- 13 Jul 2022
- 3 Minutes to read
- Print
- DarkLight
- PDF
Activating Your Axonius-hosted (SaaS) Trial
- Updated on 13 Jul 2022
- 3 Minutes to read
- Print
- DarkLight
- PDF
This article is applicable for companies that have signed up for 30-day trials of Axonius-hosted (SaaS).
Axonius-hosted (SaaS) trials deliver the full functionality of the Axonius Cybersecurity Asset Management platform.
In this article, we'll cover everything you need to get started with your trial.
If you are interested in trying Axonius-hosted (SaaS) for 30-days, sign up here: www.axonius.com/sign-up
Logging In and Creating User Accounts
Once you've been approved for a trial, you'll receive an email with login instructions. After the initial login, you will be able to create additional user accounts using the Manage Users tab on the System Settings page. For more information, refer to Manage Users.
Connecting Adapters & Fetching Data
Axonius gathers asset data by connecting to the solutions you already use through API integrations. We call the integrations “adapters”, and you’ll need to provide credentials to these solutions in Axonius to get started.
For step-by-step instructions on connecting adapters, see the Adapters page.
You can configure the schedule of data fetches for each connected adapter, or set a global discovery schedule for all adapters that have been connected.
Recommended Adapters
The more adapters you connect, the more comprehensive your asset inventory will be. For this trial, we recommend connecting any of the following to Axonius adapters:
Device and User management consoles: such as Microsoft Active Directory, Microsoft System Center Configuration Manager (SCCM), or Jamf Pro.
Endpoint security agents: such as McAfee, Symantec, CrowdStrike Falcon, or VMware CarbonBlack.
Networking: Axonius integrates with networking infrastructure from a wide variety of vendors including Aruba, Cisco, Checkpoint, Fortinet, Juniper, and Palo Alto.
Identity Access Management: such as Okta, G-Suite, Duo, or other platforms
Vulnerability / Patch Management: such as Qualys, Tenable, Rapid7, Kenna, and other platforms.
Cloud Providers: such as Amazon Web Services, Microsoft Azure, or Google Cloud Platform.
To see a full list of supported adapters, visit our adapter list.
Installing the Axonius Tunnel
To connect adapters that are only accessible by an internal network, you must configure and install the Axonius Tunnel on a server that has access to those sources.
The Axonius Tunnel enables to establish a secure link between an internal network and the Axonius cloud instance.
For more details, see Install the Axonius Tunnel.
Examine Devices
The Device Profile page displays all the collected and correlated details of the selected device.
To open the Device Profile page from the Devices page in the query results table, click the desired device record. When the Device Profile page opens, the profile name in the header will be the Host/Asset Name of the device.
You can inspect device details by looking at populated fields from each adapter source, and you can also gain an aggregated view that provides a single view by correlating all data from adapters that know about the device.
Examine Users
The Users page allows you to investigate any specific user and also identify all associated devices with each user using the aggregated tab.
Run and Save Queries
Once you have device and user data, you can use the Axonius Query Wizard to find assets that deviate from compliance.
You can experiment by running and altering pre-defined saved queries, or try new queries of your own.
Check out the Use Cases page to learn how to craft queries for finding endpoint coverage, devices not being scanned for vulnerabilities, unmanaged and rogue devices, and more.
Getting More Out of Your Trial
From connecting adapters to generating reports, we've outlined seven key milestones to getting started with Axonius.