Skip to content
Watch a Prism Demo
Company
About Us
Our Accreditations
Blog
Careers
Privacy Policy
Prism Platform
Prism Platform
Continuous Penetration Testing
Managed Vulnerability Scanning
Cyber Threat Intelligence Services
Red Team as a Service
Phishing Assessment
Additional Services
Remote Testing
Bug Bounty
Prism Resources
Knowledgebase
Patch Notes
Support
Services
Penetration Testing
Continuous Penetration Testing
Red Team as a Service
Web Application Security Testing
Cyber Threat Intelligence Services
Strategic Threat Intelligence
Cloud Services Penetration Testing
Phishing Assessment
Remote Penetration Testing
Resources
Tech Talks
Datasheets
Contact
Contact Us
Support
Company
About Us
Our Accreditations
Blog
Careers
Privacy Policy
Prism Platform
Prism Platform
Continuous Penetration Testing
Managed Vulnerability Scanning
Cyber Threat Intelligence Services
Red Team as a Service
Phishing Assessment
Additional Services
Remote Testing
Bug Bounty
Prism Resources
Knowledgebase
Patch Notes
Support
Services
Penetration Testing
Continuous Penetration Testing
Red Team as a Service
Web Application Security Testing
Cyber Threat Intelligence Services
Strategic Threat Intelligence
Cloud Services Penetration Testing
Phishing Assessment
Remote Penetration Testing
Resources
Tech Talks
Datasheets
Contact
Contact Us
Support
Company
About Us
Our Accreditations
Blog
Careers
Privacy Policy
Prism Platform
Prism Platform
Continuous Penetration Testing
Managed Vulnerability Scanning
Cyber Threat Intelligence Services
Red Team as a Service
Phishing Assessment
Additional Services
Remote Testing
Bug Bounty
Prism Resources
Knowledgebase
Patch Notes
Support
Services
Penetration Testing
Continuous Penetration Testing
Red Team as a Service
Web Application Security Testing
Cyber Threat Intelligence Services
Strategic Threat Intelligence
Cloud Services Penetration Testing
Phishing Assessment
Remote Penetration Testing
Resources
Tech Talks
Datasheets
Contact
Contact Us
Support
Knowledgebase
Paul Jones
2021-01-20T11:44:21+00:00
Prism Platform Knowledgebase
Getting Started
Create Your Account
Read More
Set Up Two-Factor Authentication
Read More
Manage Your Profile & Password
Read More
Email Notifications
Read More
Understand Different Statuses
Read More
Navigation
Switch Between Services
Read More
Menu
Read More
Dashboards
Introducing the Dashboard
Read More
Outstanding Vulnerabilities Graph
Read More
Projects Overview
Read More
Results Summary
Read More
Issues Breakdown
Read More
Projects
Introducing Projects
Read More
Tags
Read More
Results
Introducing Results
Read More
Phases
Read More
Issues
Read More
Assets
Read More
Mark an Issue as Remediated
Read More
Add Comments
Read More
Import Third Party Results
Read More
Suppress Issue Host (MVS Only)
Read More
Mark An Issue As A False Positive
Read More
Accept The Risk Of An Issue
Read More
Change The Statuses Of Issues In Bulk
Read More
Assign An Issue To A User
Read More
Questionnaires
Questionnaires
Read More
User Management
Introducing User Management
Read More
Add & Manage Users
Read More
Assign An Issue To A User
Read More
Permissions
Introducing Permissions
Read More
Project Permissions
Read More
Group Permissions
Read More
Add Users to Group Permissions
Read More
Questionnaire Permissions
Read More
Audit Logs
Audit Log
Read More
Secure File Exchange
Secure File Exchange
Read More
Go to Top