Configuring Alerts in Saner for Effective Monitoring

Modified on Sun, 16 Mar at 11:39 AM

Overview 

Saner enables you to set up alerts to stay informed about key events across your organization. By selecting the relevant organization and associated account, you can configure alerts for specific modules, including: 

  • Vulnerability Management 
  • Patch Management 
  • Asset Exposure 
  • Compliance Management 
  • Endpoint Management 
  • Device Management 
  • Posture Anomaly 
  • Risk Prioritization 

By setting up alerts, you ensure continuous monitoring, quick responses, and effective management of your organization's security posture. 

. 

Part 1: Configure your mail settings before you enable the alerts 

Step 1: Access Control Panel from right corner of the SanerNow 

  1. Open the Control Panel. 

  1. From the dropdown menu on the left, select your organization. 
    A screenshot of a computer 
Description automatically generated 

 

Step 2: Navigate to Mail Settings 

  1. Under the Settings section, click Mail. 

  1. Select New Mail Settings to begin configuration. 
    A screenshot of a computer 
Description automatically generated 

 

 

 

 

 

 

Step 3: Enter Mail Details 
                 Refer to the provided screenshot for the required mail server details. 
                 A screenshot of a computer screen 
Description automatically generated                 
Note 
If you use an Office 365 email address for OAuth authentication, use the details below. Ensure you whitelist the email address in the Office 365 admin portal so that it works seamlessly with OAuth. 
SMTP Host: smtp.office365.com 
SMTP Port: 587 
SSL Trust: STARTTLS 
 
If you use a Gmail email address for OAuth authentication, use the details below. 
SMTP Host: smtp.gmail.com 
SMTP Port: 587 
SSL Trust: STARTTLS 

 
Step 4: Test Mail Settings 

  1. Click Test Mail to validate the configuration. 

  1. Upon successful testing, you will receive a confirmation notification on the same page. 
    A screenshot of a computer 

Step 5: Save Settings 

  1. Click the Create button to save the configured mail settings. 

 

Part 2:  
Guide to Configuring Alerts in Saner 

Follow the steps below to configure alerts for various modules in Saner 
 
General Steps 

  1. Select the Organization Account and click on ‘Alerts’ in the left panel. 

  1. Choose the module you have subscribed to and proceed with the module-specific configuration steps below. 


Module-Specific Alert Configurations 

1.Asset Exposure 

  • Enable the Subscription Status. 
  • Assign the ‘Send to E-mail’ field. 
  • Select the Conditions to define when an alert is triggered: 
  • Software License Violation 

  • Rarely-used Assets 

  • Outdated Applications 

  • New Devices 

  • New Assets 

  • Blacklisted Assets 

  • Click ‘Update’ to save changes. 
     

Shape 

2.Continuous Posture Anomaly Management 

  • Repeat steps 1 and 2 from Asset Exposure. 
  • Choose your anomaly detection settings: 
  • Enable All Anomalies Detection to be notified for all anomalies. 

  • For custom alerts, enter PA-IDs under Custom Detects. 

  • Under Custom Detection Rules, configure: 
  • Notifications for all queries or specific detection rules (comma-separated). 

  • Specify Response Types: 
  • All actions 

  • All successful actions 

  • All failure actions 

  • Custom Response: Add comma-separated custom values. 

  • Click ‘Update’ to save changes. 
    A screenshot of a computer 
Description automatically generated 

Shape 

3.Vulnerability Management 

  • Repeat steps 1 and 2 from Asset Exposure. 
  • Select the Conditions to define when an alert is triggered: 
  • All vulnerabilities 

  • Critical vulnerabilities 

  • High and Critical vulnerabilities 

  • Medium, High, and Critical vulnerabilities 

  • High Fidelity Attack Vulnerabilities 

  • Custom Conditions: Add comma-separated custom CVEs. 

  • Click ‘Update’ to save changes. 

A screenshot of a computer 
Description automatically generated 

Shape 

4.Compliance Management 

  • Repeat steps 1 and 2 from Asset Exposure. 
  • Select the Conditions to define when an alert is triggered: 
  • All compliance checks 

  • Custom Conditions: Add comma-separated custom CCEs. 

  • Click ‘Update’ to save changes. 

A screenshot of a computer 
Description automatically generated 

Shape 

5. Risk Prioritization 

  • Repeat steps 1 and 2 from Asset Exposure. 
  • Enable the Detection Checkbox to get notifications for: 
  • All: It Includes Act, Attent. Track and Track* 

  • Under Software Assets select the required software types. 
  • All Software assets 

  • Critical Software assets. 

  • Click ‘Update’ to save changes. 

A screenshot of a computer 
Description automatically generated 

Shape 
6.Patch Management 

  • Repeat steps 1 and 2 from Asset Exposure. 
  • Enable the Detection Checkbox to get notifications for: 
  • All Missing Patches 

  • Critical Missing Patches 

  • Important and Critical Patches 

  • Custom Detection 

  • Under Response, choose: 
  • Notifications for all queries or specific detection rules (comma-separated). 

  • Response types: All actions, All successful actions, All failure actions, or Custom Response. 

  • For Custom Response, add comma-separated custom values. 

  • Click ‘Update’ to save changes. 

A screenshot of a computer 
Description automatically generated 

Shape 

7.Endpoint Management 

  • Repeat steps 1 and 2 from Asset Exposure. 
  • Enable the Query Detection Checkbox to get notifications for: 
  • All queries 

  • Custom Query Detection: Enter comma-separated values. 

  • Under Response, choose: 
  • All actions 

  • All successful actions 

  • All failure actions 

  • Custom Response: Add comma-separated custom values. 

  • Click ‘Update’ to save changes. 

A screenshot of a computer 
Description automatically generated 

Shape 

8.Device Management 

  • Repeat steps 1 and 2 from Asset Exposure. 
  • Select the Conditions to define when an alert is triggered: 
  • Uninstall Agent 

  • Scan Finish 

  • Newly Added Devices 

  • Inactive Devices 

  • Click ‘Update’ to save changes. 

A screenshot of a computer 
Description automatically generated 

Conclusion 

By following these steps, you can customize alerts in Saner to ensure you stay informed about important events and maintain control over your organization's security and compliance. Configuring alerts empowers you to respond proactively to anomalies, vulnerabilities, and other critical actions 

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article