Liongard
Create
Log in
Sign up
Home
Feedback
Metrics Library
1003
Boards
Feature Requests
Metrics Library
Powered by Canny
Metrics Library
This is a community-led space where Liongard users can come to teach and learn from one another. Share custom Metrics, get inspired and see what’s trending in the Pride.
Details
Category
Select a category
Showing
Trending
Sort
Trending
Top
New
Filter
Under Review
Planned
In Progress
Blocked
Submitted
Reviewed
Complete
posts in
All Categories
All Categories
Veeam Service Provider Console (3)
Windows Server (83)
Microsoft 365 (135)
Cisco Meraki (18)
Amazon Web Services (7)
SonicWall (33)
Internet Domain/DNS (26)
Dark Web Monitoring (1)
Google Workspace (9)
N-able RMM (5)
Hyper-V (8)
Sophos XG (4)
VMware ESXi (3)
Azure Active Directory (29)
SentinelOne (10)
Huntress (12)
Fortinet FortiGate (21)
Azure (12)
Duo Security (23)
Roar (185)
Windows Workstation (54)
Active Directory (107)
N-able Backup (9)
Auvik (10)
Datto RMM (11)
WatchGuard (3)
Ubiquiti UniFi (10)
macOS (2)
ConnectWise Manage (3)
Continuum RMM (10)
TLS/SSL Certificates (8)
ESET Licensing (3)
JumpCloud (2)
Sophos Central (9)
GoDaddy (3)
IT Glue (10)
KnowBe4 (6)
ConnectWise Automate (5)
Cisco Small Business Solution (SBS) (4)
Network Discovery (9)
OneLogin (3)
SQL Server (4)
Kaseya BMS (1)
NinjaRMM (1)
Cisco Umbrella (8)
Acronis Cyber Cloud (2)
Cisco ASA (8)
Palo Alto (1)
N-able N-central (7)
Autotask (2)
Bitdefender (1)
Managed Printer (6)
Microsoft OneDrive (2)
Microsoft Teams (3)
VMware vCenter (2)
Linux (2)
Webroot Secure Anywhere GSM (11)
Syncro (1)
3CX (1)
StorageCraft SPX (1)
Cisco IOS (7)
BCDR data (15)
Cloudflare (1)
Veeam Availability Console (2)
Kaseya VSA (3)
Domotz (1)
Adigy (1)
Datto Networking (2)
Active Directory: Last Login with Timestamp
This will return us the last logon for the AD user. Users[].join( , [join( , [ AD LOGIN: , to_string(UserName)]), join( , [ . Name of User: , to_string(Name)]),join( , [ : , to_string(LastLogonDate)])])
1
·
Active Directory
·
submitted
11
Active Directory: DHCP Percent In Use over 80
Name of DHCP in over 80% to be used for alerting DHCP.Serverv4Scopes[?Statistics.PercentageInUse >= to_number('80')].Name
1
·
Active Directory
·
submitted
9
Active Directory: User Accounts With Brute Force Attempts Not Disabled Count
Excluding disabled accounts helps with an accurate count of brute force accounts. Users[?AnomalousActivity.contains(@, Brute Force ) && UserStatus == Active ] | length(@)
0
·
Active Directory
·
submitted
7
Active Directory: Password Never Expires = TRUE
This is helpful to someone who's trying to obtain/maintain visibility into a part of the breakdown of an AD password policy at an organization. This is a good Metric for QBRs, recurring site reviews, and an onboarding report. This Metric can also be used to create a pointed Actionable Alert that prompts the proper maintanence of a secure AD passpord policy. Users[? PasswordNeverExpires == true ].Name
0
·
Active Directory
·
submitted
7
Active Directory: Summary of Enabled Group Policies
This metric will list all of the enabled group policies when applied to an Active Directory inspector. It will also return the following:Is the policy is detached (T/F)Is the policy enabled for users (T/F)Is the policy enabled for computers (T/F) GroupPolicyDetails[].['"Name" ='Name,'"Detached Policy" ='Detached,'"Enabled for Users" ='UserEnabled,'"Enabled for Computers" ='ComputerEnabled]
0
·
Active Directory
·
submitted
6
Active Directory: Password Not Required Users
Identifying any users who's AD account is set to not require a password. Users[?PasswordNotRequiredt== true ].DisplayName || to_array( - ) | join( , , @)
0
·
Active Directory
·
submitted
6
Active Directory: Count of Users Assigned to Group(s)
Returns the number of users assigned to a group. Groups[?contains(CN, 'InsertGroupName')].MembersList[] | length(@)
0
·
Active Directory
·
submitted
5
Active Directory: List of Enabled Group Policies
This metric will list the applied GPO's from an Active Directory server GroupPolicies[].[DisplayName,GpoStatus]
0
·
Active Directory
·
submitted
5
Active Directory: Stale Privileged Account Summary
Summarizes the privileged users who haven't logged in recently. Useful for alert comments or a report. Users[?UserActivity== Stale && DefaultSystemUser== false && Enabled == true && Privileged== Yes ].join( , , [join( : , [ Username , to_string(UserName)]), join( : , [ Day since last login , to_string(DaysSinceLastLogin)])])
0
·
Active Directory
·
submitted
5
Active Directory: Groups w/ Users
This is helpful to someone who's trying to obtain/maintain visibility into the groups at an organization and which users are a part of them. This is a good Metric for QBRs or recurring site reviews. Also, this Metric could be used to build a user audit with the intention of an end customer confirming that all looks as expected. Groups[].join( , [join( , [ , to_string(Name)]), join( , [ : , to_string(MembersStr)])])
0
·
Active Directory
·
submitted
5
Load More
→
Powered by Canny