectors are integrated, the homepage will display your identity ecosystem visualization so you can instantly see the overview of your environment.
To log out of Axiad Mesh, simply click on your name in the top right corner and select Sign out
Welcome to Axiad Mesh
Once your Axiad Mesh dashboard is set up, you’ll be able to quickly get the necessary information that you need and options to dig deeper into each entity, identity, and potential risk.
Mesh Widgets
On the left-hand side of the application, you can see the quick reference widgets that give you an immediate snapshot of your environment and the world of cybersecurity.
The first widget is your organization’s overall risk score. This is generated from all of the individual risk scores from identities, applications, credentials, behavior, etc. and compiling them to create a top-level rating. Scores are 1 - 100, with 100 being the riskiest.
Here, you can also address profiling gaps (i.e. unconfirmed account associations) to get a more accurate risk score for your organization.
The next widget details your organization’s highest risks to help you understand why you have the score that you have. You can then use this information to improve your security posture and simultaneously lower your risk score.
The last widget includes an industry news feed to give you an immediate heads up to the latest happenings in the cybersecurity world.
Bubble Chart Overview
The main bubble chart visualization is made up of entities, each with their own risk score and organized by level of riskiness, with the highest risk bubbling up at the top.
The entity could be an application, location, authentication method, department, or something else that spans across your environment.
From here, you can hover over each bubble to get a preview of the assessment or click into an entity to get complete information about it, including risk score details, associated identities, potential blast radius, and more. You can also group entities together to see how they overlap and what risks are possible with those relationships.
Learn more
Check out more articles within the Axiad Mesh User Guide to see how you can turn this high-level overview into remedial actions.