Security Assessment Platform Vision One + TMAS AI Scanner
Online

Security Assessment

Configuration
Select which Vision One data sources to search. Network + Detections selected by default. Enable more for comprehensive results (slower).

Pre-built Searches

Loading searches...

Custom CSV Upload

CSV Format

ColumnRequiredDescriptionExample
nameYesSearch display nameAI_Usage_OpenAI
queryYesTMV1 search queryhostName:(*.openai.com)
descriptionNoDescriptionMonitor OpenAI
sortingNoAggregation fieldhostnameDNS, ruleName
log_typeNoAPI typenetwork, detections
orientationNoChart stylehorizontal, vertical
Query syntax: hostName:(*.example.com) | app:(RDP OR SSH) | dstPort:(22 OR 3389) | ruleName:(*SSH*)
Templates:
📄
Drag & drop your CSV file here
or click to browse (max 2MB)

Manage Searches

Global Configuration config.json

The base query is prepended to all searches. It filters which sensor data to search. (productCode:pdi OR productCode:xns) = NDR sensors only.

Search Definitions searches.csv 0

How searches work

ColumnDescription
categoryGroup name (Network, SSH, PUA, RDP, Geo, Vendor, Threats)
nameDisplay name (must be unique)
sortingAPI field to count by: suid, hostName, app, ruleName, serverPort, clientIp, serverIp, requestMethod, respCode, sslCertCommonName, fileName, fileType, respAppVersion, request
log_typenetwork = /v3.0/search/networkActivities
detections = /v3.0/search/detections
everything = both endpoints
ppt_slideSlide number in PowerPoint template (empty = Excel only)
enabledtrue or false
query_typebase = just base query, no filter
filter = base query AND query_value
domains = base query AND hostName:(*domain1 OR *domain2...) from file
tlds = base query AND hostName:(*.tld1 OR *.tld2...) from space-separated list
raw = query_value used as-is (no base query)
query_valueDepends on query_type: filter expression, domain filename, TLD list, or raw query
Domain Lists templates/domains/

Domain list files are used by query_type=domains searches. One domain per line. Lines starting with # are comments.

AI Security Scan (TMAS)

Test LLM endpoints against OWASP LLM Top 10 and MITRE ATT&CK frameworks.

Scan Configuration

Workflow Runs

Loading...

Trigger Workflow

POC Security Assessment Pipeline

Automated proof-of-concept assessment: validate searches, collect data, analyze findings, generate reports, and quality check - all in one pipeline.

1
Validate
Test all searches
2
Collect
Fetch all data
3
Analyze
Generate insights
4
Report
PPT + Excel
5
QA Check
Verify accuracy
POC Configuration
Step 1 Search Validator Agent

Probes all 39 searches with countOnly to verify API connectivity, query validity, and estimated data volume per search.

Step 2 Data Collector Agent

Runs the full assessment: 30-min time chunks, streaming aggregation, smart chunk sizing via countOnly probes. Generates Excel + PowerPoint.

Step 3 Data Analyzer Agent

Analyzes collected data: identifies top findings per category, generates risk assessments, and creates insight summaries.

Step 4 Report Builder Agent

Generates branded PowerPoint report (v2.0 template), Excel workbooks, and downloadable assessment package.

Run data collection first to generate reports.
Step 5 Quality Checker Agent

Validates data completeness, cross-references record counts, checks for anomalies, and produces a QA scorecard.

Assessment Sessions

All assessment and scan sessions are saved on the server. You can close the browser and come back - running jobs continue in the background.

Loading sessions...

History

📄
No history yet