# Features

## Platform functions

<table><thead><tr><th width="356">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td><a href="/pages/-LYfEkq05QjVG9SATfc0">Dashboards</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/-LYfEkq05QjVG9SATfc0#asset-operation-center">Asset Operation Center</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><p>Cross Platform <a href="/pages/-MM_VS1CtvsrL0vKx890#pulsar-agent">Compatibility</a></p><p>(Windows, Linux, MacOS)</p></td><td>true</td><td>true</td><td>true</td></tr><tr><td>PDF-Reports</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Switch <a href="/pages/-LWLoEUB7FQ0RbsLXXq_">alerts </a>to deviations and safety events</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/-LWLoEUB7FQ0RbsLXXq_#notifications">Alert notification</a> via email, SMS, Slack, Mattermost, Microsoft Teams</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Group assets with <a href="/pages/-LYmAQVhYR_Nivt_VtvC">tags</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Unlimited number of <a href="/pages/-LYm79KjSRjDVy8nEHT0#team-members">team members</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/-LYm79KjSRjDVy8nEHT0#roles">Role concept</a> incl. user-defined roles</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Logging of <a href="/pages/-LYfEkq05QjVG9SATfc0#activities">user activities</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/-LTReUsEJK4pNbWgvzrG">API</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/2FrwrQNBYa2TIfAMIf1f">Multi-client capability</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Subordinate clients</td><td>false</td><td>false</td><td>true</td></tr><tr><td><a href="/pages/2FrwrQNBYa2TIfAMIf1f#where-can-you-check-available-used-and-free-contingents">License management</a></td><td>false</td><td>false</td><td>true</td></tr><tr><td><a href="/pages/uPaVHHoCmQEf73pM9qrV">White Label</a></td><td>false</td><td>false</td><td>true</td></tr><tr><td><a href="/pages/g2sdSL4paaOygJaZlUnk">Own mail server</a></td><td>false</td><td>false</td><td>true</td></tr><tr><td><a href="/pages/8noyoFDeSuGeP3uCtQ4X">Single Sign On</a> (SSO)</td><td>false</td><td>false</td><td>true</td></tr></tbody></table>

## SIEM - Security Information and Event Management

<table><thead><tr><th width="337">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td><a href="/pages/2bGHtBJLfHLPaPFr9I1A">Log Collection</a> - IT-Assets, Applications and Cloud</td><td>false</td><td>false</td><td>true</td></tr><tr><td>Log Analyse und <a href="/pages/5aQ0MA5A3uOphs1nq900">Event Correlation</a></td><td>false</td><td>false</td><td>true</td></tr><tr><td>Log Forensics</td><td>false</td><td>false</td><td>true</td></tr><tr><td>Log Retention</td><td>false</td><td>false</td><td>true</td></tr><tr><td>Daten Normalisierung</td><td>false</td><td>false</td><td>true</td></tr><tr><td><a href="/pages/dFzQZ6RoTnMvwo9peYHL">Dashboards</a></td><td>false</td><td>false</td><td>true</td></tr><tr><td>SIEM <a href="/pages/gLBUzZuUO7fKikhYFbUi">Workflows</a></td><td>false</td><td>false</td><td>true</td></tr><tr><td>Hersteller Vorlagen</td><td>false</td><td>false</td><td>true</td></tr><tr><td>Managed Event-Streams</td><td>false</td><td>false</td><td>true</td></tr><tr><td><a href="/pages/Nw2fgPyQRAfTYCISLxVs">Cloud Connectors</a></td><td>false</td><td>false</td><td>true</td></tr><tr><td>Individual <a href="/pages/EMYGUztjP62nd2xOBohv">Extractors</a></td><td>false</td><td>false</td><td>true</td></tr><tr><td><a href="/pages/t4QOxygy7EHjWow3yBs7">Obfuscators</a></td><td>false</td><td>false</td><td>true</td></tr></tbody></table>

## Vulnerability Management

<table><thead><tr><th width="365">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td>CVE Dashboard (Cockpit)</td><td>true</td><td>true</td><td>true</td></tr><tr><td>BSI warning about found CVEs</td><td>true</td><td>true</td><td>true</td></tr><tr><td>CVE Database</td><td>true</td><td>true</td><td>true</td></tr><tr><td>CVE recommendations for countermeasures</td><td>true</td><td>true</td><td>true</td></tr><tr><td>CVE <a href="/pages/2dDJL3GP5es1f6JOsILK#vulnerabilities">Whitebox Scan</a> and Monitoring</td><td>true</td><td>true</td><td>true</td></tr><tr><td>CVE <a href="/pages/vB0jFj7w6jaajPr30ZdJ">Greybox </a>Network Scan</td><td>true</td><td>true</td><td>true</td></tr><tr><td>CVE <a href="/pages/-MM_YcMWnVP_1uErd4UG">Blackbox </a>Network Scan</td><td>true</td><td>true</td><td>true</td></tr><tr><td>CVE <a href="/pages/EPAHDrDWD3VWrLk0xyvU#vulnerabilities">Website </a>Scan and Monitoring</td><td>true</td><td>true</td><td>true</td></tr><tr><td>CVE <a href="/pages/-LWLoEUB7FQ0RbsLXXq_">alerting </a>by criticality</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/D6qCkzPcaxl6RFTKCq8F">Software inventory</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/dCcauwAL0xmvR3ksdC4l">Penetrationtesting</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Manage and automate <a href="/pages/2dDJL3GP5es1f6JOsILK#autoupdate">updates</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/2dDJL3GP5es1f6JOsILK#configuration">Configuration </a>Management</td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## Intrusion Detection und Prevention (IDS/IPS)

<table><thead><tr><th width="368">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td>Host based <a href="/pages/SIV3jhcbiprGQgEf0BUk">attack detection</a> (IDS) detection</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Host based <a href="/pages/-MYP6b6NyH1VlNuwo-20">blocking of attacks</a> (IPS) response</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Logging of all attacks and <a href="/pages/2dDJL3GP5es1f6JOsILK#network-anomalies">classification </a>by severity</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Live visualization of attacks</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Definition of <a href="/pages/2dDJL3GP5es1f6JOsILK#network-anomalies">detection levels</a> according to protection needs</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Definition of <a href="/pages/-MYP6b6NyH1VlNuwo-20#autonomous-blocking-autonomous-actions">blocking levels</a> according to protection needs</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Define whitelists</td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## Microsegmentation

<table><thead><tr><th width="326">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td>Software defined <a href="/pages/-MYP6b6NyH1VlNuwo-20#elements-of-the-microsegment">groupings of IT assets</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/-MYP6b6NyH1VlNuwo-20#microsegmentation">Management </a>of East-West data traffic according to the Zero Trust principle</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/-MYP6b6NyH1VlNuwo-20#general-settings-3">Isolation </a>of devices and device groups</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/-MYP6b6NyH1VlNuwo-20#advanced-settings">Implementation </a>of use case-specific IT security guidelines</td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## File Integrity Monitoring

<table><thead><tr><th width="328">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS  Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td>Monitoring <a href="/pages/Fj4B7ZYBmA9WJtuqjDIl#fim-cockpit">access to files and directories</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/Fj4B7ZYBmA9WJtuqjDIl#logs">Logging </a>of all accesses</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Alerting after unauthorized access</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Provision of <a href="/pages/Fj4B7ZYBmA9WJtuqjDIl#rules">managed rules</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Definition of individual sets of <a href="/pages/Fj4B7ZYBmA9WJtuqjDIl#create-rules">rules</a></td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## Automated penetration testing

<table><thead><tr><th width="369">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td><a href="/pages/dCcauwAL0xmvR3ksdC4l">Network segment</a> scan</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Scan of single <a href="/pages/dCcauwAL0xmvR3ksdC4l">IP-addresses</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Scan of <a href="/pages/Nl6ZopIH3ohQtlqoZY64">Websites</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/-MK4qGNrzeZSJZMkvgMg#information-gathering">Information Gathering</a> (Footprinting of the target systems)</td><td>true</td><td>true</td><td>true</td></tr><tr><td>CVE-Scan <a href="/pages/-MK4qGNrzeZSJZMkvgMg">Blackbox / Greybox</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Service <a href="/pages/-MK4qGNrzeZSJZMkvgMg#service-bruteforce">Bruteforce </a>(Check for insecure credentials)</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/-MK4qGNrzeZSJZMkvgMg#service-discovery">Service Discovery</a> (Specific checks of services for misconfigurations)</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Clear evaluation of <a href="/pages/U9OrgU2B18encDZfF2pz">audits</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/0w9QhUTBZbQ9ff5EdCS7">Automated </a>recurring scans</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Send <a href="/pages/0w9QhUTBZbQ9ff5EdCS7">PDF-reports</a> by e-mail</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Store own <a href="/pages/0w9QhUTBZbQ9ff5EdCS7">password list</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Extend vectors with <a href="/pages/tx581yeLOH06pijE4QdR">custom scripts</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Define <a href="/pages/Nl6ZopIH3ohQtlqoZY64">asset inventory</a>, IP addresses or endpoints as target systems</td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## Website monitoring

<table><thead><tr><th width="379">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td><a href="/pages/EPAHDrDWD3VWrLk0xyvU#website">Availability and response times</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/EPAHDrDWD3VWrLk0xyvU#ssl-tls">SSL/TLS</a>-Monitoring</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/EPAHDrDWD3VWrLk0xyvU#bsi">TLS validation</a> according to BSI <a href="https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03116/BSI-TR-03116-4.html">TR-03116-4</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/EPAHDrDWD3VWrLk0xyvU#certificate">Certificate Manager</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/EPAHDrDWD3VWrLk0xyvU#dns">DNS</a>-Monitoring</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/EPAHDrDWD3VWrLk0xyvU#http-headers">HTTP-Header</a> Security Check</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/EPAHDrDWD3VWrLk0xyvU#portscan">Port</a>-Monitoring</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/EPAHDrDWD3VWrLk0xyvU#apps">Footprinting </a>of the application environment</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/EPAHDrDWD3VWrLk0xyvU#vulnerabilities">CVE-Scan</a></td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## IT monitoring (with agent)

<table><thead><tr><th width="372">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td><a href="/pages/2dDJL3GP5es1f6JOsILK#metrics">Availability monitoring</a>: CPU, RAM, SWAP, network, hard disks</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Monitoring of <a href="/pages/2dDJL3GP5es1f6JOsILK#custom-metrics">any data</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Monitor metrics with <a href="/pages/2dDJL3GP5es1f6JOsILK#machine-learning">machine learning</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Monitor <a href="/pages/2dDJL3GP5es1f6JOsILK#software">installed software</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Monitor <a href="/pages/2dDJL3GP5es1f6JOsILK#autostarts">Autostarts</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Monitor <a href="/pages/2dDJL3GP5es1f6JOsILK#services">services</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Monitor <a href="/pages/2dDJL3GP5es1f6JOsILK#connections">ports</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Monitor <a href="/pages/2dDJL3GP5es1f6JOsILK#processes">processes</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/2dDJL3GP5es1f6JOsILK#system-events">System log</a> monitoring</td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## IT monitoring (without agent)

<table><thead><tr><th width="377">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td><a href="/pages/-Ldwg2kfWb4AueD_l5SB#ping-monitoring">Ping</a>-Monitoring</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/-Ldwg2kfWb4AueD_l5SB#port-monitoring">Port</a>-Monitoring</td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/-Ldwg2kfWb4AueD_l5SB#snmp">SNMP</a>-Monitoring</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Upload <a href="/pages/-Ldwg2kfWb4AueD_l5SB#own-mibs">own MIBs</a></td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## IT inventory

<table><thead><tr><th width="380">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td>Permanent <a href="/pages/-MM_YbklTuxwQn_w-gHV#set-up-asset-discovery">monitoring of the network</a> according to its participants</td><td>true</td><td>true</td><td>true</td></tr><tr><td>Complete <a href="/pages/-MM_YbklTuxwQn_w-gHV#inventory">network inventory</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Interactive <a href="/pages/-MM_YbklTuxwQn_w-gHV#asset-map">asset map</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td>Agent based <a href="/pages/2dDJL3GP5es1f6JOsILK#device-information">inventory</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/D6qCkzPcaxl6RFTKCq8F">Software inventory</a></td><td>true</td><td>true</td><td>true</td></tr></tbody></table>

## Automation

<table><thead><tr><th width="381">Function</th><th data-type="checkbox">SaaS SB</th><th data-type="checkbox">SaaS Pro</th><th data-type="checkbox">On-Prem</th></tr></thead><tbody><tr><td>Add your own scripts as <a href="/pages/dZIsbZmnjsnNEfYtOEKp">plugins</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/dZIsbZmnjsnNEfYtOEKp#autonomous-reaction-to-system-event-via-alerting">Run scripts regularly</a></td><td>true</td><td>true</td><td>true</td></tr><tr><td><a href="/pages/dZIsbZmnjsnNEfYtOEKp#example-restart-apache-web-server">Autonomous response</a> to system events</td><td>true</td><td>true</td><td>true</td></tr></tbody></table>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.enginsight.com/docs/manual/english/features.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
