Skip to main content

Overview

The MindFort dashboard provides a comprehensive view of your organization’s security posture. When you log in, you’ll land on the dashboard which summarizes key metrics and recent activity across all your targets.

Key Components

Security Overview Cards

Get instant insights with high-level metrics:
  • Average Risk Score: A numeric indicator of your overall security risk
  • Total Findings: Count of all active security issues across targets
  • Severity Breakdown: Distribution of Critical, High, Medium, and Low severity findings
Higher risk scores indicate greater security concerns that need immediate attention.
Visual representations help you understand:
  • Severity Distribution: Pie chart showing where risks are concentrated
  • Finding Trends: Historical view of how your security posture changes over time
  • Risk Patterns: Identify which types of vulnerabilities are most common

Highlights Section

Quick access to recent activity:
  • Recent Red Team Results: Latest penetration testing outcomes
  • Most Severe Finding: The highest-priority issue that needs attention
  • Assessment Activity: Status of ongoing and recently completed scans
The left sidebar provides quick access to all platform features:
  • New Assessment: Start a red team assessment with one click
  • Active Assessments: Monitor ongoing scans
  • Assessment History: Review past results
  • Vulnerabilities: Explore findings by target
  • Targets: Manage your assets
  • Reporting: Generate downloadable reports
  • Settings: Configure integrations, billing, and more
The “New Assessment” button is always available in the sidebar for quick access to start security testing.

Understanding Risk Metrics

Risk Score Calculation

MindFort uses an advanced contextual risk scoring system that goes beyond traditional vulnerability scoring methods: First-Principles Analysis:
  • Application Context: Understanding what your application does and how it’s used
  • User Impact: Considering who uses your application and how vulnerabilities affect them
  • Business Context: Taking into account your organization type and business model
  • Vulnerability Relationships: Analyzing how vulnerabilities interact and compound risk
Contextual Factors:
  • Target Environment: Production vs staging, internal vs external facing
  • Data Sensitivity: Type and criticality of data handled by the application
  • User Base: Public-facing vs internal users, scale of potential impact
  • Attack Vectors: Real-world likelihood of exploitation in your specific environment
This approach provides more realistic and actionable risk assessments than generic scoring systems.

Severity Levels

  • Critical: Immediate action required, high business impact
  • High: Important security issues requiring prompt attention
  • Medium: Moderate risk issues to address during regular maintenance
  • Low: Minor issues that should be resolved when convenient
  • Info: Informational findings for awareness

Exploitability Ratings

  • Exploitable: Can realistically be used by an attacker
  • Potentially Exploitable: May be exploitable depending on context
  • Non-Exploitable: Unlikely to be abused in practice
  • N/A: Not rated or not applicable
Prioritize Critical and High severity findings that are marked as Exploitable for immediate remediation.

Organization Switching

If you belong to multiple organizations:
  1. Click on your profile in the top right
  2. Select “Switch Organization”
  3. Choose the organization you want to view
  4. The dashboard will update to show metrics for the selected organization

Quick Actions

From the dashboard, you can:
  • Start New Assessment: Click the sidebar button to begin red team testing
  • View Active Scans: Monitor progress of running assessments
  • Drill into Findings: Click severity numbers to explore specific vulnerabilities
  • Access Reports: Generate stakeholder-ready security reports
  • Manage Targets: Add or configure assets for scanning

Best Practices

Regular Monitoring

  • Check the dashboard daily to stay informed of your security posture
  • Review new findings as they appear
  • Monitor risk score trends over time

Priority Focus

  • Address Critical and High severity issues first
  • Focus on Exploitable findings that pose real risk
  • Use the highlights section to identify urgent items

Team Collaboration

  • Share dashboard metrics with stakeholders
  • Use the risk score to communicate security improvements
  • Generate reports for executive and compliance reviews
I