Full K-Shield Workflow
Use this guide when you need the complete K-Shield workflow shown in the current screenshots: dashboard review, VM-level scanning, managed-node review, monitoring, compliance validation, and report downloads. New users should follow the sections in order: start with Node-Level Dashboard, review VM-Level Dashboard, complete any VM scan or schedule review, then open managed-node Overview, History, Monitoring, and Compliance.
1. Node-Level Dashboard
When to Use:
Use this first when reviewing the node-level dashboard shown below.
Purpose:
Review the node-level dashboard cards, charts, node table, and top vulnerabilities.
Steps:
Open
K-Shield -> Dashboard.Select
Node level.Review category score cards across the top.
Review fleet summary cards.
Review the trend chart, risk distribution, security nodes table, and top vulnerabilities.
Select a managed node if you need details.
K-Shield node-level dashboard.
What this screenshot shows:
Managed nodes in the left panel.
Node levelselected on the dashboard.Node levelandVM leveltabs at the top of the dashboard.Category cards for operating systems, databases, web servers and apps, network devices, virtualization, and storage.
Fleet cards for
Total Nodes,Compliance Score,Risk Level,Total Findings,Scanned, andNot Scanned.Compliance Trend ChartandRisk Distribution.Security NodesandTop Vulnerabilitiestables.
What you can do from this screen:
Identify scanned and not-scanned node counts.
Compare node compliance scores.
Review CAT I, CAT II, and CAT III distribution.
Open a managed node from the table or left panel.
Use the selected managed-node card in the left panel to confirm which node will open.
Use top vulnerabilities to find repeated issues across nodes.
As a new user, start here before opening managed-node details.
Expected Outcome:
The node-level dashboard information is visible and readable.
Managed nodes are available for selection.
If this fails:
Refresh the dashboard.
Confirm managed nodes appear in the left panel.
Confirm the
Node leveltab is selected.
2. VM-Level Dashboard
When to Use:
Use this when reviewing the VM-level dashboard shown below.
Purpose:
Review the VM list, VM status, K-Shield responding status, compliance score, and last scan data.
Steps:
Open
K-Shield -> Dashboard.Select
VM level.Open
VM List.Review VM status and K-Shield responding status.
Check compliance score and last scan details.
Select one or more eligible VMs when a scan is required.
K-Shield VM-level dashboard.
What this screenshot shows:
VM levelselected on the dashboard.VM List,Batch History, andSchedule Historytabs.VM scan eligibility table.
VM name, IP, VM status, node IP, K-Shield responding state, compliance score, and last scan.
Eligibility filter dropdown,
Schedule scanbutton,Run VM scansbutton, and refresh icon.
What you can do from this screen:
Find VMs shown in the eligibility table.
Confirm whether K-Shield is responding for each VM.
Use row checkboxes to select VMs before running or scheduling scans.
Run immediate VM scans.
Schedule VM scans.
Use the refresh icon to reload VM eligibility.
Open batch and schedule history.
As a new user, review this after the node-level dashboard so both dashboard scopes are covered.
Expected Outcome:
VM-level dashboard information is visible and readable.
VM scan actions are visible on the page.
If this fails:
Refresh the VM list.
Confirm the
VM leveltab is selected.Confirm VM rows are visible.
3. Run VM Scans
When to Use:
Use this when selecting VMs from the VM list shown below.
Purpose:
Select VMs and open the scan action shown on the VM-level dashboard.
Steps:
Open
K-Shield -> Dashboard -> VM level.Open
VM List.Select one or more VMs.
Click
Run VM scans.Select the correct security profile for each VM.
Choose
Run nowwhen immediate validation is required.
VM scan selection from the VM-level dashboard.
What this screenshot shows:
Eligible VM rows selected for scanning.
Row checkboxes showing selected VMs.
VM status and K-Shield responding status.
Run VM scansaction available.Schedule scanaction and refresh icon beside the scan action.Compliance score and last scan information.
What you can do from this screen:
Select VMs for a batch scan.
Filter to eligible VMs.
Open the VM scan dialog.
Use the refresh icon if eligibility or scan state looks stale.
Refresh scan eligibility.
Expected Outcome:
Selected VM rows are clear.
The
Run VM scansaction is available.
If this fails:
Confirm at least one VM row is selected.
Refresh the VM list.
Confirm the
Run VM scansbutton is visible.
4. Start or Schedule VM Scan
When to Use:
Use this after the scan dialog shown below opens.
Purpose:
Review selected VMs, profile selectors, and run or schedule controls.
Steps:
Confirm the selected VMs in the dialog.
Select the correct security profile for each VM.
Choose
Run nowfor immediate execution.Choose
Schedulefor future execution.If scheduling, select the date and time.
Click the visible scan or schedule action.
Start VM Scans dialog.
What this screenshot shows:
Selected VMs.
Selected VM chips at the top of the dialog.
Per-VM security profile selectors.
Execution controls for
Run nowandSchedule.Date and time fields for scheduled execution.
Close icon in the upper-right of the dialog.
Final
Schedule Scanaction.
What you can do from this screen:
Assign different profiles to different VMs.
Run the selected scans immediately.
Schedule scans for the selected date and time.
Use the close icon or
Cancelif the selected VMs or profiles are wrong.Cancel if the wrong VMs or profiles were selected.
Expected Outcome:
Selected VMs and profile selectors are visible.
Run and schedule controls are visible.
If this fails:
Reopen the dialog.
Confirm selected VMs are listed.
Confirm profile selectors are visible.
Confirm date and time fields are visible when
Scheduleis selected.
5. Schedule VM Scan Selection
When to Use:
Use this when the schedule selection screen shown below is open.
Purpose:
Review the schedule selection controls for the selected VMs.
Steps:
Select eligible VMs from
VM List.Click
Schedule scan.Confirm selected VMs.
Select profiles.
Select date and time.
Save the schedule.
VM scan schedule selection.
What this screenshot shows:
Selected VM scan schedule flow.
Selected VM chips and security profile selectors.
Security profile selection.
Schedule controls for date and time.
Canceland final schedule action.
What you can do from this screen:
Prepare a scheduled VM scan.
Review schedule controls.
Confirm the selected baseline profile before saving.
Cancel before saving if the selected VM or time is incorrect.
Expected Outcome:
Schedule controls are visible.
Selected VM scan details are visible.
If this fails:
Confirm at least one VM is selected.
Confirm the selected time is valid.
Refresh and retry.
6. VM Batch History
When to Use:
Use this when viewing the VM batch history screen shown below.
Purpose:
Review VM scan batch records.
Steps:
Open
K-Shield -> Dashboard -> VM level.Open
Batch History.Review scan batch status.
Confirm included VMs.
Check start and completion times.
Review rows that need attention.
VM batch history.
What this screenshot shows:
VM scan batch history.
Batch execution records.
Status and timing information.
Batch history tab selected in the VM-level view.
What you can do from this screen:
Confirm that a VM scan batch started.
Review which VMs were included.
Review visible status badges.
Identify rows with incomplete or non-success status.
Review batch status information.
Expected Outcome:
VM batch records are visible.
Batch status and timing information are visible.
If this fails:
Refresh batch history.
Confirm the
Batch Historytab is selected.Confirm batch rows are visible.
7. VM Schedule History
When to Use:
Use this when viewing the VM schedule history screen shown below.
Purpose:
Review scheduled VM scan records.
Steps:
Open
K-Shield -> Dashboard -> VM level.Open
Schedule History.Confirm the scheduled scan appears.
Review schedule time and target VMs.
Check completed scheduled runs after execution time.
VM schedule history.
What this screenshot shows:
Scheduled VM scan records.
Schedule history tab.
Scheduled or completed execution information.
Schedule history tab selected in the VM-level view.
What you can do from this screen:
Verify scheduled scans.
Review past scheduled scan runs.
Confirm scheduled scan records.
Use visible status/timing fields to confirm the scheduled entry.
Expected Outcome:
Schedule history records are visible.
Schedule details are readable.
If this fails:
Refresh schedule history.
Confirm the
Schedule Historytab is selected.Confirm schedule rows are visible.
8. Dashboard Help
When to Use:
Use this when a user needs help interpreting K-Shield dashboard fields.
Purpose:
Explain the node-level and VM-level dashboard areas without leaving the K-Shield workflow.
Steps:
Open
K-Shield -> Dashboard.Click the help icon.
Review dashboard guidance.
Return to the dashboard.
K-Shield dashboard help.
What this screenshot shows:
Dashboard help content.
Guidance for node-level and VM-level dashboard review.
Help icon that opens the dashboard guidance.
What you can do from this screen:
Confirm what dashboard fields mean.
Help a new user understand the workflow.
Use the help icon when a dashboard field is unfamiliar.
Return to dashboard review after reading guidance.
Expected Outcome:
Dashboard help content is visible.
If this fails:
Close and reopen the help panel.
Refresh the page.
Confirm the help icon is visible.
9. Managed Node Overview
When to Use:
Use this when viewing the managed-node overview screen shown below.
Purpose:
Review the selected node’s overview cards, security score panel, and vulnerability table.
Steps:
Open
K-Shield -> Dashboard -> Node level.Select a managed node from the left panel or
Security Nodestable.Open
Overview.Review score cards and security score panel.
Review vulnerabilities.
Filter by severity when triaging findings.
Managed-node overview.
What this screenshot shows:
Managed-node breadcrumb.
Tabs for
Overview,History,Monitoring, andCompliance.Start Security Scanaction.Selected managed-node card in the left panel.
Overview cards for
Compliance Score,System Status,CAT I Issues,CAT II Issues, andCAT III Issues.Compliance Trendchart for score movement across scan dates.Security Score Panelwith profile, security posture, zero-day vulnerabilities, remediation pending, top vulnerability category, last scan status, and last scan completed.Vulnerabilitiestable with internal ID, title, type, external ID, CWE ID, severity, CVSS, and detected-on date.Severity filter for vulnerability rows.
What you can do from this screen:
Confirm the latest scan status.
Review compliance score and issue counts.
Review the security profile and posture in the score panel.
Filter vulnerabilities by severity.
Use linked IDs in the table to inspect specific rows when available.
Start a new security scan.
Move to history, monitoring, or compliance tabs.
Expected Outcome:
The selected node overview information is visible.
Overview cards, trend chart, score panel, and vulnerability rows are visible.
If this fails:
Refresh the managed-node page.
Confirm the selected node appears in the breadcrumb.
Confirm the
Overviewtab is selected.
10. Run Security Scan for the Node
When to Use:
Use this when the node overview screen shows the Start Security Scan action.
Purpose:
Start the security scan action visible on the selected node screen.
Steps:
Open the target managed node.
Click
Start Security Scan.Select the approved security profile.
Start the scan.
Return to
OvervieworHistoryafter the scan action is submitted.
Node security scan start flow.
What this screenshot shows:
Node overview context.
Start Security Scanaction.Scan start workflow for the selected node.
Same node tabs remain visible so the user can return to
OvervieworHistory.
What you can do from this screen:
Start a security scan for the node.
Confirm the target node before scanning.
Use the visible tab row to return to
OvervieworHistoryafter starting the scan.Return to the node tabs after the scan action.
Expected Outcome:
Start Security Scanis visible.The selected node context is clear before starting the scan.
If this fails:
Refresh the node page.
Confirm the selected node is still visible.
Confirm the
Start Security Scanaction is visible.
11. Managed Node History
When to Use:
Use this when viewing the managed-node history screen shown below.
Purpose:
Review scan records and report actions visible in the history tab. The report icons in the Reports column download the scan output as HTML and PDF files.
Steps:
Open a managed node.
Click
History.Go to the
Scan Historytable.Find the scan row you want to review.
Confirm the row status, date and target, profile, compliance score, and vulnerabilities count.
Move to the
Reportscolumn on the same row.Click the HTML report icon to download the HTML report file.
Click the PDF report icon to download the PDF report file.
Open the downloaded report file from your browser downloads when you need to review it outside K-Shield.
Managed-node history.
What this screenshot shows:
Managed-node history tab.
Summary cards for compliance score, compliance grade, and vulnerabilities.
Previous Scan Detailswith scan time, initiator, top risk category, and common vulnerability type.Recent Changescards for new vulnerabilities and vulnerabilities closed.Compliance Gap Analysisvalues for improving controls and declining controls.Scan Historytable with scan ID, date and target, status, profile, compliance score, vulnerabilities, and report actions.RefreshandRefresh Historybuttons.Report icons for HTML and PDF downloads in the
Reportscolumn.
What you can do from this screen:
Confirm scan completion.
Compare scan runs.
Use
RefreshorRefresh Historyto reload the history view.In the
Reportscolumn, use the report icons on the scan row to find and download the available reports.
- Click the HTML report icon to download an HTML file.
- Click the PDF report icon to download a PDF file.
Use downloaded reports for review outside the dashboard.
Identify rows with incomplete or non-success status.
Expected Outcome:
Scan records are visible for the selected node.
Status and HTML/PDF report actions are readable.
If this fails:
Refresh history.
Confirm the
Historytab is selected.Confirm scan rows are visible.
Confirm the
Reportscolumn contains the report icons.
12. Managed Node Monitoring
When to Use:
Use this when viewing the monitoring screen shown below.
Purpose:
Review Nmap score, open ports, unexpected ports, Rkhunter status, and Rkhunter warnings.
Steps:
Open a managed node.
Click
Monitoring.Review monitoring cards.
Review
Nmap Network Scandetails.Review
Open PortsandUnexpected Ports.Review Rkhunter status and history.
Managed-node monitoring open ports.
What this screenshot shows:
Nmap Score.Open Ports Summary.Unexpected Portscount.Rkhunter StatusandRkhunter Warnings.Nmap Network Scandetails such as hostname, scan ID, scan time, and total ports scanned.Port security risk timeline panel.
Open PortsandUnexpected Portstabs.Open ports table with service impact notes and
View detailsbuttons.
What you can do from this screen:
Review detected open ports.
Review port, protocol, service, and impact fields.
Confirm whether services are expected.
Click
View detailsfor a port row when available.Review monitoring values shown on the screen.
Expected Outcome:
Monitoring cards and open-port rows are visible.
Nmap and Rkhunter fields are readable.
If this fails:
Refresh the monitoring tab.
Confirm the
Monitoringtab is selected.Confirm monitoring cards are visible.
13. Unexpected Ports
When to Use:
Use this when viewing the unexpected-ports screen shown below.
Purpose:
Review the unexpected-port rows and impact guidance shown on the screen.
Steps:
Open
Monitoring.Select
Unexpected Ports.Review each port, protocol, and service.
Review the impact text.
Managed-node unexpected ports.
What this screenshot shows:
Unexpected ports tab.
Detected ports and services that need review.
Impact guidance for exposed services.
Port row fields such as port, protocol, service, impact, and details action.
What you can do from this screen:
Review unexpected listener details.
Review service and impact text.
Use the visible details action on a port row when available.
Expected Outcome:
Unexpected port rows are visible and readable.
If this fails:
Refresh the monitoring tab.
Confirm
Unexpected Portsis selected.Confirm unexpected-port rows are visible.
14. Rootkit Hunter Monitoring
When to Use:
Use this when viewing the Rootkit Hunter monitoring information shown below.
Purpose:
Review the Rootkit Hunter status and warning fields shown on the monitoring screen.
Steps:
Open the managed node.
Click
Monitoring.Review
Rkhunter Status.Review warnings and scan history.
Review the displayed status and warning fields.
Managed-node Rootkit Hunter monitoring.
What this screenshot shows:
Monitoring tab with unexpected ports and Rootkit Hunter information.
Rootkit Hunter
System Status.Scan summary cards for files verified, suspect files, rootkits checked, possible rootkits, checks passed, and checks failed.
Last scan completed timestamp and duration.
Rootkit Hunter scan history table with scan ID, scan time, warnings, status, reports, and view details.
Report icons and
Viewbuttons in the scan history table.
What you can do from this screen:
Confirm whether Rkhunter status is clean.
Review warning count.
Review scan time.
Use report icons when reports are available.
Click
Viewto inspect a scan row when available.Review Rootkit Hunter fields shown on the screen.
Expected Outcome:
Rootkit Hunter status information is visible.
If this fails:
Refresh monitoring.
Confirm
Monitoringis selected.Confirm Rkhunter fields are visible.
15. FIPS Security Profile
When to Use:
Use this when the Compliance screen shows FIPS security profile as the selected compliance framework.
Purpose:
Explain what the FIPS profile means on the Compliance screen and how it helps a user understand the security health of the selected node.
Steps:
Open a managed node.
Click
Compliance.Locate
Compliance framework.Confirm the selected framework is
FIPS security profile.Review the profile chip on the right to identify the exact XCCDF profile ID.
Review the score gauge for percentage, status, and grade.
Review passed, failed, not applicable, and could-not-evaluate counts to understand how healthy the node is against the selected profile.
FIPS security profile on the managed-node compliance screen.
What this screenshot shows:
Compliance frameworkset toFIPS security profile.Profile chip showing the exact XCCDF profile ID.
Score gauge with percentage, status, and grade.
Summary cards for profile, passed, failed, not applicable, could not evaluate, and last scan.
What FIPS Means Here:
FIPS security profile is the compliance framework selected for this node. In this view, it is used as a security baseline: K-Shield checks the node against the rules in that profile and reports how many checks passed, failed, did not apply, or could not be evaluated.
How to Read Node Security Health:
A higher score and better grade indicate the node is closer to the selected FIPS baseline.
Passedshows controls that matched the profile.Failedshows controls that did not meet the profile and need review.Not applicableshows controls that do not apply to this node.Could not evaluateshows checks where K-Shield could not determine a result.Last scanshows when this compliance health view was last updated.
What you can do from this screen:
Confirm which FIPS profile was used for the node.
Use the profile chip when you need the exact XCCDF profile ID.
Use the score gauge to understand whether the node is passing or failing the selected profile.
Use passed, failed, not applicable, and could-not-evaluate counts to understand the scan result breakdown.
Use the failed count and findings table to decide what needs attention first.
Expected Outcome:
The selected FIPS framework is clear.
The exact profile ID, score, status, grade, and result counts are visible.
The user can tell whether the node looks healthy or needs review against the FIPS profile.
If this fails:
Refresh the compliance tab.
Confirm
Complianceis selected.Confirm the
Compliance frameworkand profile chip are visible.
16. Managed Node Compliance
When to Use:
Use this when viewing the compliance findings screen shown below.
Purpose:
Review compliance profile results and findings shown on the screen.
Steps:
Open a managed node.
Click
Compliance.Review the
Compliance frameworkvalue. In this screenshot, the selected framework isFIPS security profile.Review the profile chip on the right to see the exact XCCDF profile ID used for the scan.
Review the score gauge to see the compliance percentage, status, and grade.
Review passed, failed, not applicable, could-not-evaluate, and last scan cards.
Review findings.
Open compliance history when prior compliance rows need review.
Managed-node compliance findings.
What this screenshot shows:
Compliance framework and security profile.
FIPS security profileselected as the compliance framework.Exact profile chip with the XCCDF profile ID.
Help and refresh icons near the profile chip.
Score gauge with compliance percentage, status, and grade.
Summary cards for profile, passed, failed, not applicable, could not evaluate, and last scan.
Scan outcome and severity breakdown.
Findings table with severity, rule, and rule ID.
Filter chips for passed, failed, and not applicable rule sets.
Severity dropdown and download icon for the current outcome set.
What you can do from this screen:
Use
FIPS security profileto understand that the node is being evaluated against the FIPS compliance framework shown on the page.Use the profile chip to identify the exact XCCDF profile used for the scan.
Use the score gauge to understand the current score, status, and grade.
Review failed-rule rows.
Filter compliance findings.
Use filter chips to switch between passed, failed, and not applicable rows.
Use the severity dropdown to narrow the current findings set.
Use the visible download action when available.
Review failed-control rows.
Expected Outcome:
Compliance status and finding rows are visible.
The selected FIPS profile, exact profile ID, score, status, and grade are clear.
Passed, failed, not applicable, and could-not-evaluate counts are readable.
If this fails:
Refresh the compliance tab.
Confirm
Complianceis selected.Confirm the profile and findings table are visible.
17. Compliance History
When to Use:
Use this when viewing the compliance history screen shown below.
Purpose:
Review compliance history records for the selected managed node.
Steps:
Open the managed node.
Click
Compliance.Open
Compliance history.Compare prior compliance results.
Review the displayed history records.
Managed-node compliance history.
What this screenshot shows:
Compliance history tab.
Paged compliance history records for the selected node.
Columns for ID, profile, status, grade, score, passed, failed, scan time, and severity split.
Severity split badges for high, medium, low, and unknown or unspecified severity.
Expand chevron for each row.
Help icon in the compliance history panel.
What you can do from this screen:
Compare visible compliance history entries.
Review prior compliance status.
Review score, pass/fail counts, scan time, and severity split for each row.
Use the chevron to expand a history row when details are available.
Expected Outcome:
Compliance history is visible.
If this fails:
Refresh the tab.
Confirm
Compliance historyis selected.Confirm history records are visible.