
Introduction
With Spring (meteorological) and the welcome appearance of snowdrops and daffodils almost here for those of us in the northern hemisphere, we have another blog to brighten your day (a little poetic license may be required). We’re always working away on improvements behind the scenes, but here are a few changes visible in the user interface, including:
- SSO for Microsoft Entra
- Ignoring multiple risks
- Resolved dates for actions
Entra SSO for Enterprise and MSP plans
Another popular request from our customers has been to provide single sign-on (SSO) and we are very happy to be able to say that this too is now available for our customers who are using Microsoft Entra.
Why use SSO? The use of SSO in your organisation helps centralise account security for your team, including access to external applications, as well as reducing the number of credentials needed. Rather than your ASM users having to remember/store/write on a Post-it (😱) another password, ASM will use your existing Microsoft Entra login which of course brings all of the security you already have in your user authentication environment.
If you have a requirement for external users to access your system (e.g. if you’re an MSP), you can still invite non-SSO users and ‘Auth’ will be shown as ‘Standard’ on the Users view.
If a user is from an organisation with their own SSO in Hexiosec, they will show as ‘External SSO’.
Interested in SSO and use Entra? Then please get in touch with us and we can set this up for you; it’s a simple process and won’t require your ASM users to change their ASM accounts. It will allow Entra users to self-sign up for ASM but they won’t get added to your organisation unless you add them into your org and assign scan group roles - they won’t see any scans or be able to create any scans without you enabling them to do so.
Interested but don’t use Entra? We will be adding support for more identity providers in the future, so please get in touch if you don’t use Entra but would still like to use SSO with ASM as that helps us with prioritisation.
Ignoring multiple risks
For the ASM plans that include risk management, we have streamlined your triage process; the filters on the Risks page already enabled you to focus on the risks that are of most interest to you, and you can ignore individual risks.
From this month, you can now multi-select and ignore risks in one go - for example, if you are happy to accept the 90 day certificate risk then you can easily use a filter to find, select and ignore multiple risks instead of having to do so individually.
The ignored risk type isn’t applied to new risks that are identified in subsequent scan iterations, they would need to be reviewed and marked as ignored if applicable. Don’t forget that ignored risks still remain available and can be reviewed and removed from the ignore list.
Action resolved dates
A popular feature request from our customers on plans that have actions management, has been to provide a way to help customers see when their actions were resolved. We love feedback and are happy to say that this change is now live - when an action gets resolved, the resolved date and time is added to the action and sorted in the Resolved view. Actions resolved prior to this feature being added will show in the ‘Older’ column.
When you select a resolved action for more details the date will also be shown in the bottom right of the actions card.
If you have an idea for a feature you would find useful, please do get in touch as we want to make sure that we are making ASM as useful for our customers as possible.
Coming Soon
A few features and improvements in the coming months that you may be interested in:
- Manage your active user list - this one is for the ASM admins in your organisation and will allow them to see the last activity date for their users. This will help larger organisations free-up seats within ASM for users who no longer need access.
- Domain takeover vulnerability - we’re working on adding a new check to ASM that will report on domains and sub-domains in your environment that are at risk of being hijacked.
- Identify default web server pages - this change will report specifically on where a web server is set up but using the default page for that service so likely isn’t being used.
Related Posts


