Interactive tutorial integration (F-Secure) 0 (0)

Elements Vulnerability Management includes integration with a third-party platform to provide useful instructions and information. This integration uses a script that is included in the Elements Security Center portal and that requires a connection to external, third-party systems. If you are using Elements Vulnerability Management in a network environment where you need to prevent third-party […]

Read More

Prerequisites (F-Secure) 0 (0)

If you are installing an on-site version of Elements Vulnerability Management, check that the requirements listed here are met before installation. Hardware: Minimum 4 GB RAM (recommended: 8GB) Minimum 2 GHz processor Minimum 30 GB disk space The following browsers are supported: Microsoft Internet Explorer (end of support 1st of May 2020) Microsoft Edge Mozilla […]

Read More

Support (F-Secure) 0 (0)

The Support section in the Elements Security Center shows you the available options for assistance in using Elements Vulnerability Management. To contact Elements Vulnerability Management support, go to the F-Secure support page and fill in the details of your issue. Our support staff will be in touch with you as soon as possible. You can also click on the […]

Read More

Interactive guidance (F-Secure) 0 (0)

The Elements Security Center (ESC) contains interactive guidance that shows how to use the portal and informs about new features. After you log in to the portal for the first time, we strongly recommend that you watch the introduction tour that opens. To open the interactive guidance window later, select the question mark icon on […]

Read More

Using filters (F-Secure) 0 (0)

Several of the pages and sections in Elements Vulnerability Management have a filter option to help you view the data that is most relevant to you. On any of the pages where you see the Filter section: Open Filter. If a filter is already in use: Click Clear filter to reset the currently applied filter. Select Select filter > New filter to create a […]

Read More

My profile (F-Secure) 0 (0)

You can customize your profile settings on the My profile page. Click the user icon in the top-right corner of the page and select My profile to edit your profile. You should at least check the following: Make sure that your personal details such as first and last name, phone number, and contact email are correct. You need to […]

Read More

Customizing the home page (F-Secure) 0 (0)

You can customize the Home page to suit your specific needs. You can add any number of widgets, resize them, and place them exactly where you want. To customize the Home page: Click the  menu button and select Add new widget. Edit the new widget settings. Enter a name for the widget. Select Table, Donut, Circle, Histogram, or Gauge as the widget type. Select the size […]

Read More

Logging in (F-Secure) 0 (0)

You need to log in to your Elements Vulnerability Management account to access the Elements Security Center portal. Go to https://portal.radar.f-secure.com/ in your browser. Note: If you are using a privately hosted solution, the URL depends on your setup. Under F-Secure Business Account, click Go to Log in. Enter the user name and password for your account. Click Log in. If […]

Read More

The Elements Security Center (F-Secur) 0 (0)

The Elements Security Centerportal is the core component of the whole F-Secure Elements Vulnerability Management solution. The Elements Security Center is a web-based interface where you can manage (start and stop) scans, browse vulnerabilities, create reports, and much more. You can deploy the Elements Security Center in two different ways: The most common method is […]

Read More

Main concepts and components 0 (0)

This section describes some of the key concepts and components of F-Secure Elements Vulnerability Management that are referenced throughout this documentation. Assets Elements Vulnerability Management keeps an inventory of all the assets, such as servers, computers, printers, routers, IoT devices, etc. within your network environment, discovered by Elements Vulnerability Management during the Discovery scan or […]

Read More