Overview
The MindFort dashboard provides a comprehensive view of your organization’s security posture. When you log in, you’ll land on the dashboard which summarizes key metrics and recent activity across all your targets.Key Components
Security Overview Cards
Get instant insights with high-level metrics:- Average Risk Score: A numeric indicator of your overall security risk
- Total Findings: Count of all active security issues across targets
- Severity Breakdown: Distribution of Critical, High, Medium, and Low severity findings
Higher risk scores indicate greater security concerns that need immediate attention.
Trends and Charts
Visual representations help you understand:- Severity Distribution: Pie chart showing where risks are concentrated
- Finding Trends: Historical view of how your security posture changes over time
- Risk Patterns: Identify which types of vulnerabilities are most common
Highlights Section
Quick access to recent activity:- Recent Red Team Results: Latest penetration testing outcomes
- Most Severe Finding: The highest-priority issue that needs attention
- Assessment Activity: Status of ongoing and recently completed scans
Navigation
Sidebar Menu
The left sidebar provides quick access to all platform features:- New Assessment: Start a red team assessment with one click
- Active Assessments: Monitor ongoing scans
- Assessment History: Review past results
- Vulnerabilities: Explore findings by target
- Targets: Manage your assets
- Reporting: Generate downloadable reports
- Settings: Configure integrations, billing, and more
The “New Assessment” button is always available in the sidebar for quick access to start security testing.
Understanding Risk Metrics
Risk Score Calculation
MindFort uses an advanced contextual risk scoring system that goes beyond traditional vulnerability scoring methods: First-Principles Analysis:- Application Context: Understanding what your application does and how it’s used
- User Impact: Considering who uses your application and how vulnerabilities affect them
- Business Context: Taking into account your organization type and business model
- Vulnerability Relationships: Analyzing how vulnerabilities interact and compound risk
- Target Environment: Production vs staging, internal vs external facing
- Data Sensitivity: Type and criticality of data handled by the application
- User Base: Public-facing vs internal users, scale of potential impact
- Attack Vectors: Real-world likelihood of exploitation in your specific environment
Severity Levels
- Critical: Immediate action required, high business impact
- High: Important security issues requiring prompt attention
- Medium: Moderate risk issues to address during regular maintenance
- Low: Minor issues that should be resolved when convenient
- Info: Informational findings for awareness
Exploitability Ratings
- Exploitable: Can realistically be used by an attacker
- Potentially Exploitable: May be exploitable depending on context
- Non-Exploitable: Unlikely to be abused in practice
- N/A: Not rated or not applicable
Prioritize Critical and High severity findings that are marked as Exploitable for immediate remediation.
Organization Switching
If you belong to multiple organizations:- Click on your profile in the top right
- Select “Switch Organization”
- Choose the organization you want to view
- The dashboard will update to show metrics for the selected organization
Quick Actions
From the dashboard, you can:- Start New Assessment: Click the sidebar button to begin red team testing
- View Active Scans: Monitor progress of running assessments
- Drill into Findings: Click severity numbers to explore specific vulnerabilities
- Access Reports: Generate stakeholder-ready security reports
- Manage Targets: Add or configure assets for scanning
Best Practices
Regular Monitoring
- Check the dashboard daily to stay informed of your security posture
- Review new findings as they appear
- Monitor risk score trends over time
Priority Focus
- Address Critical and High severity issues first
- Focus on Exploitable findings that pose real risk
- Use the highlights section to identify urgent items
Team Collaboration
- Share dashboard metrics with stakeholders
- Use the risk score to communicate security improvements
- Generate reports for executive and compliance reviews