Profile & Preferences
Update your display name, personal credentials, and account session controls.
Configure platform, AI, security, organization, and developer preferences.
Update your display name, personal credentials, and account session controls.
Register a passkey to use as an alternate MFA method during login.
| Name | Created | Last Used | Transports | Actions |
|---|
Manage tenant branding, compliance modules, and organization-wide operational preferences.
PNG or JPG. Max 2MB.
Directory integration is coming soon. This link will be used once the directory page is live.
Admin control. When enabled, users can use microphone dictation in AI chat. Terms and Privacy Policy prohibit entering student data, employee data, or any other regulated data.
Enable this if your company manages security for other organizations. Your MSP branding will appear alongside your client's branding on reports.
This is your MSP company info. The organization details above represent your client. Both will appear on report cover pages.
PNG or JPG. Max 2MB.
Enable or disable compliance modules for your organization. Disabling a framework hides it from navigation, the compliance hub, reports, and the dashboard. Your data is never deleted — re-enabling restores everything.
Choose a curated preset first, then expand the advanced controls only if you need section-by-section branding overrides.
Configure AI providers, search APIs, email delivery, and platform integration endpoints.
Deploy a network vulnerability scanner at your client site. Native options use nmap + Nuclei; Docker adds full OpenVAS scanning.
Greenbone's container registry (registry.community.greenbone.net) experiences periodic availability issues — a known infrastructure limitation of the open-source project.
If image pulls fail with a 502 Bad Gateway error, use the included docker-compose.fallback.yml option. Once deployed successfully, cache your images locally to avoid future interruptions.
Scanner version: —
Configure connections to external platforms. Each integration has its own dedicated settings page.
Govern the prompts, models, and generation settings used across AI-assisted workflows. Changes apply as features are wired into the shared prompt manager.
This replaces the old flat prompt textarea. Edit prompts per workflow, reset them to defaults, and control model settings in one place. The attestation content generator already uses these saved settings.
Recommended practice: keep system prompts authoritative and conservative. Use user prompt templates only for structured variable insertion, not for hidden business logic.
Invite users, manage roles, and review access state for this organization.
| Name | Role | Status | MFA | Actions |
|---|
| Timestamp | User | Action | Resource | Changes |
|---|
CrossWalker detects overlapping compliance requirements across frameworks and generates reviewable suggestions. Finalized assessment items in one framework can pre-fill related controls in other frameworks.
Scan all finalized assessment items across all frameworks and generate crosswalk suggestions. Useful for initial onboarding, bulk imports, or after enabling new frameworks. Rate-limited to once per hour.
| Date | Type | Status | Suggestions | Mappings Checked |
|---|
Trigger: CrossWalker runs automatically when you finalize an assessment item (mark it as "Final" with attestation). It does NOT run on drafts, autosaves, or AI-generated content.
Suggestions: Generated suggestions appear in the Compliance Hub for review. They are never auto-applied — a human must accept or reject each one.
Provenance: Every suggestion includes a full audit trail showing the source data, who attested it, when, and the confidence score.
Manual control changes: Direct updates to control statuses (outside the assessment workflow) are intentionally excluded from crosswalking because they lack the evidence trail and attestation that make suggestions defensible.
These tools are only visible in development mode (localhost).
Delete module data for the current organization. Grouped by top-level app modules. Use with caution.
Threat intelligence search provider settings. Navigate to the News page to access run/debug actions.
Experimental and in-development compliance modules.