Shield Platform
Welcome to Shield Cyber’s official documentation site for the Shield Continuous Threat and Exposure Management platform.
Shield is a commercial exposure management platform that proactively identifies risks within an organization’s attack surface, internal network, and identity landscape. Shield will perform automated scanning and auditing across the various levels of a company’s attack surface. The platform will capture risk trends over time, as well as provide guidance and solutions for various remediation actions based on what is discovered. Shield will also allow organizations to track and monitor aspects of the external, internal, and identity objects that make up their overall network.
Shield’s Core Modules
Attack Surface
Where all of the vulnerability, asset, and service information for your internet-facing infrastructure is managed.
Internal Network
Where all of the vulnerability information and asset information for your hosts that are behind your firewall is managed.
Identity Security
Where all of the Active Directory (AD) objects - Users, Computers, Groups - are managed and where identity-based risks can be managed.
Quick Start
Platform Access
Navigate to the Shield platform
Navigate to the Shield platform
Create your Shield account
Create your Shield account
Enter and confirm your email address, create a password, display name, and set up multi-factor authentication (MFA).
Subscription Creation
Create your subscription(s)
Create your subscription(s)
Get started by creating your first subscription. Enter your company name and the subscription name for the network you will be managing within the platform.
Navigate to Deployment
Navigate to Deployment
Deployment
Attack Surface Scanning
Attack Surface Scanning
Internal Agent Deployment
Internal Agent Deployment
To perform agent based scanning, navigate to the Deployment page and copy the subscription-specific PowerShell script out of the platform. This PowerShell script can then be deployed to managed hosts with your preferred remote administration tool or technique.
Internal Scanner Deployment
Internal Scanner Deployment
To perform internal network scans, a dedicated linux-based host will be required to install the Shield network scanner software. Set the desired network Location and create a linking Password and proceed to run the four generated commands on your dedicated internal network scanner.
To link the internal scanner, navigate to Scanner Settings, select the created Location and enter the created scanner Password.
Identity Service Deployment
Identity Service Deployment
To assess your Active Directory (AD) environment, navigate to the Identity Service Deployment page, set the desired network Location, and copy the generated PowerShell script. The PowerShell script needs to be deployed on one Windows domain-joined host within the desired on-prem Active Directory (AD) that should be assessed.