Saner Cloud Documentation
Everything you need to learn about SecPod’s Products and Solutions
Tell Me How
- How to Remediate in Saner Cloud?
- How to Get a Cohesive View from Saner Cloud Unified Dashboard?
- How to Use Tags to Quickly Filter Resources?
- How to Setup Alerts Across SanerCloud Tools?
- How to Monitor Resource Risk Trends for CHS?
- How to Assess Resource Health through Severity Distribution?
- How to Evaluate Service-Level Risks Using CHS Scores?
- How to Analyze Cyber Hygiene Scores through Trend Chart?
- How to Identify High-Risk Resources by Geo Location?
- How to Get an Overview of Cyber Hygiene for Cloud Resources?
- How to Review Organization-Level Cyber Hygiene Across Accounts?
- How to Assess Risk Distribution for Different Cloud Providers?
- How to Review Major Issues Contributing to the Drop of Cyber Hygiene Score at Account-Level?
- How to Analyze Module-wise Risk through CHS Distribution?
- How to View the Cyber Hygiene Score Distributed Across Cloud Environments?
- How to Track Security Posture with Cyber Hygiene Score?
- How to Configure Account Weightage?
- How to See the Active Version for an IAM Policy?
- How to Address Critical Activities Using Evidence?
- How to View by Type and Usage for any Identity in CIEM?
- How to Get Visibility into Cloud Entitlements?
- How to Initiate Remediation for Different Identities from CIEM?
- How to Determine if a Policy has Excessive Permission?
- How to Visually See the Relationship between Identity, Entitlement, Policy, or Permission?
- How to Know the Excessive Permissions on a Specific Service?
- How to Use Evidence to Address Policies with Excessive Permission?
- How does Resource Categorization Work in Saner CSAE?
- How to Make Informed Decisions on Your Expenditure based on Resource Usage Graph?
- How to Understand the Resource Footprint Globally Across Various Regions?
- How to Identify Resources Exposed to External Network?
- How to Identify Outdated Resources for Cleanup?
- How to Setup Watchlist Configuration for a Resource?
- How to Search and Retrieve Anomaly Data?
- How to Examine the Overall Anomaly Information for Specific Rules or Checks?
- How to Prioritize Remediation or Fixes based on Confidence Levels?
- How to Quickly Identify the Detected and Remediated Anomalies for an Account?
- How to Initiate Patch Remediation from CSPA Dashboard?
- How to Whitelist Rules or Resources in Cloud Security Scans?
- How to Assess System Compliance and Security Posture?
- How to Detect Patterns over a Period with Resource Trends?
- How to Use Quick Evaluation Benchmarks?
- How to Setup Benchmarks in Saner CSPM?
- Rollback an Applied Remediation
- How to Configure Automation Rule to Remediate Misconfigurations?
- How to Create a Patching Task for Items Currently in “Approval Pending” State?
- How to Evaluate Remediation Effort with Patching Impact Chart?
- How to Prioritize and Address Older or High-Risk Anomalies with Patch Aging?
- How to Monitor the Overall Status of the Remediation Job?
- How do I Get to Know the Regions Impacted by a Specific Rule?
- How to View the Severity of a Missing Patch Affected by a Rule?
- How to Address Missing Patches Via Remediation Tasks?
- How to Quickly Access the Necessary Tool for Remediation and Begin Patching Tasks?
- How to Monitor and Analyze Audit Logs for Risk Prioritization?
- How to Configure Risk Based Cloud Security Alerts?
- How to Generate Reports and Visualizations?
- How to Filter Risks by Tags for Targeted Analysis?
- How to Manage Prioritized Risks at Account-level?
- How to View the Detailed Breakdown of a Specific Cloud Cyber Security Standard (CCSS) Risk Finding?
- How to Review and Prioritize Resources Based on Associated Risks?
- How to Assess Risk Distribution on Essential Resources?
- How to Assess and Prioritize Risks Across Resource Categories?
- How to Identify the Risks Affecting Essential Resources?
- How to Assess Full Versus Limited Technical Impact of Exploiting an Anomaly?
- How to Review the Risk Factor Distribution Based on Automatable Reliability?
- How to Get an Overview of Exploitable Risks?
- How to Map Risks to MITRE ATT&CK for Threat-Informed Defense?
- How to Configure Questionnaire and Assess Security Practices Across Core Domains for an Account?

Supported OSs and Platforms
