Assets & Infrastructure
このコンテンツはまだ日本語に翻訳されていません。
KYRA MDR provides comprehensive infrastructure management through three interconnected features: Assets, Connectors, and Collectors.
Assets
Asset Inventory
Track all endpoints, servers, cloud resources, and network devices in your environment:
- Risk scoring — Automated risk calculation based on vulnerabilities and exposure
- Criticality tagging — Mark assets as Critical, High, Medium, or Low importance
- Vulnerability tracking — Associate known vulnerabilities with assets
- Export — Download asset inventory as CSV or JSON
Asset Detail
Each asset shows:
- Hardware/software information
- Network configuration (IP, MAC, hostname)
- Risk score history
- Associated alerts and incidents
- Installed software and services
Connectors (36+)
Data source integration management for third-party security tools:
| Category | Examples |
|---|---|
| Firewalls | FortiGate, SonicWall, Sophos, Palo Alto |
| EDR | CrowdStrike, SentinelOne, Defender, Carbon Black |
| Cloud | AWS CloudTrail, Azure, GCP, Naver Cloud |
| Identity | Active Directory, Okta, Azure AD, Duo MFA |
| Network | Snort, Suricata, Zeek, Cisco |
| Exchange Online, Gmail, Proofpoint |
Connector Features
- Health monitoring — Real-time connectivity status
- Connection testing — Validate credentials and connectivity
- Configuration — Set up API keys, endpoints, and sync intervals
- Log volume tracking — Monitor events per second from each source
Collectors
Lightweight log collector agent management:
| Feature | Description |
|---|---|
| Deployment status | Track which agents are active, offline, or degraded |
| Version tracking | Monitor collector versions and update status |
| Configuration | Configure log sources, filters, and forwarding rules |
| Health monitoring | CPU, memory, and network usage per collector |
| Collector keys | Manage registration keys for new collector deployments |
Installation
Collectors are deployed via a one-line install command:
curl -sSL https://install.kyra-mdr.com | sudo bash -s -- --key YOUR_COLLECTOR_KEYSubdomains (EASM)
External Attack Surface Management for monitoring internet-facing assets. See Subdomain Monitoring for details.
Access Requirements
- Assets: Respond (MDR) tier or above
- Connectors: Respond (MDR) tier or above
- Collectors: Available on all tiers including Detect (Free)