Welcome to Liongard Library, where Lions share! This is a community-led space where Liongard users can come to teach and learn from one another.
Share custom Metrics, get inspired and see what’s trending in the Pride.
Pride Etiquette:
➕ Have great custom Metrics? Add them as entries!
🌟 Want to use a Metric? Copy the query and follow this doc.
👍 Tried a Metric from the Library? Like it!
📣 Have a question or feedback on a Metric? Add a comment!
🔎 Not sure where to start? Learn about Metrics and how to write them.
💬 Need help writing a metric or want to help support others? Join the conversation in our Liongard Lounge #metrics slack channel.
🥴 See something off? Open a support chat to let us know.
I've adjusted this to not fuzzy match "ScreenConnect" since this vulnerability does not apply to client installations (from my understanding). Obviously, it's good to check over the client versions as well, but this will further scope things down to catch only SC server installations.
Software[?Name == `ScreenConnect` && !(contains(Name, `xxxxxxxxxxxxxxxx`) || contains(Name, `xxxxxxxxxxxxxxxx`))].join(`: `, [Name,DisplayVersion]) | sort(@)