- Knowledge base
- Continuous monitoring
- Monitoring profiles
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
How do I create a monitoring profile?
A monitoring profile allows the user to monitor changes and vulnerabilities in relation to previous scans. Please follow these instructions to set up a monitoring profile.
- Log in to Security Center.
- Click Continuous Monitoring > Monitoring profiles.
- Click +Create monitoring profile.
- Under the headline General information enter the following:
- Name: the name of the profile, e.g. "New high and critical vulnerabilities".
- Owner: select the owner of the profile.
- Under the headline Source:
- Select source under the headline Source.
- Under the headline Triggers:
- Select events under the headline Events.
- Select vulnerabilities under the headline Vulnerabilities. To monitor new vulnerabilities, check New and severity levels, e.g. "High" and "Critical".
- By checking Holds personal data under GDPR compliance, the profile will trigger alerts on all assets flagged as Personal data holders.
- Under the headline Alert notifications, configure the notifications you wish to use for the profile.
- Click OK.
- Done!