Profiles

Overview

A profile defines what your sensor looks like to attackers on the internet. When you assign a profile to a sensor, that sensor begins emulating a specific device, application, or service, such as a Cisco firewall, a Palo Alto login page, or a vulnerable Redis server.

  • Access a library of 200+ pre-built device profiles (e.g., Cisco, Palo Alto, Fortinet, SharePoint, WordPress, Redis)
  • Profiles support multiple interaction levels:
    • Low interaction: Fingerprinting and scan detection
    • Medium interaction: Functional device emulation
    • High interaction: Full vulnerability emulation with exploit capture
  • Switch profiles quickly via the web interface
  • Create custom profiles by:
    • Connecting real hardware devices via Raspberry Pi
    • Uploading OVAs

What’s Next

Visit the Profile Library & Setup page