Home · Docs · Page-by-Page Walk-through

URIP Page-by-Page Walk-through

Last updated: 2026-04-30 Audience: Buyers evaluating URIP, security analysts onboarding, compliance officers preparing for audit. Read this end-to-end and you'll have seen every URIP screen that matters — no demo call needed.

This is the customer's walk-through. Operational screens (notifications, search, settings, password resets) are described in one paragraph each because every SaaS has them. We focus on the 30 screens that actually decide whether URIP solves your problem.

For each page you'll see:

  1. What it shows — the live screenshot at https://urip.adaptive-mind.com
  2. What you do here — the primary actions
  3. Where the data comes from — which connector / module feeds the page (where relevant)

Table of Contents


1. Sign in

URL: /login.html

Sign-in page

What it shows. Email + password form. If your tenant has SSO enabled, an SSO button appears here. After successful credential check the form prompts for an MFA code (TOTP).

What you do here. Enter your email + password → click Sign in → enter your authenticator code → land on the dashboard.

Aux entry points (no separate screenshots — they are minor): - /register.html — first user of a new tenant uses this with the Tenant ID their admin emailed them. - /forgot-password.html & /reset-password.html — standard self-service reset flow. - /vendor-login.html — external auditors / vendors with a time-bound invitation link. - /vapt-portal-login.html — separate sign-in for pen-test vendors who submit findings into your URIP. - /mfa-enroll.html — first-time TOTP setup; URIP enforces MFA on every login.


2. Daily cockpit

After sign-in every page shares the same left sidebar (modules, your tenant) and topbar (search, notifications, user menu). Operational widgets like the global search box, the notifications drawer, and the per-user settings page are standard SaaS — they exist, they work, you'll find them in the topbar. Sign-in lands you straight on the dashboard.

Risk Intelligence dashboard

URL: /dashboard.html

Dashboard

What it shows. The CISO's daily cockpit. Open risk count, critical / high / medium / low split, IOC matches, KEV-tagged risks, top 5 affected assets, 30-day trend lines, and a heat map across the eight domains (Endpoint, Identity, Network, Cloud, Email, Mobile, OT, External Threat).

What you do here. Watch the KPIs at the top of the day, drill into anything red, click any tile to land on the underlying register.

Audit log

URL: /audit-log.html

Audit log

What it shows. Immutable, hash-chained log of every state change — who did what, when, on which entity. Used during SOC 2 / ISO 27001 audits to prove integrity. Each row is signed and linked to the previous row's hash, so any tamper is detectable.

What you do here. Filter by user, action, entity, or time window. Export a CSV for your auditor.


3. Risk Center

The Risk Center is the home of every analyst. Open it from the sidebar.

Risk overview

URL: /risk-overview.html

Risk overview

What it shows. Executive view of the entire risk surface — open vs closed, by severity, by domain, by source connector, by SLA bucket. Includes the 30/60/90-day trend lines and the "what changed today" delta strip.

What you do here. Brief the CISO from this single page; export it as a board-ready PDF.

Risk register

URL: /risk-register.html

Risk register

What it shows. The unified register — every finding from every connected tool, normalised to URIP's 0-10 score, enriched with EPSS / KEV / MITRE / OTX intelligence, and bucketed by status (Open, Triaged, In Progress, Accepted, Closed).

What you do here. Filter, search, bulk-assign, push to Jira / ServiceNow, accept-with-justification, or close with evidence.

Risk quantification (FAIR)

URL: /risk-quantification.html

Risk quantification

What it shows. Financial impact of every risk using the FAIR (Factor Analysis of Information Risk) model. Annualised loss expectancy ranges, Monte-Carlo distributions, and the cost-vs-fix-effort matrix that justifies tooling spend to the board.

What you do here. Pick the top 5 risks by ALE, model what mitigations would do to the loss-curve, screenshot for the budget meeting.

Attack path

URL: /attack-path.html

Attack path

What it shows. Graph view linking each finding to the assets it touches and the assets those assets connect to — visualising how an attacker would chain low-severity findings into a high-impact compromise. Color-coded by MITRE ATT&CK tactic.

What you do here. Find the choke points — fix the one node that breaks the most paths.

Remediation tracker

URL: /remediation-tracker.html

Remediation tracker

What it shows. Every fix in flight — owner, due date, ticket link (Jira / ServiceNow / GitHub), SLA status (on-track / at-risk / breached), evidence required for closure.

What you do here. Stand-up driver. Filter to your team → see who's overdue → nudge.

Risk acceptance workflow

URL: /acceptance-workflow.html

Acceptance workflow

What it shows. Formal approval queue for risks the business decides to accept rather than fix. Captures justification, owner, expiry date, and approver chain — all stamped into the audit log.

What you do here. Submit an acceptance, escalate for sign-off, set the auto-review date.

Reports

URL: /reports.html

Reports

What it shows. Pre-built and scheduled reports — board pack (PDF), audit evidence pack (ZIP), monthly KEV exposure, SLA-breach summary, vendor risk roll-up.

What you do here. Trigger ad-hoc, schedule recurring, or download the most recent run.

Threat map

URL: /threat-map.html

Threat map

What it shows. Geographic heat map of threat-actor activity hitting your perimeter — sourced from AlienVault OTX, MITRE ATT&CK groups, and your own SIEM signal.

What you do here. See where the noise is loudest today; correlate with travel-risk advisories or country-of-origin policies.


4. Strategic modules

Optional modules — license per module. Visible only if your tenant has subscribed.

CSPM dashboard

URL: /cspm-dashboard.html

CSPM dashboard

What it shows. Cloud Security Posture Management — misconfigurations across AWS, Azure, GCP, Oracle Cloud. Counts by provider, by control framework (CIS, NIST, PCI), by severity.

CSPM findings

URL: /cspm-findings.html

CSPM findings

What it shows. Detailed table of every misconfiguration, with the exact resource ARN / resource ID, the failed control, and the cloud-native fix path.

DSPM dashboard

URL: /dspm-dashboard.html

DSPM dashboard

What it shows. Data Security Posture — sensitive data inventory by classification (PII, PHI, PCI), by location (S3, GCS, Snowflake, Postgres), and over-permissioned data shares.

AI Security dashboard

URL: /ai-security-dashboard.html

AI Security dashboard

What it shows. Visibility into LLM and ML risk — shadow-AI usage discovered via egress logs, sanctioned-AI inventory, prompt-injection attempts, model-supply-chain warnings.

ZTNA dashboard

URL: /ztna-dashboard.html

ZTNA dashboard

What it shows. Zero Trust Network Access — sessions, policy decisions, denied attempts, device-posture gates. Pulls from Zscaler, Netskope, Cloudflare ZT, Palo Alto Prisma Access.


5. Domain rollups

URIP groups risk by eight domains (Endpoint, Identity, Network, Cloud, Email, Mobile, OT, External Threat) plus Compliance Summary and Workflow. Every domain rollup follows the same pattern: which connectors feed it, the rolled-up risk score, and the open / closed split. Two representatives below — the rest follow the same template.

Endpoint domain (representative)

URL: /domain-endpoint.html

Endpoint domain

What it shows. Every endpoint signal in one place — EDR alerts (CrowdStrike, SentinelOne, Defender, Sophos), patch posture, MDM compliance, encryption coverage.

What you do here. Pick the row that's bleeding the most → drill into the asset → close.

Cloud domain (representative)

URL: /domain-cloud.html

Cloud domain

What it shows. All cloud signal — IAM drift, public-bucket exposure, misconfigured services, runtime threats. Aggregates from CSPM + your IaaS connectors.

The other eight rollups (Identity / Network / Email / Mobile / OT / External Threat / Compliance Summary / Workflow) follow this same layout.


6. Assets, connectors, admin

Asset inventory

URL: /asset-inventory.html

Asset inventory

What it shows. Single source of truth for every asset URIP knows about — endpoints, identities, cloud resources, applications. Each row shows the asset's risk score, the connectors that report on it, and the open findings.

What you do here. Tag tier (T0 / T1 / T2), assign business owner, view all findings on one asset.

Tool catalog

URL: /tool-catalog.html

Tool catalog

What it shows. Every supported integration (61 tools) grouped by category — EDR, VM, Cloud, Identity, SIEM, ZTNA, Email, Mobile, Backup, OT, etc. Each card shows the tool's logo, the categories it covers, and a Configure button.

What you do here. Pick the tool you own → click Configure → the wizard takes over.

Connector wizard

URL: /connector-wizard.html

Connector wizard

What it shows. Step-by-step setup form — credentials (API token / OAuth / service account), tenant URL, tag mapping, polling frequency. Validates the credential before saving.

What you do here. Paste your API token → click Test connection → on green, click Save. URIP then performs the first poll within 5 minutes.

Tool registration — what the right-side panel asks you for

When you click any tool in the catalogue, a slide-in panel opens with the exact inputs URIP needs for that vendor:

Tool registration panel

What the panel always shows: - License tier / admin role required — confirm your account on the vendor side meets the minimum (e.g. Burp Enterprise → Administrator / CrowdStrike → Falcon API client). - Network requirements — egress rules URIP needs (typical: HTTPS 443 to the vendor's tenant URL). - Step-by-step setup(1) create the API user / OAuth app on the vendor side, (2) capture the API key + base URL — note the warning: "Both values are shown ONCE", (3) paste them into URIP, (4) click Test Connection → on green, Save & Enable. - Required scopes / permissions — the exact OAuth scopes or API roles URIP requests (linked to the vendor's docs). - Sample data — a real-world example finding so you can see what URIP will pull before you commit credentials. - Footer buttonsTest Connection (read-only probe, doesn't write anything to your tenant) and Save & Enable (only enabled after a green test).

The panel is the same shape for every tool — only the field names change (e.g. CrowdStrike asks for Client ID + Secret + Cloud region; Tenable asks for Access Key + Secret Key + Site URL; AWS asks for Role ARN + External ID).

Connector status

URL: /connector-status.html

Connector status

What it shows. Health of every wired connector — last successful poll, next scheduled poll, finding count last 24 h, error count last 24 h, average rate-limit headroom.

What you do here. Spot the red row → click → see the error message and the fix path. Rotate credentials here on credential expiry.

Admin overview

URL: /admin-modules.html

Admin modules

What it shows. (Super-admin only) Module licence status — which modules (CSPM, DSPM, AI Sec, ZTNA, Attack Path, Risk Quant, VAPT, Compliance) are enabled for this tenant, expiry dates, seat counts. Risk-scoring weight tuning, multi-tenant management, and VAPT inbox triage live in adjacent admin tabs (/admin-scoring, /admin-tenants, /admin-vapt).

VAPT submissions inbox

URL: /admin-vapt.html

Admin VAPT

What it shows. Inbox of pen-test vendor submissions — accept into the Risk Register, reject with reason, or request more detail from the vendor. Vendors submit through their own portal at /vapt-portal-dashboard (separate sign-in).


7. Compliance suite

URIP's compliance dashboard sits inside the same shell as the risk pages — no second login, same data. Twenty pre-built frameworks; one URIP control library mapped to all of them. External-auditor workflows (invitations, scoped portal, evidence sign-off) are documented in the dedicated Auditor Portal Guide.

Frameworks

URL: /compliance-frameworks.html

Compliance frameworks

What it shows. Activated frameworks (SOC 2, ISO 27001, PCI DSS 4.0, HIPAA, NIST CSF 2.0, etc.) with current grade (A / B / C / D / F), control coverage percentage, and next audit date.

What you do here. Activate or deactivate frameworks, drill into any framework to see its controls.

Controls

URL: /compliance-controls.html

Compliance controls

What it shows. Every control across every active framework — pass / fail / partial, last test date, evidence count, owner. Filter by framework, family, owner, or status.

Policies

URL: /compliance-policies.html

Compliance policies

What it shows. Policy library — every written policy mapped to the controls it satisfies. Versioned, with attestation tracking (who's read, who's signed, who's overdue).

Evidence library

URL: /compliance-evidence.html

Compliance evidence

What it shows. All evidence files (PDF, screenshots, exports) with the controls they satisfy, expiry dates (auto-prompts re-collection), and provenance (uploaded by, source connector).

Evidence requests (auditor inbox)

URL: /compliance-evidence-requests.html

Compliance evidence requests

What it shows. Auditor inbox — every request from your external auditor, the status (open / in-progress / answered / accepted), the response thread, and the evidence files attached.

What you do here. Reply to auditor → attach evidence → mark resolved → auditor accepts.

Vendor risk

URL: /compliance-vendors.html

Compliance vendors

What it shows. Vendor / third-party risk register — each vendor's risk tier, SOC 2 / ISO certification status, contract expiry, recent security questionnaire scores.

Compliance reports

URL: /compliance-reports.html

Compliance reports

What it shows. Pre-built compliance reports — gap analysis, evidence pack export, audit-ready package per framework, board-level compliance summary.


End-to-end demo path

If you have 10 minutes and want to see URIP working, walk this sequence:

  1. Login → email + password + MFA
  2. Dashboard — read the four KPI tiles, hover the heat map, click "Critical: 38"
  3. Risk Register opens filtered to critical — pick the top row
  4. Risk detail → see the connector source, EPSS / KEV badges, affected assets, suggested fix
  5. Click Push to Jira — ticket created, watch Remediation Tracker light up
  6. Compliance Frameworks → SOC 2 grade, click any failing control
  7. Control detail → see the evidence behind the pass/fail and the linked risk
  8. Reports → trigger a Board Pack PDF
  9. Audit Log — verify every action you just took is signed and chained

That's the entire URIP loop in 10 minutes. Everything else in this document is depth on each step.