How to Create Customized Dashboards

by

The JupiterOne Insights Application allows you to create customized dashboards in multiple ways. In this video, Jayson Jensen shows you customization strategies using pre-built dashboards, how to add customized team or personal dashboards, or uploading a dashboard from a JSON schema. JSON schemas can be imported through drag-n-drop, or copied from the J1 GitHub repository.

 

 

Build your own dashboards with a free J1 account (no cc required).

Additional Resources:

 

Jayson Jensen
Jayson Jensen

I spent 4+ years doing technical consulting for enterprise clients in the automobile and tax preparation services industries. During this time I gained experience across product, business, and technical domains while performing the functions of a Software Developer, Business Architect, and Product Architect. As a Customer Success Engineer for JupiterOne, I support customers by helping them understand the value of being able to query and visualize the relationships across the security domain which includes cloud infrastructure, network security, endpoint management, identity and access management, vulnerability management, and more. I enjoy everything outdoors, from Spartan races, to scuba diving, to hiking.

Keep Reading

Introducing Continuous Controls Monitoring (CCM) | JupiterOne
November 7, 2024
Blog
Introducing Continuous Controls Monitoring (CCM)

CCM delivers real-time visibility, proactive risk management, and streamlined compliance for security.

Now Available: JupiterOne’s Public Postman Workspace | JupiterOne
October 31, 2024
Blog
Now Available: JupiterOne’s Public Postman Workspace

Explore JupiterOne’s Public Postman Workspace to streamline your workflows and enhance your security operations.

Prioritizing Exploitable Vulnerabilities to Protect Your Business Critical Assets | JupiterOne
October 16, 2024
Blog
Prioritizing Exploitable Vulnerabilities to Protect Your Business Critical Assets

Vulnerability scanners flood teams with alerts, but CTEM helps prioritize based on exploitability and business impact, ensuring focus on the most critical threats.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.