Skip to main content
Partner brand logos 1

How to get data extracts from your security tools

Find links to guides for commonly-used security tools so you can upload your data to our Coverage Tool

How to get your data in the right format

To get accurate analysis of your control gaps, you'll need to upload data extracts from at least two of your security tools. This can include either your asset manager, EDR tool, or vulnerability scanner.

You need to please ensure that your data extracts are in .csv format, and at a minimum include fields for:

  1. IP address.
  2. The timestamp for when the asset last connected to the data source.

While the Coverage Tool only needs IP address and timestamp, you'll get more accurate analysis if you provide additional device information – such as MAC address and operating system.

To help with this, we've linked to official user guides from relevant security tools that are commonly used by our customers.