Skip to main content

How to get your data in the right format

To get accurate analysis of your control gaps, you’ll need to upload data extracts from at least two of your security tools. This can include either your asset manager, EDR tool, or vulnerability scanner.

You need to please ensure that your data extracts are in .csv format, and at a minimum include fields for:

  • IP address.
  • The timestamp for when the asset last connected to the data source.

While the Coverage Tool only needs IP address and timestamp, you’ll get more accurate analysis if you provide additional device information – such as MAC address and operating system.

To help with this, we’ve linked to official user guides from relevant security tools that are commonly used by our customers.