Portal Help

Guides on how to use the Portal

Chris Wallis avatar Daniel Andrew avatar Patrick Craston avatar
33 articles in this collection
Written by Chris Wallis, Daniel Andrew, and Patrick Craston

Upgrading from Essential to Pro

How to upgrade your subscription from the Essential to the Pro plan, in order to take full advantage of Intruder's features
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Adding licenses for additional targets

How to increase the number of licenses in your subscription so that you can add additional targets
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

"Emerging threat scan failed" - what does this mean?

What it means when you receive an "Emerging threat scan failed" email and how to see the results
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

How to set your scheduled scan time ⏰

You can set the day and time when you want your scheduled scan to run from inside the Intruder portal
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

How to set your timezone

All times in the Intruder Portal are displayed in your local timezone, you can set the timezone on the settings page
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Do Intruder's monthly plans have a minimum contract length?

There is no commitment when signing up for our monthly plans, you can cancel at any time
Chris Wallis avatar
Written by Chris Wallis
Updated over a week ago

Internal Vulnerability Scanning on Windows

How to set up our agent-based internal scanning solution to protect Windows devices in your internal network
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Internal Vulnerability Scanning on Linux

How to set up our agent-based internal scanning solution to protect Linux devices in your internal network
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Internal Vulnerability Scanning on macOS

How to set up our agent-based internal scanning solution to protect macOS devices in your internal network
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

How much is the per-target fee?

You can calculate the additional cost for each target using the pricing calculator on the signup page
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Restoring targets

If you delete a target that consuming a license - here's how you restore it
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Download your invoices

If you're paying by card, you can download your invoices from the billing section of the portal
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Updating your billing address

Updating your invoice details like billing address, billing name and company name
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Pausing and cancelling scans

Need to stop a scan? You can do that from the Intruder dashboard
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

What is CloudBot? 🤖

CloudBot automatically adds any new external IP addresses or hostnames in cloud accounts as Intruder targets
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

How does our licensing work?

How to know how much you'll be charged for scanning your infrastructure.
Chris Wallis avatar
Written by Chris Wallis
Updated over a week ago

Snoozing issues

'Snooze' issues by marking them as false positive, accepting the risk, or because you've added mitigating controls
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Microsoft Azure integration

Connect Intruder to Microsoft Azure to synchronise your targets
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Google Cloud Platform integration

Connect Intruder to Google Cloud Platform to synchronise your targets
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Developer integrations

Make your life easier by adding one of Intruder's developer integrations
Chris Wallis avatar
Written by Chris Wallis
Updated over a week ago

AWS integration

Connect Intruder to AWS to synchronise your targets
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Getting Started

New to the Intruder platform? This guide will help you get going and answer some frequently asked questions
Chris Wallis avatar
Written by Chris Wallis
Updated over a week ago

Slack integration

Add the Intruder Slack app to your workspace to receive notifications from the Intruder portal.
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Atlassian Jira integration

Keep your development team in the loop by exporting security weaknesses to Jira
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Emerging threat notification controls

Set your notification preferences via the emerging threat notification controls on the Intruder account page
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Updating your payment card

How to update your credit card details
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Why are my targets not included in my latest assessment?

Targets need to be added to the portal before an assessment starts, otherwise they are not included
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Running scans on demand (Scan now)

In addition to our monthly assessments, Intruder lets you request additional scans at any time. Scan individual targets/tags or all targets.
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Adding additional users to your Intruder account

How to get your team members access to the Intruder portal
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Managed Service Providers - Separating Clients

This article describes how managed service providers can separate their client reports, by "Tagging" targets.
Daniel Andrew avatar
Written by Daniel Andrew
Updated over a week ago

Network View

Ever wondered what your business looks like to a hacker?
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Tagging your targets

How to organise your targets by tagging them and create groups such as "Production", "Staging", etc.
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago

Two-Factor Authentication

How to activate Two-Factor Authentication on your Intruder account
Patrick Craston avatar
Written by Patrick Craston
Updated over a week ago