Notifications and Integrations UI
Configure alert channels and external integrations.
Notification Rules​
Path: /ui/settings/notifications
Create Rule​
- Name: Rule identifier
- Channels: Select Slack, email, webhook
- Conditions:
- Severity threshold (critical, high, medium)
- Asset tags
- Scan profiles
 
- Test: Send test notification
- Save
Example Rule​
Name: Critical Production Alerts
Channels: Slack (#prod-security), Email (oncall@company.com)
Conditions:
  - Severity: Critical
  - Asset tags: production
  - Scan profile: Any
Integration Catalog​
Path: /ui/integrations
Grid/list of available integrations:
- Slack: Team communication
- Jira: Ticketing
- ServiceNow: Incident management
- Splunk: SIEM
- QRadar: SIEM
- Webhook: Custom endpoints
Connection Status​
- ✓ Connected (green)
- ✗ Disconnected (red)
- âš Warning (yellow)
Slack Configuration​
- Navigate to Integrations → Slack
- Click Connect
- Authorize Pentora app
- Select channel
- Test notification
Webhook Editor​
Path: /ui/integrations/webhook
Fields:
- Endpoint URL: Destination
- Auth Token: Bearer token
- Payload Template: JSON template with variables
Preview: Test payload rendering
Example Template:
{
  "text": "Scan {{ .ScanID }} found {{ .VulnCount }} vulnerabilities",
  "severity": "{{ .MaxSeverity }}",
  "targets": {{ .Targets }}
}
Incident Automation (Enterprise)​
Path: /ui/integrations/automation
Rule builder:
WHEN: Critical vulnerability found
  AND: Asset group = Production Servers
THEN: Create Jira ticket
  IN: Project SEC
  WITH: Priority = Highest
See Enterprise Integrations for details.