The Home page offers a clean, visual representation of the most important issues in your environment and a curated list of the top tasks required. The bottom half encompasses the To Do recommended task list.
With the introduction of the Home page, earlier interfaces, such as Get Started and the Sysdig Secure Overview, are no longer required.
ToDo Task Recommendations guide users to take the most impactful actions to reduce security risks in their environments. It helps to cut through the noise and focus on the most important alerts and findings.
When using the Task Recommendations panel, you can always:
Shrinkthe panel to focus on the top or bottom of the page
Sort your recommendations:
Highest Priority: Sysdig’s prioritized list sorts recommendations by the actions that will have the largest impact on reducing security risk in your environments. Recommendations are sorted within a specific product area (i.e. Compliance, Identity, Setup).
Last Updated: This sorts recommendations by what has been updated most recently. It may be either a new recommendation or an existing recommendation with new findings or failing resources.
Within a Recommendation: Any list of findings or failing resources within a recommendation will be automatically sorted by highest risk.
Top 3 tasksin each category, or click
See Allto see all the recommended tasks in that category
Check detailsby clicking a task to open the details panel on the right
Dismissa task (for
1 day/week/month/3 months).
NOTE: This applies only to the current user profile; it does not remove the task from other user’s lists
Take actionfrom the detail panel, depending on the task type
ToDo will recommend certain Setup Tasks which vary based on what phase of onboarding a user is. These tasks include Connecting a Data Source, Setting Up Integrations, and Educational Product Tours.
Compliance recommendations show the top actions you can take to affect the greatest improvement in compliance scores and exposure. Selecting the
Remediate button opens an Actionable Compliance drawer detailing the failing resources and respective remediation actions.
Identity and Access
Identity recommendations focus on highlighting IAM risks based on both overly permissive Policies and risky attributes Sysdig identifies for Users and Roles.
Wherever possible, the steps to be taken are summarized directly in the panel.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.