# Monitoring Systems

### **Rule Profile**

Offers the <mark style="color:green;">ability to customize rules according to the specific needs of the company using the service.</mark> This customization ensures that the rule is aligned with the operational and security requirements of the organization.

<figure><img src="https://2621223932-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FLTQJomzpe5BTzHSLQPAt%2Fuploads%2FavYp5mSpIMIMC34gJJM5%2FScreenshot%202023-12-30%20at%2013.45.57.png?alt=media&#x26;token=3fa938c3-1d9e-4e6a-af57-b4b48284f412" alt="" width="375"><figcaption><p>Rule Profile Management</p></figcaption></figure>

***

### **Documentation**

**Description**: <mark style="color:green;">specific details of the applicability of the correlation rule.</mark>

**CVSS (Common Vulnerability Scoring System):** an open standard for assessing the severity of security vulnerabilities in information systems. <mark style="color:green;">It provides a numerical score that reflects the severity of the vulnerability based on various criteria, such as impact and ease of exploitation.</mark> Integrating CVSS into monitoring systems helps prioritize responses to potential threats.

<figure><img src="https://2621223932-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FLTQJomzpe5BTzHSLQPAt%2Fuploads%2FwIQgj2po172unjCVSTKf%2FScreenshot%202023-12-30%20at%2013.46.13.png?alt=media&#x26;token=df1f32cb-ba03-4ea8-9631-297b4aa3592e" alt=""><figcaption><p>Documentation Stage</p></figcaption></figure>

***

### Monitoring System Profiles

<mark style="color:green;">It is possible to create specific monitoring system profiles</mark> that can later be used to configure the details of each client company.

<figure><img src="https://2621223932-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FLTQJomzpe5BTzHSLQPAt%2Fuploads%2FHQcQXtv8Xpk3xq5gxEWc%2FScreenshot%202023-12-30%20at%2013.47.11.png?alt=media&#x26;token=fc144a0f-2c61-474d-918e-829a52a53d4e" alt="" width="375"><figcaption><p>Monitoring System Profile Management</p></figcaption></figure>

***

**Vendors**

<mark style="color:green;">Documents all the details of the SIEM correlation rules from different suppliers.</mark> The configuration for each SIEM vendor is done in such a way as to directly reflect the internal configurations of the SIEM. This allows for precise and effective integration between the monitoring system and the specific solutions of each vendor.

<figure><img src="https://2621223932-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FLTQJomzpe5BTzHSLQPAt%2Fuploads%2Fk8HM9y40f0EquS3ztjK5%2FScreenshot%202023-12-30%20at%2013.50.38.png?alt=media&#x26;token=8722c6a5-e02c-45cd-af01-84580f0715cc" alt=""><figcaption><p>Vendors Stage</p></figcaption></figure>

***
