Skip to main content

Use the Filter Panel

Each section in the tab allows filtering the data. Filtering includes:

  • . function selects all the entries of the section.
  • . Remove all filters from current table function cleans all filtering of the section in the management tab.
  • . Remove all column customization function removes all column and panel edits globally turning all changes back to default. E.g. adjusting panels widths, sorting tables, resizing columns, hidden columns, and multi-sorting.
info

Selecting the white blank space in each column removes the filter for that collumn.

The following filters are applied based on the section name.

Users Section

Users

FilterExampleDescription
Login IDjohn.smith@terainsights.comUnique user ID.
First nameJohnUser's first name.
Last nameSmithUser's last name.
ProfileCustom (32 perms)Custom user profile. (may have a name)
RoleSub-adminUser role in the system.
StatusNew,not activatedUser account activation state.
Teams4 teamsTotal numbers of user's teams.
Deactivation reasonFailedPasswordReason for which the account is inactive.
Contact emailjohn.smith@gmail.comUser's personal or business email.
Can Escrow"" or ""Whether or not the user can escrow.
Users Additional Notes
  • Profile is a custom field with either:

    • Custom n perm: a manual number of permissions with an unnamed user profile.
    • [Your given profile name]: a manually given profile name with a manually given number of permissions.
  • Status depends on the escrowing abilities:

    • Deactivated: the user is no longer able to log in.
    • Escrow upon login: the user allows private key escrowing on the next login.
    • New, escrow upon login: the user will log in for the first time allowing private key escrowing.

To learn more about escrowing navigate to the set up a user escrow key section.

  • Deactivation reason may come from the following:
    • Admin: if the admin deactivated the user manually.
    • Failed password: if the user failed to enter the correct password multiple times.
    • Timeout: if the user has not logged in for an extended period.
    • XSS: n/a.
    • Registration: n/a.

Deleted Users

FilterExampleDescription
Emailjoe.doe@terainsights.comUnique user ID.
First nameJoeDeleted user's first name.
Last nameDoeDeleted user's last name.
DeletedOct 23, 2022The date the user has been deleted.
Deleted bySteven AdminThe full name of admin who performed the deletion.

Sub-admin Managed Objects

FilterExampleDescription
ManagerGabrielle JohnsonFull sub-admin name.
ObjectResearch A123Full name of the object.
TypeProjectWhether the object is a project or a team.

User Profiles

FilterExampleDescription
NameEngineering ManagerFull name of the user profile.
RoleAdminRole of the user profile in the system.

Resources by User

FilterExampleDescription
UserBrian DollyFull name of the user.

Teams Section

Teams

FilterExampleDescription
NameJunior ResearchersFull name of the team.
Risk assessment ID10323341Serves the teams tagging purpose.
Additional Notes
  • Risk assessment ID may include:
    • Characters.
    • Letters.
    • Numbers.

It does not affect any functions of the system since it is purely designed for tagging management purposes.

Team Memberships

FilterExampleDescription
TeamSenior ResearchersFull name of the team.
UserBrian DollyFull name of the user belonging to the team.

Projects Section

Security Requirements

FilterExampleDescription
RequirementDrivers LicenseName of the security requirement.
TypeUserCertType of requirement.
LevelsValid US PermitName of the security level associated with the requirement.
Additional Notes
  • Type of requirement is currently linked to User certifications. This can be customized based on your organisation's needs.

Security Levels

FilterExampleDescription
NameHIPAAName of the security level.
RequirementsCertified ResearcherType of requirement.

Projects

FilterExampleDescription
NameResearch A123Name of the project.
PIBilly WilliamsFull name of the Personal Investigator.
LevelHIPAAName of the security level which optionally tags the project.
ParentResearch AName of the parent project; if it is the case.

Project Memberships

FilterExampleDescription
ProjectResearch A123Name of the project.
UserBilly WilliamsFull name of the Personal Investigator.
Manager"" or ""Whether or not the user is the project manager.
RestrictionsDownloadWhether the user can view or download the project contents.

User Certifications

FilterExampleDescription
RequirementDriver LicenseName of the security requirement.
UserJohn SmithFull name of the certified user.
Modified byGabrielle JohnsonThe manager's full name who made the last edit.
Additional Notes
  • Modified by: implies sub-admin's responsibility for editing the user certificates. This usually falls on either the PI or the project manager and it is fully audited at all times.

Resources by Project

FilterExampleDescription
ProjectResearch A123Name of the project associated with the displayed resources.

Virtual Machines Section

Realms

FilterExampleDescription
NameAWSName of the realm.
DriverLibvirtDrive type of the realm.

Libvirt Hosts

FilterExampleDescription
NametiedgeName of the host.
RealmLibvirtName of the realm.
StateEnabledCurrent state of the host.
Connected"" or ""Whether or not the host is connected to the realm.
URIurn:oasis:names:specification:docbook:dtd:xml:4.1.2The host's uniform resource identifier.
Hardware ProfiletimonsterThe name of the hardware profile associated with the host.

Hardware Profiles

FilterExampleDescription
NametimonsterName of the hardware profile.
RealmLibvirtName of the realm.
Devices1 X gpu-nonexistent, 1 X gpu-nvidiaName and quantity of hardware devices.

Libvirt Storage Pools

FilterExampleDescription
NametimonsterName of the storage pool.
RealmLibvirtName of the realm.
TypeDrivesName and quantity of hardware devices.
Locationstorage/libvirt-ticrypt-poolsLocation of the storage pool on the server.
Additional Notes
  • Type of storage pools may be the following:
    • Drives
    • Bricks
    • Volumes
    • Images
    • IOSs
    • Other

Libvirt Volumes

FilterExampleDescription
RealmLibvirtName of the realm.
PoolDrivesName and quantity of hardware devices.
Volumestorage/libvirt-ticrypt-poolsLocation of the storage pool on the server.

VM Images

FilterExampleDescription
NameLibvirt ProductionName of the VM Image.
Parentvm-image:8712301230Name of the parent VM Image.
TypeLinuxOperating system type.
Infostorage/libvirt-ticrypt-poolsLocation of the VM image on the server.

VM Hardware Setups

FilterExampleDescription
NameLibvirt ProductionName of the VM Hardware setup.
Debug""Whether or not the hardware is debugging.
RealmLibvirtType of the realm.
ImageUbuntu001Name of the VM image.
Operating System (Os)WindowsName of the operating system.
Devicegpu-nonexistent3Name and quantity of current devices.
Created byJohn SmithName of the VM Hardware creator.

VM Configurations

FilterExampleDescription
NameLinux VMName of the VM configuration.
StateRunningThe current state of the VM configuration.
Owner(s)Jack DoeOwner name of the VM configuration.
VM SetupWinServerName of the VM setup for this configuration.
ProjectResearch A123Name of the project that tags the VM configuration.
TeamSenior ResearchersName of the team operating the VM configuration.
Virtual MachineCentOS1234Name of the virtual machine.
Fixed MAC00:1b:63:84:45:e6Address of the MAC device.
Additional Notes
  • State can have multiple forms as follows:
    • Stopped: The VM has been stopped by its owner.
    • Starting: The VM is in the process of starting.
    • Running: The VM is currently running normally.
    • Suspended: The VM has been manually suspended by its users.
    • Stopping: The VM is in the process of stopping.
  • Virtual Machine indicates the real name of the VM. Each VM Configuration is similar to a virtual "arrangement" which allows access to the real virtual machine.

Running VMs

FilterExampleDescription
NameLinux VMName of the running VM configuration.
OwnerJack DoeOwner name of the running VM configuration.
ProjectResearch A123Name of the project that tags the running VM configuration.
TeamSenior ResearchersName of the team operating the running VM configuration.
Debug""Whether or not the hardware is debugging.
Conn"" or ""Whether or not the running VM is connected.
VM Hardware SetupCentOS-123Name of the VM Hardware Setup of the running VM configuration.
VM ID130iiuy-9281-40ojh-m7y2Name of the VM identification number.
Host ServerticryptName of the hosting server.
IP Adress192.158.1.38.Name of the IP address where the running VM is registered.
MAC Address00:1b:63:84:45:e6Address of the MAC device.

Past VMs

FilterExampleDescription
NameWindows VMName of the past VM configuration.
OwnerJoe DoeOwner name of the past VM configuration.
TeamJunior ResearchersName of the team operating the past VM configuration.
Debug""Whether or not the hardware has been debugged.
VM Hardware SetupCentOS-123Name of the VM Hardware Setup of the past VM configuration.
Host ServerticryptName of the host server.
IP Adress192.158.1.38.Name of the IP address where the past VM was registered.
MAC Address00:1b:63:84:45:e6Address of the MAC device.

Service VMs

FilterExampleDescription
NameWindows VMName of the service VM configuration.
OwnerJoe DoeOwner name of the service VM configuration.
Active""Whether or not the service VM configuration is active.
ImageUbuntu123Name of the VM Image for the service VM configuration.
Host ServerticryptName of the host server.
IP Adress192.158.1.38.Name of the IP address where the service VM is registered.
MAC Address00:1b:63:84:45:e6Address of the MAC device.

Drives

FilterExampleDescription
NameOffice DriveName of the drive.
OwnerJoe SmithOwner name of the drive.
ProjectResearch A123Name of the project that tags the drive.
TeamDesk ResearchersName of the team operating the drive.
ID145erpl-23vssd-9123s-mn1091Drive Identification number.
Formatext4Format type of the drive.
Backup"" or ""Whether or not the drive is backed up.
TyperawThe type of storage for the drive.
Poolticrypt-drivesThe storage pool where the drive lives.
Additional Notes
  • Type of the drive may be as follows:
    • raw: The drive defaults at this state. The storage behaves like an external hard drive or thumb drive.
    • qcow2: The drive is copy-on-write. The physical storage layer is separated from the virtual storage layer.

ISO Images

FilterExampleDescription
NameRocky8 ProductionName of the ISO image.
RealmLibvirtName of the realm of the ISO image.
OwnerGabrielle JohnsonOwner name of the ISO image.
File9123nkas94qjdrlwkty78n12k4po1012Name of the ISO file.
Bootable"" or ""Whether or not the ISO image is botable.
Service"" or ""Whether or not the ISO image is in service.

Licensing Servers

FilterExampleDescription
Servergoogle.comName of the licensing server.
Ports8080,1234The ports of the licensing server.
ProtocoltcpType of server protocol.
Active"" or ""Whether or not the licensing server is active.
GroupFront-end EngineersName of the group responsible for the licensing server.
Created byEmily SmithCreator name of the licensing server.
Additional Notes
  • Protocol may be as follows:
    * `TCP`: Transmission Control Protocol.  
    * `UDP`: User Datagram Protocol.
    You may select one of the two currently existing protocols.

Backup Section

Backup Strategies

FilterExampleDescription
NameBackup001Name of the backup Strategy.

Backup Domains

FilterExampleDescription
NameLargeFileBackupName of the backup domain.
OwnerGabrielle JohnsonOwner name of the backup domain.
StrategyBackup001Name of the backup strategy.
DriverNoneThe type of drive where the backup is conducted.
Driver InfoNo remote syncWhether or not the drive is remotely synced with another device.
Additional Notes
  • Driver refers to the types of cloud drives where the backup takes place. The options are the following:
    * `None`: No driver is associated with the backup, hence the backup is only on the server.  
    * `SFTP`: Secured File Transfer Protocol backups.
    * `AZCopy`: Azure cloud backups via the command line.
    * `GSUtil`: Google Cloud Storage backups, via the command line.
    * `AWS`: Amazon Web Services cloud backups.
    You can customize the options based on your own needs.

Backup Objects

FilterExampleDescription
DomainBackupServer001Name of the backup domain.
ObjectBackup Service002Name of the backup object.
TypeProjectThe element where the backup is conducted.
Additional Notes
  • Type in this context addresses three elements:
    * `Project`: Backup is conducted for a project(s).
    * `Team`: Backup is conducted for a specific team(s).
    * `User`: Backup is conducted via user(s).
    Backups will save all the data related to a selected element. We recommend backing up the projects because that is usually the place where the results of the research would end up.

Backup Status

FilterExampleDescription
NameBackupDomain003Name of the backup domain.
TypeIncrementalThe type of backup conducted: checkpoint or incremental.
StatusEndedThe backup current status.
Additional Notes
  • Status of backup may be the following:
    • Receiving: The backup is receiving data.
    • InProgress: The backup is currently in progress.
    • Ended: The backup successfully ended.
    • Failed: The backup has failed.

Escrow Section

Escrow Users

FilterExampleDescription
UserAlin DobraName of the escrow user.
Emailalin.dobra@terainsights.comEscrow user's email.
GroupsCEOThe escrow group of the escrow user.
StatusActiveThe current escrow user status.
DepartmentITThis displays the department of the escrow user profile.
PositionChiefThis displays the position of the escrow user profile.
Additional Notes
  • Status of the escrow users may be the following:
    • Active: The escrow user is active and working normally.
    • Inactive: The escrow user is inactive and no longer has escrow responsibility.
    • Locked: The escrow user has been locked for security reasons.

Escrow Certificates

FilterExampleDescription
Typeold-escrow-groupName of the escrow grup.
Signed byAlin DobraThe full name of the escrow certificate signee.
Additional Notes
  • Type of the escrow certifications may be the following:
    • new-escrow-public-key
    • new-escrow-group
    • list-escrow-groups
    • get-escrow-group-by-id
    • add-key-to-escrow-group
    • list-escrowed-keys-for-user
    • get-escrowed-key-by-id
    • get-users-with-escrowed-keys
    • get-recovery-key-set
    • get-recovery-key-sets-for-escrow
    • retrieve-recovery-key
    • add-recovery-key
    • add-escrow-user
    • get-escrow-user-by-id
    • list-all-escrow-users
    • get-own-escrow-user
    • get-escrow-public-key-by-id
    • get-escrow-public-keys-for-user
    • create-inbox
    • delete-escrow-user

Miscellaneous Section

System Services

FilterExampleDescription
NameAccess ServiceName of the system service.
Serviceticrypt-serviceBackend name of the service.
Running"" or ""Whether or not the service is running.
DescriptionResponsible for service of all system.The description of the service.

Audit Logs

FilterExampleDescription
TypeVR01Type of the audit log.
Arg 1trueArgument 1.
Arg 2falseArgument 2.
Arg 31234Argument 3.
.........
Arg 20trueArgument 20.

System Settings

The section has a search bar in the top right allowing keyword searches.