[{"data":1,"prerenderedAt":1461},["ShallowReactive",2],{"navigation":3,"/en/hotspot/introduction":411,"/en/hotspot/introduction-surround":610},[4,218],{"title":5,"_path":6,"children":7},"En","/en",[8,29,35,67,77,87,105,130,148,155,162,178,190],{"title":9,"_path":10,"children":11},"Getting Started","/en/getting-started",[12,14,17,20,23,26],{"title":13,"_path":10},"Introduction",{"title":15,"_path":16},"Quick Start","/en/getting-started/quickstart",{"title":18,"_path":19},"Installation on Docker Standalone","/en/getting-started/dockerstandalone",{"title":21,"_path":22},"Installation on Docker Swarm","/en/getting-started/dockerswarm",{"title":24,"_path":25},"Installation on Windows","/en/getting-started/windows",{"title":27,"_path":28},"Installation on Linux","/en/getting-started/linux",{"title":30,"_path":31,"children":32},"Dashboard","/en/dashboard",[33],{"title":30,"_path":34},"/en/dashboard/dashboard",{"title":36,"_path":37,"children":38},"Datacollector","/en/datacollector",[39,42,45],{"title":40,"_path":41},"Data View","/en/datacollector/view",{"title":43,"_path":44},"Management","/en/datacollector/management",{"title":46,"_path":47,"children":48},"Vendors","/en/datacollector/vendors",[49,52,55,58,61,64],{"title":50,"_path":51},"Default Syslog Configuration","/en/datacollector/vendors/default",{"title":53,"_path":54},"FortiGate Syslog Configuration","/en/datacollector/vendors/fortigate-syslog",{"title":56,"_path":57},"Palo Alto Syslog Configuration","/en/datacollector/vendors/palo-alto-syslog",{"title":59,"_path":60},"Ruijie Syslog Configuration","/en/datacollector/vendors/ruijie-syslog",{"title":62,"_path":63},"Sophos Syslog Configuration","/en/datacollector/vendors/sophos-syslog",{"title":65,"_path":66},"SonicWall Syslog Configuration","/en/datacollector/vendors/sonicwall-syslog",{"title":68,"_path":69,"children":70},"Reports","/en/reports",[71,74],{"title":72,"_path":73},"Reports Views","/en/reports/view",{"title":75,"_path":76},"Scheduled Reports","/en/reports/scheduled-reports",{"title":78,"_path":79,"children":80},"Alert","/en/alert",[81,84],{"title":82,"_path":83},"Rule Management","/en/alert/rule-management",{"title":85,"_path":86},"Notification Policy","/en/alert/notification-policy",{"title":88,"_path":89,"children":90},"Hotspot","/en/hotspot",[91,93,96,99,102],{"title":13,"_path":92},"/en/hotspot/introduction",{"title":94,"_path":95},"Location","/en/hotspot/locations",{"title":97,"_path":98},"Templates","/en/hotspot/templates",{"title":100,"_path":101},"User Activity","/en/hotspot/user-stats",{"title":103,"_path":104},"Black & White List","/en/hotspot/bw-list",{"title":106,"_path":107,"children":108},"Integrations","/en/integrations",[109,112,115,118,121,124,127],{"title":110,"_path":111},"SMTP Server","/en/integrations/smtp",{"title":113,"_path":114},"SMS Provider","/en/integrations/sms",{"title":116,"_path":117},"PMS Integration","/en/integrations/pms",{"title":119,"_path":120},"LDAP Integration","/en/integrations/ldap",{"title":122,"_path":123},"API Integration","/en/integrations/api",{"title":125,"_path":126},"NTP Server Integration","/en/integrations/ntp",{"title":128,"_path":129},"Timestamp Server Integration","/en/integrations/time-stamp-server",{"title":43,"_path":131,"children":132},"/en/management",[133,136,139,142,145],{"title":134,"_path":135},"Data Management","/en/management/data-management",{"title":137,"_path":138},"Contact Management","/en/management/contact-management",{"title":140,"_path":141},"Object Management","/en/management/object",{"title":143,"_path":144},"Command Line Interface","/en/management/command-line-interface",{"title":146,"_path":147},"Disk Capacity Planning Formula","/en/management/disk-management",{"title":149,"_path":150,"children":151},"License","/en/license",[152],{"title":153,"_path":154},"License & Agents","/en/license/license",{"title":156,"_path":157,"children":158},"User Authentication","/en/user-authentication",[159],{"title":160,"_path":161},"User & Authentication ","/en/user-authentication/user-authentication",{"title":163,"_path":164,"children":165},"System","/en/system",[166,169,172,175],{"title":167,"_path":168},"Administrator Management","/en/system/administrator",{"title":170,"_path":171},"Feature Visibility","/en/system/features-visibility",{"title":173,"_path":174},"Update","/en/system/update",{"title":176,"_path":177},"System Settings","/en/system/settings",{"title":179,"_path":180,"children":181},"Practice","/en/practice",[182,185,187],{"title":183,"_path":184},"Top Bantwidth Usage","/en/practice/topbantwidthusage",{"title":183,"_path":186},"/en/practice/most-visited-websites",{"title":188,"_path":189},"Inspect Blocked Traffic","/en/practice/inspect-blocked-traffic",{"title":191,"_path":192,"children":193},"Blog","/en/blog",[194,197,200,203,206,209,212,215],{"title":195,"_path":196},"Load Balance Configuration with Docker Swarm","/en/blog/load-balance-config",{"title":198,"_path":199},"Getting Started with the AI Module","/en/blog/ai-module",{"title":201,"_path":202},"How To Config Fortigate Syslog","/en/blog/how-to-config-fortigate-syslog",{"title":204,"_path":205},"How To Config Paloalto Syslog","/en/blog/how-to-config-paloalto-syslog",{"title":207,"_path":208},"How To Config Sophos Syslog","/en/blog/how-to-config-sophos-syslog",{"title":210,"_path":211},"Installing MinIO on Linux Server","/en/blog/minio-install",{"title":213,"_path":214},"Docker Desktop On Windows","/en/blog/docker-desktop-on-windows",{"title":216,"_path":217},"Installing Docker on Ubuntu Server","/en/blog/docker-on-ubuntu-server",{"title":219,"_path":220,"children":221},"Tr","/tr",[222,242,247,275,284,293,310,333,350,356,361,375,387],{"title":223,"_path":224,"children":225},"Giriş","/tr/getting-started",[226,227,230,233,236,239],{"title":223,"_path":224},{"title":228,"_path":229},"Hızlı Başlangıç","/tr/getting-started/quickstart",{"title":231,"_path":232},"Docker Standalone Üzerine Kurulum","/tr/getting-started/dockerstandalone",{"title":234,"_path":235},"Docker Swarm Üzerinde Kurulum","/tr/getting-started/dockerswarm",{"title":237,"_path":238},"Windows'ta Kurulum","/tr/getting-started/windows",{"title":240,"_path":241},"Linux'ta Kurulum","/tr/getting-started/linux",{"title":30,"_path":243,"children":244},"/tr/dashboard",[245],{"title":30,"_path":246},"/tr/dashboard/dashboard",{"title":36,"_path":248,"children":249},"/tr/datacollector",[250,252,254],{"title":40,"_path":251},"/tr/datacollector/view",{"title":43,"_path":253},"/tr/datacollector/management",{"title":46,"_path":255,"children":256},"/tr/datacollector/vendors",[257,260,263,266,269,272],{"title":258,"_path":259},"Varsayılan Syslog Yapılandırması","/tr/datacollector/vendors/default",{"title":261,"_path":262},"FortiGate Syslog Yapılandırması","/tr/datacollector/vendors/fortigate-syslog",{"title":264,"_path":265},"Palo Alto Syslog Yapılandırması","/tr/datacollector/vendors/palo-alto-syslog",{"title":267,"_path":268},"Ruijie Syslog Yapılandırması","/tr/datacollector/vendors/ruijie-syslog",{"title":270,"_path":271},"Sophos Syslog Yapılandırması","/tr/datacollector/vendors/sophos-syslog",{"title":273,"_path":274},"SonicWall Syslog Yapılandırması","/tr/datacollector/vendors/sonicwall-syslog",{"title":68,"_path":276,"children":277},"/tr/reports",[278,281],{"title":279,"_path":280},"Rapor Görünümleri","/tr/reports/view",{"title":282,"_path":283},"Planlanmış Raporlar","/tr/reports/scheduled-reports",{"title":78,"_path":285,"children":286},"/tr/alert",[287,290],{"title":288,"_path":289},"Kural Yönetimi","/tr/alert/rule-management",{"title":291,"_path":292},"Bildirim Politikası","/tr/alert/notification-policy",{"title":88,"_path":294,"children":295},"/tr/hotspot",[296,298,301,304,307],{"title":223,"_path":297},"/tr/hotspot/introduction",{"title":299,"_path":300},"Konum","/tr/hotspot/locations",{"title":302,"_path":303},"Şablonlar","/tr/hotspot/templates",{"title":305,"_path":306},"Kullanıcı Etkinliği","/tr/hotspot/user-stats",{"title":308,"_path":309},"Kara ve Beyaz Liste","/tr/hotspot/bw-list",{"title":106,"_path":311,"children":312},"/tr/integrations",[313,315,318,321,324,327,330],{"title":110,"_path":314},"/tr/integrations/smtp",{"title":316,"_path":317},"SMS Sağlayıcı","/tr/integrations/sms",{"title":319,"_path":320},"Pms","/tr/integrations/pms",{"title":322,"_path":323},"LDAP Entegrasyonu","/tr/integrations/ldap",{"title":325,"_path":326},"API Entegrasyonu","/tr/integrations/api",{"title":328,"_path":329},"NTP Sunucu Entegrasyonu","/tr/integrations/ntp",{"title":331,"_path":332},"Zaman Damgası Sunucusu Entegrasyonu","/tr/integrations/time-stamp-server",{"title":43,"_path":334,"children":335},"/tr/management",[336,339,342,345,347],{"title":337,"_path":338},"Veri Yönetimi","/tr/management/data-management",{"title":340,"_path":341},"İletişim Yönetimi","/tr/management/contact-management",{"title":343,"_path":344},"Nesne Yönetimi","/tr/management/object",{"title":143,"_path":346},"/tr/management/command-line-interface",{"title":348,"_path":349},"Disk Kapasite Planlama Formülü","/tr/management/disk-management",{"title":149,"_path":351,"children":352},"/tr/license",[353],{"title":354,"_path":355},"Lisans ve Ajanlar","/tr/license/license",{"title":156,"_path":357,"children":358},"/tr/user-authentication",[359],{"title":156,"_path":360},"/tr/user-authentication/user-authentication",{"title":163,"_path":362,"children":363},"/tr/system",[364,367,370,372],{"title":365,"_path":366},"Yönetici Yönetimi","/tr/system/administrator",{"title":368,"_path":369},"Özellik Görünürlüğü","/tr/system/features-visibility",{"title":173,"_path":371},"/tr/system/update",{"title":373,"_path":374},"Sistem Ayarları","/tr/system/settings",{"title":179,"_path":376,"children":377},"/tr/practice",[378,381,384],{"title":379,"_path":380},"En Yüksek Bandwidth Kullanımı","/tr/practice/topbantwidthusage",{"title":382,"_path":383},"Top Bandwidth Kullanımı","/tr/practice/most-visited-websites",{"title":385,"_path":386},"Engellenen Trafiği İncele","/tr/practice/inspect-blocked-traffic",{"title":191,"_path":388,"children":389},"/tr/blog",[390,393,396,398,400,402,405,408],{"title":391,"_path":392},"Docker Swarm ile Yük Deneleme Yapılandırması","/tr/blog/load-balance-config",{"title":394,"_path":395},"AI Modülü ile Başlarken","/tr/blog/ai-module",{"title":201,"_path":397},"/tr/blog/how-to-config-fortigate-syslog",{"title":204,"_path":399},"/tr/blog/how-to-config-paloalto-syslog",{"title":207,"_path":401},"/tr/blog/how-to-config-sophos-syslog",{"title":403,"_path":404},"Minio Install","/tr/blog/minio-install",{"title":406,"_path":407},"Windows'ta Docker Desktop","/tr/blog/docker-desktop-on-windows",{"title":409,"_path":410},"Ubuntu Server'da Docker Kurulumu","/tr/blog/docker-on-ubuntu-server",{"_path":92,"_dir":412,"_draft":413,"_partial":413,"_locale":414,"title":13,"description":415,"body":416,"_type":604,"_id":605,"_source":606,"_file":607,"_stem":608,"_extension":609},"hotspot",false,"","This section provides information on Hotspot service.",{"type":417,"children":418,"toc":602},"root",[419,424,596],{"type":420,"tag":421,"props":422,"children":423},"element","timeline",{},[],{"type":420,"tag":425,"props":426,"children":427},"prose-mermaid",{},[428],{"type":420,"tag":429,"props":430,"children":434},"pre",{"className":431,"code":432,"language":433,"meta":414,"style":414},"language-mermaid shiki shiki-themes material-theme-lighter material-theme material-theme-palenight","graph TD\n  %%  WD[Wireless Devices]\n  %%  WiD[Wired Devices]\n  %%  AP[AP]\n  %%  SW[Switch]\n  %%  FW[Firewall]\n  %%  LOG[Logger]\n  %%  HP[Hotspot Page]\n\n  %%  WD -.DHCP/DNS.-> AP\n    \n  %%  AP --> SW\n  %%  WiD -.DHCP/DNS.-> SW\n  %%  SW --> FW\n  %%  FW --Auth Link--> LOG\n  %%  LOG --Auth Link--> SW\n  %%  LOG --> HP\n","mermaid",[435],{"type":420,"tag":436,"props":437,"children":438},"code",{"__ignoreMap":414},[439,451,460,469,478,487,496,505,514,524,533,542,551,560,569,578,587],{"type":420,"tag":440,"props":441,"children":444},"span",{"class":442,"line":443},"line",1,[445],{"type":420,"tag":440,"props":446,"children":447},{},[448],{"type":449,"value":450},"text","graph TD\n",{"type":420,"tag":440,"props":452,"children":454},{"class":442,"line":453},2,[455],{"type":420,"tag":440,"props":456,"children":457},{},[458],{"type":449,"value":459},"  %%  WD[Wireless Devices]\n",{"type":420,"tag":440,"props":461,"children":463},{"class":442,"line":462},3,[464],{"type":420,"tag":440,"props":465,"children":466},{},[467],{"type":449,"value":468},"  %%  WiD[Wired Devices]\n",{"type":420,"tag":440,"props":470,"children":472},{"class":442,"line":471},4,[473],{"type":420,"tag":440,"props":474,"children":475},{},[476],{"type":449,"value":477},"  %%  AP[AP]\n",{"type":420,"tag":440,"props":479,"children":481},{"class":442,"line":480},5,[482],{"type":420,"tag":440,"props":483,"children":484},{},[485],{"type":449,"value":486},"  %%  SW[Switch]\n",{"type":420,"tag":440,"props":488,"children":490},{"class":442,"line":489},6,[491],{"type":420,"tag":440,"props":492,"children":493},{},[494],{"type":449,"value":495},"  %%  FW[Firewall]\n",{"type":420,"tag":440,"props":497,"children":499},{"class":442,"line":498},7,[500],{"type":420,"tag":440,"props":501,"children":502},{},[503],{"type":449,"value":504},"  %%  LOG[Logger]\n",{"type":420,"tag":440,"props":506,"children":508},{"class":442,"line":507},8,[509],{"type":420,"tag":440,"props":510,"children":511},{},[512],{"type":449,"value":513},"  %%  HP[Hotspot Page]\n",{"type":420,"tag":440,"props":515,"children":517},{"class":442,"line":516},9,[518],{"type":420,"tag":440,"props":519,"children":521},{"emptyLinePlaceholder":520},true,[522],{"type":449,"value":523},"\n",{"type":420,"tag":440,"props":525,"children":527},{"class":442,"line":526},10,[528],{"type":420,"tag":440,"props":529,"children":530},{},[531],{"type":449,"value":532},"  %%  WD -.DHCP/DNS.-> AP\n",{"type":420,"tag":440,"props":534,"children":536},{"class":442,"line":535},11,[537],{"type":420,"tag":440,"props":538,"children":539},{},[540],{"type":449,"value":541},"    \n",{"type":420,"tag":440,"props":543,"children":545},{"class":442,"line":544},12,[546],{"type":420,"tag":440,"props":547,"children":548},{},[549],{"type":449,"value":550},"  %%  AP --> SW\n",{"type":420,"tag":440,"props":552,"children":554},{"class":442,"line":553},13,[555],{"type":420,"tag":440,"props":556,"children":557},{},[558],{"type":449,"value":559},"  %%  WiD -.DHCP/DNS.-> SW\n",{"type":420,"tag":440,"props":561,"children":563},{"class":442,"line":562},14,[564],{"type":420,"tag":440,"props":565,"children":566},{},[567],{"type":449,"value":568},"  %%  SW --> FW\n",{"type":420,"tag":440,"props":570,"children":572},{"class":442,"line":571},15,[573],{"type":420,"tag":440,"props":574,"children":575},{},[576],{"type":449,"value":577},"  %%  FW --Auth Link--> LOG\n",{"type":420,"tag":440,"props":579,"children":581},{"class":442,"line":580},16,[582],{"type":420,"tag":440,"props":583,"children":584},{},[585],{"type":449,"value":586},"  %%  LOG --Auth Link--> SW\n",{"type":420,"tag":440,"props":588,"children":590},{"class":442,"line":589},17,[591],{"type":420,"tag":440,"props":592,"children":593},{},[594],{"type":449,"value":595},"  %%  LOG --> HP\n",{"type":420,"tag":597,"props":598,"children":599},"style",{},[600],{"type":449,"value":601},"html .light .shiki span {color: var(--shiki-light);background: var(--shiki-light-bg);font-style: var(--shiki-light-font-style);font-weight: var(--shiki-light-font-weight);text-decoration: var(--shiki-light-text-decoration);}html.light .shiki span {color: var(--shiki-light);background: var(--shiki-light-bg);font-style: var(--shiki-light-font-style);font-weight: var(--shiki-light-font-weight);text-decoration: var(--shiki-light-text-decoration);}html .default .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}html.dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}",{"title":414,"searchDepth":453,"depth":453,"links":603},[],"markdown","content:en:6.hotspot:1.introduction.md","content","en/6.hotspot/1.introduction.md","en/6.hotspot/1.introduction","md",[611,1449],{"_path":86,"_dir":612,"_draft":413,"_partial":413,"_locale":414,"title":85,"description":613,"body":614,"_type":604,"_id":1446,"_source":606,"_file":1447,"_stem":1448,"_extension":609},"alert","The Notification Policy module serves as the notification management layer of the alerting system. It routes security events received from alert rules to appropriate notification channels and delivers them to designated recipients. It provides support for intelligent routing, rate limiting, and multi-channel notifications.",{"type":417,"children":615,"toc":1416},[616,656,663,668,673,709,715,722,727,733,738,811,817,822,828,833,839,862,868,873,883,893,899,904,910,916,921,974,980,985,991,997,1020,1026,1031,1064,1070,1076,1081,1087,1092,1125,1131,1184],{"type":420,"tag":617,"props":618,"children":620},"callout",{"icon":619},"i-heroicons-exclamation-triangle",[621],{"type":420,"tag":622,"props":623,"children":624},"p",{},[625,627,631,633,642,644,647,648,654],{"type":449,"value":626},"The alert system works with SMTP or SMS system. To use the alert system, you must first configure your preferred system.",{"type":420,"tag":628,"props":629,"children":630},"br",{},[],{"type":449,"value":632},"\n👉 ",{"type":420,"tag":634,"props":635,"children":639},"a",{"href":636,"rel":637},"http://localhost:3000/en/integrations/smtp",[638],"nofollow",[640],{"type":449,"value":641},"SMTP Configuration",{"type":449,"value":643},"📩 ",{"type":420,"tag":628,"props":645,"children":646},{},[],{"type":449,"value":632},{"type":420,"tag":634,"props":649,"children":651},{"href":636,"rel":650},[638],[652],{"type":449,"value":653},"SMS Configuration",{"type":449,"value":655},"💬",{"type":420,"tag":657,"props":658,"children":660},"h2",{"id":659},"policy-management-architecture",[661],{"type":449,"value":662},"Policy Management Architecture 🏗",{"type":420,"tag":622,"props":664,"children":665},{},[666],{"type":449,"value":667},"The notification system adopts a policy-based routing approach. Each policy links specific alert rules to predefined recipient groups and communication channels. This design enables scalable notification management and centralized alert distribution.",{"type":420,"tag":622,"props":669,"children":670},{},[671],{"type":449,"value":672},"The policy engine operates through three core components:",{"type":420,"tag":674,"props":675,"children":676},"ul",{},[677,689,699],{"type":420,"tag":678,"props":679,"children":680},"li",{},[681,687],{"type":420,"tag":682,"props":683,"children":684},"strong",{},[685],{"type":449,"value":686},"Rule Association:",{"type":449,"value":688}," Defines which alert rules are bound to which policies.",{"type":420,"tag":678,"props":690,"children":691},{},[692,697],{"type":420,"tag":682,"props":693,"children":694},{},[695],{"type":449,"value":696},"Channel Configuration:",{"type":449,"value":698}," Enables multi-platform notification delivery mechanisms.",{"type":420,"tag":678,"props":700,"children":701},{},[702,707],{"type":420,"tag":682,"props":703,"children":704},{},[705],{"type":449,"value":706},"Recipient Management:",{"type":449,"value":708}," Manages target audience segmentation and delivery preferences.",{"type":420,"tag":657,"props":710,"children":712},{"id":711},"policy-types",[713],{"type":449,"value":714},"Policy Types 🎯",{"type":420,"tag":716,"props":717,"children":719},"h3",{"id":718},"custom-policies",[720],{"type":449,"value":721},"Custom Policies 🎨",{"type":420,"tag":622,"props":723,"children":724},{},[725],{"type":449,"value":726},"Custom policies are tailored for specific business requirements, enabling flexible notification logic. These policies support organization-specific workflows through flexible rule selection, conditional triggers, and custom recipient mapping.",{"type":420,"tag":716,"props":728,"children":730},{"id":729},"template-policies",[731],{"type":449,"value":732},"Template Policies 📌",{"type":420,"tag":622,"props":734,"children":735},{},[736],{"type":449,"value":737},"The template system provides pre-configured notification policies for common security scenarios. Policies are organized by category, allowing domain-specific notification templates:",{"type":420,"tag":674,"props":739,"children":740},{},[741,751,761,771,781,791,801],{"type":420,"tag":678,"props":742,"children":743},{},[744,749],{"type":420,"tag":682,"props":745,"children":746},{},[747],{"type":449,"value":748},"Authentication Security:",{"type":449,"value":750}," Notification patterns for identity-related security events.",{"type":420,"tag":678,"props":752,"children":753},{},[754,759],{"type":420,"tag":682,"props":755,"children":756},{},[757],{"type":449,"value":758},"Data Protection:",{"type":449,"value":760}," Specialized routing for data loss and unauthorized access incidents.",{"type":420,"tag":678,"props":762,"children":763},{},[764,769],{"type":420,"tag":682,"props":765,"children":766},{},[767],{"type":449,"value":768},"Executive Alerts:",{"type":449,"value":770}," Executive-level notifications for high-severity incidents.",{"type":420,"tag":678,"props":772,"children":773},{},[774,779],{"type":420,"tag":682,"props":775,"children":776},{},[777],{"type":449,"value":778},"Insider Threat Detection:",{"type":449,"value":780}," Targeted alerting for internal threat patterns.",{"type":420,"tag":678,"props":782,"children":783},{},[784,789],{"type":420,"tag":682,"props":785,"children":786},{},[787],{"type":449,"value":788},"Malware Defense:",{"type":449,"value":790}," Rapid response notifications for malware detection events.",{"type":420,"tag":678,"props":792,"children":793},{},[794,799],{"type":420,"tag":682,"props":795,"children":796},{},[797],{"type":449,"value":798},"Network Protection:",{"type":449,"value":800}," Infrastructure team notifications for network security incidents.",{"type":420,"tag":678,"props":802,"children":803},{},[804,809],{"type":420,"tag":682,"props":805,"children":806},{},[807],{"type":449,"value":808},"Web Application Security:",{"type":449,"value":810}," Development team alerting for application-layer attacks.",{"type":420,"tag":657,"props":812,"children":814},{"id":813},"alert-routing-engine",[815],{"type":449,"value":816},"Alert Routing Engine 🔧",{"type":420,"tag":622,"props":818,"children":819},{},[820],{"type":449,"value":821},"The policy engine performs intelligent alert routing based on multi-criteria evaluation:",{"type":420,"tag":716,"props":823,"children":825},{"id":824},"rule-association",[826],{"type":449,"value":827},"Rule Association 🤝🏼",{"type":420,"tag":622,"props":829,"children":830},{},[831],{"type":449,"value":832},"Policies consolidate multiple alert rules into a single notification stream. This ensures coordinated response to related security events and reduces notification noise.",{"type":420,"tag":716,"props":834,"children":836},{"id":835},"conditional-logic",[837],{"type":449,"value":838},"Conditional Logic 📑",{"type":420,"tag":674,"props":840,"children":841},{},[842,852],{"type":420,"tag":678,"props":843,"children":844},{},[845,850],{"type":420,"tag":682,"props":846,"children":847},{},[848],{"type":449,"value":849},"Min Score Filtering:",{"type":449,"value":851}," Policies define trigger conditions using a minimum risk score threshold, preventing unnecessary notifications for low-priority alerts.",{"type":420,"tag":678,"props":853,"children":854},{},[855,860],{"type":420,"tag":682,"props":856,"children":857},{},[858],{"type":449,"value":859},"Rate Limiting:",{"type":449,"value":861}," Configurable thresholds and time windows prevent notification flooding and maintain system stability during high-volume alert generation.",{"type":420,"tag":716,"props":863,"children":865},{"id":864},"multi-channel-notification",[866],{"type":449,"value":867},"Multi-Channel Notification 📢",{"type":420,"tag":622,"props":869,"children":870},{},[871],{"type":449,"value":872},"Supported Channels:",{"type":420,"tag":622,"props":874,"children":875},{},[876,881],{"type":420,"tag":682,"props":877,"children":878},{},[879],{"type":449,"value":880},"SMS:",{"type":449,"value":882}," GSM infrastructure integration for real-time mobile alerts",{"type":420,"tag":622,"props":884,"children":885},{},[886,891],{"type":420,"tag":682,"props":887,"children":888},{},[889],{"type":449,"value":890},"Email:",{"type":449,"value":892}," Rich alert details with attachment support",{"type":420,"tag":716,"props":894,"children":896},{"id":895},"channel-strategy",[897],{"type":449,"value":898},"Channel Strategy 📺",{"type":420,"tag":622,"props":900,"children":901},{},[902],{"type":449,"value":903},"The multi-channel strategy ensures delivery redundancy and recipient preference optimization. Critical alerts are delivered simultaneously across multiple channels, while routine notifications follow preferred channels.",{"type":420,"tag":657,"props":905,"children":907},{"id":906},"recipient-management",[908],{"type":449,"value":909},"Recipient Management 📥",{"type":420,"tag":716,"props":911,"children":913},{"id":912},"recipient-categories-️",[914],{"type":449,"value":915},"Recipient Categories 🏷️",{"type":420,"tag":622,"props":917,"children":918},{},[919],{"type":449,"value":920},"The system supports role-based recipient categorization, including:",{"type":420,"tag":674,"props":922,"children":923},{},[924,934,944,954,964],{"type":420,"tag":678,"props":925,"children":926},{},[927,932],{"type":420,"tag":682,"props":928,"children":929},{},[930],{"type":449,"value":931},"Security Operations:",{"type":449,"value":933}," SOC team members and security analysts",{"type":420,"tag":678,"props":935,"children":936},{},[937,942],{"type":420,"tag":682,"props":938,"children":939},{},[940],{"type":449,"value":941},"Identity Management:",{"type":449,"value":943}," Teams responsible for identity governance and access control",{"type":420,"tag":678,"props":945,"children":946},{},[947,952],{"type":420,"tag":682,"props":948,"children":949},{},[950],{"type":449,"value":951},"Application Security:",{"type":449,"value":953}," Developers and DevSecOps teams",{"type":420,"tag":678,"props":955,"children":956},{},[957,962],{"type":420,"tag":682,"props":958,"children":959},{},[960],{"type":449,"value":961},"Executive Level:",{"type":449,"value":963}," C-level executives and security leadership",{"type":420,"tag":678,"props":965,"children":966},{},[967,972],{"type":420,"tag":682,"props":968,"children":969},{},[970],{"type":449,"value":971},"Infrastructure Teams:",{"type":449,"value":973}," Network operations and system administrators",{"type":420,"tag":716,"props":975,"children":977},{"id":976},"dynamic-recipient-selection",[978],{"type":449,"value":979},"Dynamic Recipient Selection ☰",{"type":420,"tag":622,"props":981,"children":982},{},[983],{"type":449,"value":984},"The policy engine performs context-aware recipient selection, dynamically determining the appropriate recipients based on alert type, severity level, and business impact.",{"type":420,"tag":657,"props":986,"children":988},{"id":987},"policy-configuration-️",[989],{"type":449,"value":990},"Policy Configuration ⚙️",{"type":420,"tag":716,"props":992,"children":994},{"id":993},"rate-limiting-controls",[995],{"type":449,"value":996},"Rate Limiting Controls 🚧",{"type":420,"tag":674,"props":998,"children":999},{},[1000,1010],{"type":420,"tag":678,"props":1001,"children":1002},{},[1003,1008],{"type":420,"tag":682,"props":1004,"children":1005},{},[1006],{"type":449,"value":1007},"Threshold Configuration:",{"type":449,"value":1009}," Defines the maximum number of notifications within a specific time window.",{"type":420,"tag":678,"props":1011,"children":1012},{},[1013,1018],{"type":420,"tag":682,"props":1014,"children":1015},{},[1016],{"type":449,"value":1017},"Window Management:",{"type":449,"value":1019}," Prevents notification bursts through time-based rate limiting.",{"type":420,"tag":716,"props":1021,"children":1023},{"id":1022},"delivery-optimization-ᯓ",[1024],{"type":449,"value":1025},"Delivery Optimization ᯓ➤",{"type":420,"tag":622,"props":1027,"children":1028},{},[1029],{"type":449,"value":1030},"Policies optimize notification delivery through:",{"type":420,"tag":674,"props":1032,"children":1033},{},[1034,1044,1054],{"type":420,"tag":678,"props":1035,"children":1036},{},[1037,1042],{"type":420,"tag":682,"props":1038,"children":1039},{},[1040],{"type":449,"value":1041},"Priority-based Routing:",{"type":449,"value":1043}," Expedited delivery for high-severity alerts",{"type":420,"tag":678,"props":1045,"children":1046},{},[1047,1052],{"type":420,"tag":682,"props":1048,"children":1049},{},[1050],{"type":449,"value":1051},"Batch Processing:",{"type":449,"value":1053}," Efficient batch delivery for low-priority alerts",{"type":420,"tag":678,"props":1055,"children":1056},{},[1057,1062],{"type":420,"tag":682,"props":1058,"children":1059},{},[1060],{"type":449,"value":1061},"Delivery Confirmation:",{"type":449,"value":1063}," Acknowledgment requirements for critical notifications",{"type":420,"tag":657,"props":1065,"children":1067},{"id":1066},"integration-architecture",[1068],{"type":449,"value":1069},"Integration Architecture 🏗",{"type":420,"tag":716,"props":1071,"children":1073},{"id":1072},"alert-system-integration",[1074],{"type":449,"value":1075},"Alert System Integration❗",{"type":420,"tag":622,"props":1077,"children":1078},{},[1079],{"type":449,"value":1080},"Notification policies are tightly integrated with the alert rule engine. Triggering events automatically invoke policy evaluation and initiate the corresponding notification workflow.",{"type":420,"tag":716,"props":1082,"children":1084},{"id":1083},"external-system-integration",[1085],{"type":449,"value":1086},"External System Integration 🔌",{"type":420,"tag":622,"props":1088,"children":1089},{},[1090],{"type":449,"value":1091},"Native integration with communication platforms through:",{"type":420,"tag":674,"props":1093,"children":1094},{},[1095,1105,1115],{"type":420,"tag":678,"props":1096,"children":1097},{},[1098,1103],{"type":420,"tag":682,"props":1099,"children":1100},{},[1101],{"type":449,"value":1102},"Webhook Support:",{"type":449,"value":1104}," HTTP webhook delivery for custom integrations",{"type":420,"tag":678,"props":1106,"children":1107},{},[1108,1113],{"type":420,"tag":682,"props":1109,"children":1110},{},[1111],{"type":449,"value":1112},"API Connectivity:",{"type":449,"value":1114}," RESTful API integration with third-party systems",{"type":420,"tag":678,"props":1116,"children":1117},{},[1118,1123],{"type":420,"tag":682,"props":1119,"children":1120},{},[1121],{"type":449,"value":1122},"Message Formatting:",{"type":449,"value":1124}," Platform-specific message formatting for optimal delivery",{"type":420,"tag":657,"props":1126,"children":1128},{"id":1127},"use-cases-️",[1129],{"type":449,"value":1130},"Use Cases ✍️",{"type":420,"tag":674,"props":1132,"children":1133},{},[1134,1144,1154,1164,1174],{"type":420,"tag":678,"props":1135,"children":1136},{},[1137,1142],{"type":420,"tag":682,"props":1138,"children":1139},{},[1140],{"type":449,"value":1141},"Incident Response Automation:",{"type":449,"value":1143}," Rapid response team activation via automated notification cascades for critical events.",{"type":420,"tag":678,"props":1145,"children":1146},{},[1147,1152],{"type":420,"tag":682,"props":1148,"children":1149},{},[1150],{"type":449,"value":1151},"Compliance Reporting:",{"type":449,"value":1153}," Automated stakeholder notifications and audit trail generation for regulatory compliance.",{"type":420,"tag":678,"props":1155,"children":1156},{},[1157,1162],{"type":420,"tag":682,"props":1158,"children":1159},{},[1160],{"type":449,"value":1161},"Operational Monitoring:",{"type":449,"value":1163}," Proactive notifications for infrastructure and application health.",{"type":420,"tag":678,"props":1165,"children":1166},{},[1167,1172],{"type":420,"tag":682,"props":1168,"children":1169},{},[1170],{"type":449,"value":1171},"Executive Dashboards:",{"type":449,"value":1173}," Summarized alerts focused on high-level security posture for executive visibility.",{"type":420,"tag":678,"props":1175,"children":1176},{},[1177,1182],{"type":420,"tag":682,"props":1178,"children":1179},{},[1180],{"type":449,"value":1181},"Cross-Functional Coordination:",{"type":449,"value":1183}," Coordinated notifications to multiple departments for optimized organizational response to security events.",{"type":420,"tag":1185,"props":1186,"children":1190},"u-card",{"className":1187},[1188,1189],"mt-4:bg-gray-100","dark:bg-gray-800",[1191,1197,1210,1216,1221,1334,1344,1348,1354,1359],{"type":420,"tag":657,"props":1192,"children":1194},{"id":1193},"how-to-use",[1195],{"type":449,"value":1196},"How To Use ? 🤔",{"type":420,"tag":622,"props":1198,"children":1199},{},[1200,1202],{"type":449,"value":1201},"To create a rule on the Alert page, go to ",{"type":420,"tag":1203,"props":1204,"children":1207},"u-badge",{"color":1205,"variant":1206},"primary","soft",[1208],{"type":449,"value":1209},"Alert > Notification Policy",{"type":420,"tag":716,"props":1211,"children":1213},{"id":1212},"create-custom-policy",[1214],{"type":449,"value":1215},"Create Custom Policy",{"type":420,"tag":622,"props":1217,"children":1218},{},[1219],{"type":449,"value":1220},"Follow the steps below to create a custom rule;",{"type":420,"tag":674,"props":1222,"children":1223},{},[1224,1243,1262,1288,1307],{"type":420,"tag":678,"props":1225,"children":1226},{},[1227,1229,1234,1236,1241],{"type":449,"value":1228},"Go to ",{"type":420,"tag":1203,"props":1230,"children":1231},{"color":1205,"variant":1206},[1232],{"type":449,"value":1233},"Create New > Create Custom > Custom Rule",{"type":449,"value":1235}," and then click ",{"type":420,"tag":1203,"props":1237,"children":1238},{"color":1205,"variant":1206},[1239],{"type":449,"value":1240},"Add",{"type":449,"value":1242}," button.",{"type":420,"tag":678,"props":1244,"children":1245},{},[1246,1248,1253,1255,1260],{"type":449,"value":1247},"Write a ",{"type":420,"tag":1203,"props":1249,"children":1250},{"color":1205,"variant":1206},[1251],{"type":449,"value":1252},"Policy name",{"type":449,"value":1254}," and then select rule from ",{"type":420,"tag":1203,"props":1256,"children":1257},{"color":1205,"variant":1206},[1258],{"type":449,"value":1259},"Policy Rules",{"type":449,"value":1261}," menu.",{"type":420,"tag":678,"props":1263,"children":1264},{},[1265,1267,1272,1274,1279,1281,1286],{"type":449,"value":1266},"Enter the ",{"type":420,"tag":1203,"props":1268,"children":1269},{"color":1205,"variant":1206},[1270],{"type":449,"value":1271},"Threshold",{"type":449,"value":1273}," and ",{"type":420,"tag":1203,"props":1275,"children":1276},{"color":1205,"variant":1206},[1277],{"type":449,"value":1278},"Window",{"type":449,"value":1280}," values from the ",{"type":420,"tag":1203,"props":1282,"children":1283},{"color":1205,"variant":1206},[1284],{"type":449,"value":1285},"Rate Limit",{"type":449,"value":1287}," menu below.",{"type":420,"tag":678,"props":1289,"children":1290},{},[1291,1293,1298,1300,1305],{"type":449,"value":1292},"From the ",{"type":420,"tag":1203,"props":1294,"children":1295},{"color":1205,"variant":1206},[1296],{"type":449,"value":1297},"Conditions",{"type":449,"value":1299}," menu, select the ",{"type":420,"tag":1203,"props":1301,"children":1302},{"color":1205,"variant":1206},[1303],{"type":449,"value":1304},"score",{"type":449,"value":1306}," at which the Notification will be triggered.",{"type":420,"tag":678,"props":1308,"children":1309},{},[1310,1312,1317,1318,1323,1325,1329,1331],{"type":449,"value":1311},"Finally, enter ",{"type":420,"tag":1203,"props":1313,"children":1314},{"color":1205,"variant":1206},[1315],{"type":449,"value":1316},"Recipients",{"type":449,"value":1273},{"type":420,"tag":1203,"props":1319,"children":1320},{"color":1205,"variant":1206},[1321],{"type":449,"value":1322},"Channels",{"type":449,"value":1324}," to which the Notification will be sent. Click the ",{"type":420,"tag":1203,"props":1326,"children":1327},{"color":1205,"variant":1206},[1328],{"type":449,"value":1240},{"type":449,"value":1330}," button and save.\n   ",{"type":420,"tag":628,"props":1332,"children":1333},{},[],{"type":420,"tag":622,"props":1335,"children":1336},{},[1337,1342],{"type":420,"tag":682,"props":1338,"children":1339},{},[1340],{"type":449,"value":1341},"For Exemple:",{"type":449,"value":1343},"\nIn this example, when failed SSH attempts within 60 seconds are repeated 15 times within 1 hour and reach a score of 70, the SOC analyst team will be notified via sms.",{"type":420,"tag":1345,"props":1346,"children":1347},"siem-notification-builder",{},[],{"type":420,"tag":716,"props":1349,"children":1351},{"id":1350},"create-from-template",[1352],{"type":449,"value":1353},"Create From Template",{"type":420,"tag":622,"props":1355,"children":1356},{},[1357],{"type":449,"value":1358},"Follow the steps below to create a new rule using a ready-made template;",{"type":420,"tag":674,"props":1360,"children":1361},{},[1362,1385],{"type":420,"tag":678,"props":1363,"children":1364},{},[1365,1366,1371,1373,1378,1380,1384],{"type":449,"value":1228},{"type":420,"tag":1203,"props":1367,"children":1368},{"color":1205,"variant":1206},[1369],{"type":449,"value":1370},"Create New > Create from template",{"type":449,"value":1372},".",{"type":420,"tag":1203,"props":1374,"children":1375},{"color":1205,"variant":1206},[1376],{"type":449,"value":1377},"The Rule Templates",{"type":449,"value":1379}," page will welcome you. Select the template you need from this page and click the ",{"type":420,"tag":1203,"props":1381,"children":1382},{"color":1205,"variant":1206},[1383],{"type":449,"value":1240},{"type":449,"value":1242},{"type":420,"tag":678,"props":1386,"children":1387},{},[1388,1390,1394,1396],{"type":449,"value":1389},"The predefined rule template for you will appear in detail. You can edit it on this page if you want or you can leave it as default and click the ",{"type":420,"tag":1203,"props":1391,"children":1392},{"color":1205,"variant":1206},[1393],{"type":449,"value":1240},{"type":449,"value":1395}," button.\n",{"type":420,"tag":617,"props":1397,"children":1398},{"icon":619},[1399],{"type":420,"tag":622,"props":1400,"children":1401},{},[1402,1404,1411,1413],{"type":449,"value":1403},"After finishing the rule definitions in the Alert module, you need to bind the alerts to a policy in the notification policy section. Go to the ",{"type":420,"tag":634,"props":1405,"children":1408},{"href":1406,"rel":1407},"http://localhost:3000/en/alert/notification-policy",[638],[1409],{"type":449,"value":1410},"notification policy",{"type":449,"value":1412}," document for these operations.",{"type":420,"tag":628,"props":1414,"children":1415},{},[],{"title":414,"searchDepth":453,"depth":453,"links":1417},[1418,1419,1423,1429,1433,1437,1441,1442],{"id":659,"depth":453,"text":662},{"id":711,"depth":453,"text":714,"children":1420},[1421,1422],{"id":718,"depth":462,"text":721},{"id":729,"depth":462,"text":732},{"id":813,"depth":453,"text":816,"children":1424},[1425,1426,1427,1428],{"id":824,"depth":462,"text":827},{"id":835,"depth":462,"text":838},{"id":864,"depth":462,"text":867},{"id":895,"depth":462,"text":898},{"id":906,"depth":453,"text":909,"children":1430},[1431,1432],{"id":912,"depth":462,"text":915},{"id":976,"depth":462,"text":979},{"id":987,"depth":453,"text":990,"children":1434},[1435,1436],{"id":993,"depth":462,"text":996},{"id":1022,"depth":462,"text":1025},{"id":1066,"depth":453,"text":1069,"children":1438},[1439,1440],{"id":1072,"depth":462,"text":1075},{"id":1083,"depth":462,"text":1086},{"id":1127,"depth":453,"text":1130},{"id":1193,"depth":453,"text":1196,"children":1443},[1444,1445],{"id":1212,"depth":462,"text":1215},{"id":1350,"depth":462,"text":1353},"content:en:5.alert:2.notification-policy.md","en/5.alert/2.notification-policy.md","en/5.alert/2.notification-policy",{"_path":95,"_dir":412,"_draft":413,"_partial":413,"_locale":414,"title":94,"description":1450,"body":1451,"_type":604,"_id":1458,"_source":606,"_file":1459,"_stem":1460,"_extension":609},"This topic provides information about the process of adding a location for the Hotspot service in the Logger software.",{"type":417,"children":1452,"toc":1456},[1453],{"type":420,"tag":421,"props":1454,"children":1455},{},[],{"title":414,"searchDepth":453,"depth":453,"links":1457},[],"content:en:6.hotspot:2.locations.md","en/6.hotspot/2.locations.md","en/6.hotspot/2.locations",1775654251490]