AMA: Setup the Policy Accept Button

circle
circle

AMA is an ongoing series published each Thursday, highlighting questions the community has asked in our support and how-to channels on Slack. If you haven't already done so, please join us on Slack

 

"We've been making good use of the "Policy Accept" feature of JupiterOne. What controls whether this button shows up and how do I query for users who have and have not clicked the button?"

--Question from Bob on the J1 Community Slack

Here's the full question from Bob:

We've been making good use of the "Policy Accept" feature of JupiterOne. The accept button, however, is not showing up for some of our employees. I wondered if some of these employees clicked the accept button without realizing so I ran this query to see who has and has not accepted.

FIND Person WITH _type = "employee" AND acceptedSecurityPolicyOn = undefined

My assumption is that any employee who shows up with this query should see the "Policy Accept" button on the Policy page but that doesn't seem to be the case for several of our employees. What controls whether this button shows up and how do I query for users who have and have not clicked the button?

Answer from JupiterOne Team

Hi Bob, thanks for reaching out. What you are saying is correct. We actually have a fix deploying at the moment for this regression. The button should be showing up for the conditions you've described above in around 15 minutes.

From Bob: Wow. That's pretty awesome! Thanks :pray:

Articles in this Series

  1. AMA: JupiterOne and PagerDuty WebHooks
  2. AMA: Export YAML Files for Vendors Pulled from SSO Providers
  3. AMA: Map Controls and Frameworks Relationships
  4. AMA: How to Track Professional Associations, Security Forums, and Threat Intel Sources
  5. AMA: Find AWS Instances by their Private IP Address
  6. AMA: SSO Integrated Authentication, Move to Another Role
  7. AMA: send-mail action to map two properties
  8. AMA: Setup the Policy Accept Button
  9. AMA: Match a blank field in J1QL
  10. AMA: Track and Alert Using Firewall Rules Matrix
  11. AMA: AWS Roles not used for 90 days, and date related queries
  12. AMA: Manage Alerts for Jira through J1 Terraform Provider
  13. AMA: Filter Results from Specific AWS Accounts
  14. AMA: Iterate and return total count of iam users per account
  15. AMA: Search for security groups by tag
  16. AMA: Identify S3 Buckets Open to Cross-Account Attacks

Resources for this AMA

 

Modern Visibility in Cyberseccurity

 

 

avatar

Posted By JupiterOne Team

The JupiterOne Team is a diverse set of engineers and developers who are working on the next generation of cyber asset visibility and monitoring.

To hear more from the JupiterOne Team, get our newsletter. No spam, just the good stuff once or twice a month. Sign up below.

PREVIOUS ARTICLE

cyber-security 1

Ad Title Placeholder

Lorem ipsum dolor sit amet, consectetur adipiscing elit.