Liongard
Create
Log in
Sign up
Roadmap
Feedback
Metrics Library
1000
Boards
Feature Requests
Metrics Library
Powered by Canny
Metrics Library
This is a community-led space where Liongard users can come to teach and learn from one another. Share custom Metrics, get inspired and see what’s trending in the Pride.
Details
Category
Showing
Trending
Sort
Trending
Top
New
Filter
Under Review
Planned
In Progress
Blocked
Submitted
Reviewed
Complete
posts in
All Categories
All Categories
Veeam Service Provider Console (3)
Windows Server (82)
Microsoft 365 (132)
Cisco Meraki (18)
Amazon Web Services (7)
SonicWall (34)
Internet Domain/DNS (26)
Dark Web Monitoring (1)
Google Workspace (8)
N-able RMM (5)
Hyper-V (8)
Sophos XG (4)
VMware ESXi (3)
Azure Active Directory (29)
SentinelOne (10)
Huntress (12)
Fortinet FortiGate (21)
Azure (12)
Duo Security (23)
Roar (185)
Windows Workstation (54)
Active Directory (106)
N-able Backup (9)
Auvik (10)
Datto RMM (11)
WatchGuard (3)
Ubiquiti UniFi (10)
macOS (2)
ConnectWise Manage (3)
Continuum RMM (10)
TLS/SSL Certificates (8)
ESET Licensing (3)
JumpCloud (2)
Sophos Central (9)
GoDaddy (3)
IT Glue (10)
KnowBe4 (6)
ConnectWise Automate (5)
Cisco Small Business Solution (SBS) (4)
Network Discovery (9)
OneLogin (3)
SQL Server (4)
Kaseya BMS (1)
NinjaRMM (1)
Cisco Umbrella (8)
Acronis Cyber Cloud (2)
Cisco ASA (8)
Palo Alto (1)
N-able N-central (7)
Autotask (2)
Bitdefender (1)
Managed Printer (6)
Microsoft OneDrive (2)
Microsoft Teams (3)
VMware vCenter (2)
Linux (2)
Webroot Secure Anywhere GSM (11)
Syncro (1)
3CX (1)
StorageCraft SPX (1)
Cisco IOS (7)
BCDR data (15)
Cloudflare (1)
Veeam Availability Console (2)
Kaseya VSA (3)
Domotz (1)
Adigy (1)
Datto Networking (2)
Azure Active Directory: Days Since Last AADC Sync
Counts the number of days since the last Azure Active Directory Connect (AADC) sync. Useful for determining if there is an issue as it should always be <1. SystemInfo.DirectorySync[?DaysSinceLastSync_r > 0 ] | length(@)
6
·
submitted
22
Azure Active Directory: InTune registered devices with Encryption disabled
Detects corporate intune registered devices not encrypted.Outputs into CSV friendly format Devices[?intuneRegistered_r == true && accountEnabled == true && ownership_r == Corporate && isEncrypted == false ].deviceName | join( , , @)
0
·
submitted
1
Azure Active Directory: Excluded Groups From MFA enforcement Policy
You will need to customize the displayName in the query to the string you use to describe your MFA policy. For example if your policy name is Required MFA DUO then your metric would look like this instead Groups[?contains(~.Policies.ConditionalAccess[?displayName == Required MFA DUO ].conditions.users.excludeGroups[], id) ].displayName Groups[?contains(~.Policies.ConditionalAccess[?displayName == MFA Enforcement ].conditions.users.excludeGroups[], id) ].displayName
0
·
submitted
1
Azure Active Directory: Excluded Users from MFA enforcement Policy
You will need to customize the displayName in the query to the string you use to describe your MFA policy. For example if your policy name is Required MFA DUO then your metric would look like this instead Users[?contains(~.Policies.ConditionalAccess[?displayName == Required MFA DUO ].conditions.users.excludeUsers[], id) ].displayName Users[?contains(~.Policies.ConditionalAccess[?displayName == Exchange Online Requires Compliant Device ].conditions.users.excludeUsers[], id) ].displayName
1
·
submitted
1
Azure Active Directory: Computers Details [PowerBI]
Returns the name, os system, os version, and encryption status of the device in Azure AD. Devices[].[displayName, operatingSystem, operatingSystemVersion, isEncrypted]
0
·
submitted
1
Azure Active Directory: Count of Users in Assigned Group
Returns the number of users assigned to group. This is a contains function, so you don't need to be exact. Users[?contains(to_string(assignedGroups[]), 'Group')].displayName | length(@)
0
·
submitted
1
Azure Active Directory: Clients with/without "a service"
This is good to identify clients with a service or services.If looking for 2 services:SecureScore[?contains(enabledServices, HasAaADP1 ) || contains(enabledServices, HasAaADP2 )] && SystemInfo.Overview.CompanyName SecureScore[?contains(enabledServices, HasAADP2 )] && SystemInfo.Overview.CompanyName
0
·
submitted
1
Azure Active Directory: Included Groups in MFA Enforcement Policy
The DisplayName will need to be edited to match the string you use for your MFA enforcement policy, so for Example if yours is called Require DUO MFA the string metric would read Groups[?contains(~.Policies.ConditionalAccess[?displayName == Require DUO MFA ].conditions.users.includeGroups[], id) ].displayName Groups[?contains(~.Policies.ConditionalAccess[?displayName == Enforced MFA ].conditions.users.includeGroups[], id) ].displayName
0
·
submitted
2
Azure Active Directory: Included Users in MFA Enforcement Policy
You will need to customize the displayName in the query to the string you use to describe your MFA policy. For example if your policy name is Required MFA DUO then your metric would look like this instead Users[?contains(~.Policies.ConditionalAccess[?displayName == Required MFA DUO ].conditions.users.includeUsers[], id) ].displayName Users[?contains(~.Policies.ConditionalAccess[?displayName == Required MFA DUO ].conditions.users.includeUsers[], id) ].displayName
0
·
submitted
2
Azure Active Directory: Risk Detections List
Returns a list of Azure Active Directory/Entra ID Risk Detections RiskDetections[].['---'userDisplayName, '-'userPrincipalName,'-' riskEventType ,'-'locationStr, '-'activityDateTime]
0
·
submitted
1
Load More
→
Powered by Canny