Liongard Library

Welcome to Liongard Library, where Lions share! This is a community-led space where Liongard users can come to teach and learn from one another.
Share custom Metrics, get inspired and see what’s trending in the Pride.

Pride Etiquette:
➕ Have great custom Metrics? Add them as entries!
🌟 Want to use a Metric? Copy the query and
follow this doc.
👍 Tried a Metric from the Library? Like it!
📣 Have a question or feedback on a Metric? Add a comment!
🔎 Not sure where to start? Learn about Metrics and how to write them.
💡 Have feedback to improve this portal? Add it to the Ideas Portal.
🥴 See something off? Open a support chat to let us know.

ADD A NEW METRIC ENTRY

FILTER BY CATEGORY

All Metric entries

Showing 248 of 248

Roar Inspector: Launchpoint (Inspectors) without an Agent

Identify inspectors that are missing an Agent from their configuration.This Metric will return any Inspector that's missing an Agent and it's respective Environment.
Sam Walker about 8 hours ago in Roar 0

Windows: Printers and Port number

Short Metric to show local printers on a server with its configured PortName.Helpful for onboarding and identifying printer IP's
Austin B [QuoStar] 4 days ago in Windows 0

Active Directory: Last Login with Timestamp

This will return us the last logon for the AD user.
Guest 8 days ago in Active Directory 0

Azure Active Directory: Included Users in MFA Enforcement Policy

You will need to customize the displayName in the query to the string you use to describe your MFA policy. For example if your policy name is Required MFA DUO then your metric would look like this instead Users[?contains(~.Policies.ConditionalAcce...
Samuel Pierce 7 days ago in Azure Active Directory 0

Azure Active Directory: Excluded Users from MFA enforcement Policy

You will need to customize the displayName in the query to the string you use to describe your MFA policy. For example if your policy name is Required MFA DUO then your metric would look like this instead Users[?contains(~.Policies.ConditionalAcce...
Samuel Pierce 7 days ago in Azure Active Directory 0

Azure Active Directory: Excluded Groups From MFA enforcement Policy

You will need to customize the displayName in the query to the string you use to describe your MFA policy. For example if your policy name is Required MFA DUO then your metric would look like this instead Groups[?contains(~.Policies.ConditionalAc...
Samuel Pierce 7 days ago in Azure Active Directory 0

Azure Active Directory: Included Groups in MFA Enforcement Policy

The DisplayName will need to be edited to match the string you use for your MFA enforcement policy, so for Example if yours is called Require DUO MFA the string metric would read Groups[?contains(~.Policies.ConditionalAccess[?displayName ==`Requir...
Samuel Pierce 7 days ago in Azure Active Directory 0

Microsoft 365: Safe Attachments Enabled

Uses Microsoft 365 secure score to check if you meet the requirements for Safe Attachments. This means that the policies must be set to block. Provides True/False Response.
Jai Dametto 14 days ago in Microsoft 365 0

Microsoft 365: Safe Links Enabled

Uses Microsoft 365 secure score to check if you meet the requirements for Safe Links. Provides True/False Response.
Jai Dametto 14 days ago in Microsoft 365 0

Datto RMM devices Offline / Not Seen more than 60 days

I use this to see devices offline for 60 days.
Joey Costa 30 days ago in Datto RMM 0