Skip to content

Alerts & Schedules

The Alerts page manages alert rules that trigger on cryptographic risk events, and scan schedules that automate sensor execution.

hidden Alerts page showing active alert rules and scheduled scans


Alert rules define conditions that trigger notifications when new assets are discovered or existing assets change state.

  1. Navigate to AlertsCreate Rule
  2. Define the trigger condition
  3. Set notification method
  4. Activate the rule
ConditionDescription
Risk level thresholdAlert when assets at CRITICAL or HIGH risk are discovered
New asset discoveredAlert on any new crypto asset
Lifecycle state changeAlert when an asset moves to compromised/revoked
Certificate expiringAlert when certificates approach expiration
Policy violationAlert when new assets fail compliance evaluation
Name: Critical Risk Alert
Condition: quantumRiskLevel = CRITICAL
Action: Send email to admin@company.com

hidden Alert rule creation form with condition builder


When an alert triggers, notifications are sent via email (when SMTP is configured).

Email alerts require SMTP settings in the API environment:

Terminal window
CBOM_ALERT_EMAIL_ENABLED=true
CBOM_SMTP_HOST=smtp.gmail.com
CBOM_SMTP_PORT=587
CBOM_SMTP_USERNAME=alerts@company.com
CBOM_SMTP_PASSWORD=app-password
CBOM_ALERT_EMAIL_TO=security-team@company.com

Schedule automated sensor scans to run at regular intervals.

  1. Navigate to AlertsSchedules tab
  2. Click Create Schedule
  3. Select the sensor and scanner configuration
  4. Set the cron expression or interval
  5. Activate
FieldDescription
NameSchedule identifier
SensorWhich sensor to trigger
Scanner ConfigWhich scanner configuration to use
FrequencyCron expression or simple interval
EnabledActive/inactive toggle
# Nightly endpoint scan
Name: Nightly TLS Scan
Cron: 0 2 * * *
Scanner: https-endpoint
# Weekly full filesystem scan
Name: Weekly Filesystem Scan
Cron: 0 4 * * 0
Scanner: filesystem
# Hourly certificate expiry check
Name: Cert Expiry Monitor
Cron: 0 * * * *
Scanner: https-endpoint

hidden Schedule list showing configured automated scans


View past alert triggers:

  • When the alert fired
  • Which rule triggered
  • Which asset(s) caused it
  • Whether notification was sent successfully

  • Sensors — Sensor management and manual scan triggers
  • Inventory — View assets that triggered alerts
  • Compliance — Policy violations that can trigger alerts
  • API Deployment — SMTP configuration for email alerts