Skip to content

Alerts

The Alerts module is the central hub for managing security findings across your entire ShadowMap deployment. Every exposure discovered by ShadowMap's 27+ scanning sources — from open ports and weak SSL to dark web mentions and leaked credentials — surfaces here as an alert for investigation and response.

Overview

Alerts

The Alerts view shows a filterable, sortable list of all security findings. The summary strip at the top shows counts by status:

  • Needs Review — New alerts with no response action taken
  • Investigating — Alerts your team is actively working on
  • To Be Closed — Alerts marked for closure
  • Closed — Resolved alerts
  • Accepted Risk — Risks formally accepted by your organization
  • All Online — All active (non-closed) alerts

Alert Statuses

Alerts have two status dimensions:

Internal Status (Alert Lifecycle)

StatusMeaning
NewRecently discovered by a scan
OpenAcknowledged, still requires action
ClosedResolved or no longer detected in scans
ReopenedPreviously closed but detected again

Response Status (Your Team's Action)

StatusColorMeaning
NoneGrayNo action taken yet — needs review
ReviewedGreenReviewed by the team, no immediate action required
InvestigatingPurpleTeam is actively investigating
PublicOrangeKnown/documented exposure (intentional)
To Be ClosedYellowRemediation complete, pending verification
Accepted RiskRedRisk formally accepted by the organization

To change a response status, select one or more alerts and use the Change Status button, or change it from the alert detail view's sidebar.

Understanding the List View

Each alert row shows:

ColumnDescription
AlertFinding title — click to open the detail view
IPIP address associated with the finding
StatusInternal status (New/Open/Closed/Reopened)
RiskSeverity level with colored badge
Last SeenWhen the alert was most recently detected ("2 hours ago")
ActionsQuick-access buttons for comments, sharing, and more

Expand a row to see additional metadata: hostname, port, ASN provider, geolocation with country flag.

Risk Levels

Risk levels are based on CVSS scoring:

LevelCVSS ScoreColorWhat It Means
High8.0 – 10.0RedCritical exposure requiring immediate attention
Medium5.0 – 7.9OrangeSignificant risk that should be addressed promptly
Low2.0 – 4.9YellowMinor risk, address when possible
Informational0.0 – 1.9GreenFor awareness only, no immediate risk

The filter panel supports 17+ filter types:

FilterDescription
TitleText search across alert titles
StatusInternal status (New, Open, Closed, Reopened)
Response StatusYour team's response action
RiskSeverity level
Assigned ToUser or team assignment
SLA Policy ViolationAlerts violating specific SLA policies
Tag RuleAutomatically applied tag rules
HostDomain or hostname
IPIP address
CountryGeolocation country
ASNAutonomous System provider
PortService port number
Added OnAlert creation date range
Last Seen OnMost recent detection date range
CVE IDSpecific CVE identifier
CWE IDWeakness category
EPSS ScoreExploit prediction score
Custom TagsAny user-defined tags

Saved Searches

ShadowMap includes pre-built saved searches for common views:

  • Needs Review — New/Open alerts with no response status
  • Investigating — Alerts being actively investigated
  • Accepted Risk — Formally accepted risks
  • Closed — Resolved alerts

You can also create custom saved searches from any filter combination.

Alert Detail View

Click any alert to open its full detail view.

Details Sidebar

The right sidebar shows key metadata:

  • Risk Score — CVSS numeric score
  • Risk Level — High/Medium/Low/Informational
  • Status — Internal status
  • Response Status — Dropdown to change response action
  • Assignee — Dropdown to assign to a team member
  • Host, IP, Port — Affected asset details
  • ASN — Network provider
  • Location — Country with flag

Classification

When available, alerts include:

  • CVE ID — The specific vulnerability identifier
  • CWE ID — The weakness category
  • CVSS Score — Severity rating (0-10)
  • CVSS Metrics — Attack vector, complexity, privileges required
  • EPSS Score — Probability the vulnerability will be exploited

Investigation Tabs

TabContent
About This VulnerabilityDescription, impact analysis, external references
RecommendationRemediation steps and best practices
Sub DomainsAll domains/hosts affected by this alert
ApplicationsWeb applications affected (with risk level, status, first/last seen)
Activity LogsTimeline of all actions taken — status changes, assignments, comments, shares

Depending on the alert source, additional tabs may appear with source-specific data (DNS Recursion, Security Headers, RDP Bluekeep, S3 Bucket details, IP Reputation, SSL analysis, etc.).

Screenshot / Proof of Concept

When available, alerts include a screenshot or proof-of-concept image from the scan source. Click to expand.

Taking Action on Alerts

Individual Actions

From the alert detail view:

  • Change Response Status — Mark as Reviewed, Investigating, Accepted Risk, etc.
  • Assign — Assign to a team member or team
  • Comment — Add investigation notes (with comment templates for quick responses)
  • Add Tags — Apply custom key-value tags for organization
  • Share — Send via email or integrations (Slack, Jira, PagerDuty)

Bulk Actions

Select multiple alerts using checkboxes, then:

  • Change Status — Set response status for all selected
  • Assign — Assign all selected to a user or team
  • Add Tags — Apply tags to all selected
  • Share — Share all selected via email or integration
  • Export — Export filtered alerts to Excel or JSON

Sharing Alerts

Via Email

Share individual or bulk alerts by email. Recipients receive:

  • Alert title and summary
  • Risk level, status, host, IP details
  • Direct link to the alert in ShadowMap

Via Integrations

Share alerts to connected tools:

IntegrationWhat Happens
SlackSends formatted message with alert details to configured channel
JiraCreates a ticket with alert details, classification, and link back
PagerDutyCreates an incident with severity mapping
ArcSight (SIEM)Sends CEF-formatted security event

Configure integrations under Settings > Integrations.

How Alerts Connect to SLA Policies

When an SLA Policy is configured, alerts matching the policy criteria are tracked against response time targets. If the SLA threshold is exceeded, the alert appears in SLA Violations and escalation notifications are triggered.

ShadowMap includes alert coalescing to prevent notification storms — if more than 10 violations for a single policy occur within 5 minutes, subsequent alerts are batched into a single digest notification instead of individual alerts.

Alert Sources

Alerts are generated from 27+ scanning sources across these categories:

CategoryExamples
ApplicationWeb vulnerabilities, missing security headers, default credentials, path brute-force
NetworkOpen ports, zone transfers, anonymous FTP, RDP Bluekeep
Malware & ReputationCryptocurrency miners, Google Safe Browsing, IP blacklists, honeypot detection
SSL/TLSExpired certificates, weak cipher suites, protocol vulnerabilities
DNSSPF/DKIM/DMARC issues, open resolvers, DNSSEC failures

Alert Deduplication

ShadowMap deduplicates alerts using a hash of: IP + Host + Port + Path + Source + Title. If the same exposure is detected across multiple scans, it updates the existing alert's "Last Seen" timestamp rather than creating a duplicate.

If an alert was previously closed and the same exposure is detected again, the alert is reopened (status changes to Reopened).

Exporting Alerts

  1. Apply your desired filters
  2. Click Export
  3. Select format: Excel or JSON
  4. The export runs as a background task — you'll see a progress indicator
  5. Download the file when complete

Exports include all applied filters, so you get exactly the subset you were viewing.

Common Questions

Q: Why did an alert get reopened?

An alert is reopened when it was previously marked as Closed but ShadowMap's scanners detected the same exposure again in a new scan. This typically means the remediation was incomplete or the issue has recurred.

Q: What does "Accepted Risk" mean vs "Closed"?

Closed means the exposure has been remediated and is no longer detected. Accepted Risk means the exposure still exists but your organization has made a deliberate decision to accept it (e.g., a low-risk open port that serves a legitimate business purpose). Accepted Risk alerts are excluded from SLA violation tracking.

Q: How do I stop getting overwhelmed by alert volume?

  1. Use Saved Searches to focus on what matters (e.g., "High risk + Needs Review")
  2. Set up SLA Policies to prioritize by severity
  3. Use Tag Rules to auto-categorize alerts
  4. Assign alerts to specific team members to distribute the workload
  5. Set up integrations so alerts flow into your existing workflow tools (Jira, Slack)

Q: How do I send alerts to my SIEM?

Configure an ArcSight (SIEM) integration under Settings > Integrations. Alerts can then be shared to your SIEM individually, in bulk, or automatically via SLA policy notifications.

ShadowMap by Security Brigade