Configure Rule-based Alerts
You can set up rules to alert you, keep you aware of certificate or TLS-related vulnerabilities, and allow quick remediation. Instead of actively monitoring the system, these alerts ask for attention and intervention only when necessary and make you aware of changes or significant findings as soon as the rules are met.
For example, you can set up alerts for
- Certificates expiring in 30/60/90 days
- Self-signed certificates
- Certificates from unapproved CAs
- Certificate instances with low grades
- Certificates with weak key lengths or hashing algorithms
Set up Rule-based Alerts
Specify a significant finding or event and the preferred alert mechanism.
Step 1 - Define actions that the rule must take in response to the alert
Step 2 - Set up your rules in the Rule Manager tab
Step 3 - Monitor all the alerts that were sent after the rules were triggered
You are all set to start being alerted about your certificate findings!