SOC Live Dashboard
Real-time endpoint visibility, threat feed, and event triage. Agent Crucible never blinks β it watches every endpoint all day, every day.
Live Event Feed
β LIVE (SIMULATED)Endpoint Health
247 ONLINE| Host | OS | Last seen | Status |
|---|---|---|---|
| WIN-03 | Win 11 | Just now | ISOLATED |
| WIN-07 | Win 11 | 32s | CLEAN |
| MAC-14 | macOS 14 | 1m | CLEAN |
| LIN-02 | Ubuntu 22 | 2m | CLEAN |
| SRV-01 | Ubuntu 22 | 45s | PATCHING |
| WIN-11 | Win 10 | 1m | WATCHING |
Event Volume Β· 12h
HOURLYDark Web & Insider Threat
Agent Shadow watches what others can't β paste sites, underground forums, leak marketplaces, and covert lateral channels. The agent that sees into the darkness others avoid.
Subdomain Exposure (cert transparency)
3 RISKY| Subdomain | Resolved | Risk | Finding |
|---|---|---|---|
| staging.acme.com | β live | HIGH | No auth, public-facing, leaked in paste |
| dev.acme.com | β live | MEDIUM | Exposed admin panel (/admin 200) |
| backup-api.acme.com | β live | MEDIUM | Returns 200 on /status with build version |
| mail.acme.com | β live | LOW | Expected β MX record, properly auth'd |
| app.acme.com | β live | CLEAN | Production β headers clean |
Threat Hunting & Anomaly Detection
ML pattern-mining over behavioral telemetry. Agent Purge doesn't wait for signatures β it builds baselines and hunts deviations. The cunning mind that sees what rules can't.
Anomaly Score Timeline Β· 7 days
BEHAVIORALSunday spike: svc.backup user ran cmd.exe with encoded PowerShell args. Score 0.87. Matches "living off the land" pattern. Escalated to Agent Crucible triage queue.
Active Anomaly β ID #2847
OPEN| Field | Value |
|---|---|
| User | svc.backup |
| Host | WIN-03 |
| Score | 0.87 (threshold: 0.75) |
| Signal | cmd.exe β powershell -enc β¦ |
| Pattern | LotL β encoded PS, no parent |
| First seen | Sun 20:04:15 |
| Lateral? | Yes β SMB to WIN-11 confirmed |
| Status | ENDPOINT ISOLATED |
Completed Hunts Β· Last 7 Days
14 CLEAN| Hunt | Scope | Findings | Date |
|---|---|---|---|
| Beacon intervals | All endpoints | None | Mon |
| DNS tunneling | All endpoints | None | Tue |
| Cred dumping | DCs + servers | None | Wed |
| Persistence | Win endpoints | None | Thu |
| Exfil channels | Network perimeter | None | Fri |
| Priv escalation | All endpoints | 1 low | Sat |
| LotL sweep | All endpoints | 1 critical β | Sun |
Network Traffic Analysis & IDS
Deep packet inspection, flow analytics, lateral-movement detection. The watchtower on the ridge β nothing crosses the network without Agent Anvil seeing it from the high ground.
Ingress/Egress Β· Last 6 Hours
IDS Alerts Β· 24h
ALL LOW| Rule | Src | Dst | Sev | Count |
|---|---|---|---|---|
| DNS to non-corp resolver | WIN-09 | 1.1.1.1 | INFO | 14 |
| Large ICMP (potential tunnel) | MAC-14 | external | LOW | 2 |
| Pastebin.com outbound | WIN-05 | 104.20.68.x | LOW | 1 |
| SMB lateral (blocked) | WIN-03 | WIN-11 | HIGH β | 1 |
Top Talkers Β· Egress
| Host | Dest | Volume | Status |
|---|---|---|---|
| SRV-01 | s3.amazonaws.com | 1.2 TB | SANCTIONED |
| WIN-07 | office365.com | 380 GB | SANCTIONED |
| MAC-14 | slack.com | 12 GB | SANCTIONED |
| WIN-03 | WIN-11 (LAN) | 4.1 GB | BLOCKED Β· ISOLATED |
Orchestration & SOAR
The lead agent that the others sync to. Agent Atlas routes response playbooks, automates containment, and gives the CISO one authoritative pane of glass. One console, not seven.
Agent Integration Status
Active Playbooks
| Playbook | Trigger | Status | Step |
|---|---|---|---|
| isolateEndpoint | Agent Purge score >0.80 | COMPLETED | 5/5 β WIN-03 offline |
| rotateCredential | Agent Shadow breach match | COMPLETED | 4/4 β rotated |
| containRansomware | Agent Purge LotL pattern | AWAITING | 3/6 β human confirm |
External Integrations
Forensics & Immutable Audit Trail
Every observation is hash-chained the moment it's made. Ransomware can't rewrite your forensics. The agent that looks back and never lies.
Hash Chain β Recent Events
INTEGRITY OKIncident #2847 β Full Timeline
OPEN| Time | Agent | Event |
|---|---|---|
| 20:04:15 | Agent Purge | Anomaly score 0.87 Β· svc.backup Β· cmd.exe -enc |
| 20:04:22 | Agent Anvil | SMB flow WIN-03 β WIN-11 detected |
| 20:04:26 | Agent Shadow | Credential leak correlated Β· same user |
| 20:04:34 | Agent Atlas | Playbook "isolateEndpoint" armed |
| 20:05:00 | Agent Atlas | WIN-03 isolated β 0 active connections |
| 20:05:04 | Agent Alloy | SOC2 CC7.2 evidence collected |
Governance & Compliance
Agent Alloy maps continuous evidence to SOC 2, ISO 27001, NIST CSF, and HIPAA β automatically. Audit prep becomes "download packet." The agent that keeps compliance current.
Framework Compliance Scores
Open Policy Gaps
2 MEDIUM| Control | Framework | Gap | Severity |
|---|---|---|---|
| CC6.7 | SOC 2 | Vendor security reviews not on 90-day cycle | MEDIUM |
| PR.AC-4 | NIST CSF | Privileged access not fully MFA-enforced (2 svc accounts) | MEDIUM |
Upcoming Milestones
| Event | Framework | Due | Status |
|---|---|---|---|
| SOC 2 annual audit | SOC 2 Type II | 47 days | ON TRACK |
| ISO surveillance audit | ISO 27001 | 83 days | ON TRACK |
| HIPAA risk assessment | HIPAA Β§164.308 | 112 days | GAP: MFA |
| Vendor review cycle | SOC 2 CC6.7 | 14 days | OVERDUE |
All Scan Results
Every URL scanned via the free scanner. Admin-only view β data is stored in Supabase via the service role and gated by RLS to admin emails.
Get early access to the real thing.
The Seven are being lit one at a time. Waitlist members get first access, locked-in pricing, and a white-glove onboarding session with the founding team.
Join the waitlist β