System Administration
Seeker provides a set of tools that enable administrators to configure, customize, and fine-tune various features and capabilities of the system, as well as integrate external tools.
System Configuration Tasks
- Configure Server URL
- Customize Seeker Connection Settings
- Configure HTTPS Certificates
- Set up License
- Configure Project Templates
- Configure Compliance Policies
- Configure Custom Reports
- Configure Custom Tags
- Configuring Integration with External Tools
- Configure Notification Rules
- Configure Vulnerability Lifecycle Management
- Configure Automatic Hot Backup
- Configure Server JVM Options
- Create Linux Service to Start/Stop Seeker
- Configure Logging Levels
- Audit Logs
- Customize Log Settings
- Customize the Sign-In Page
- Configure Proxies for External Systems