Profiles
Overview
A profile defines what your sensor looks like to attackers on the internet. When you assign a profile to a sensor, that sensor begins emulating a specific device, application, or service, such as a Cisco firewall, a Palo Alto login page, or a vulnerable Redis server.
- Access a library of 200+ pre-built device profiles (e.g., Cisco, Palo Alto, Fortinet, SharePoint, WordPress, Redis)
- Profiles support multiple interaction levels:
- Low interaction: Fingerprinting and scan detection
- Medium interaction: Functional device emulation
- High interaction: Full vulnerability emulation with exploit capture
- Switch profiles quickly via the web interface
- Create custom profiles by:
- Connecting real hardware devices via Raspberry Pi
- Uploading OVAs
Updated about 2 hours ago
