Initial Configuration¶
Configure your Hive environment for optimal use.
Configuration Overview¶
After first login, configure these key areas:
- Organization Settings - Basic org configuration
- User Preferences - Personal settings
- Notification Settings - Alert preferences
- API Configuration - For CLI/automation
- Scope Definition - What you're allowed to test
Organization Configuration¶
View Organization Details¶
- Navigate to Operations → Organizations
- Select your organization
- Review details
Key Information: - Organization name - Members - Engagements - Campaigns - Scope definitions
Update Organization (Admin Only)¶
Editable Fields: - Organization name - Description - Contact information - Logo (optional)
Steps: 1. Click Edit Organization 2. Update fields 3. Click Save
User Preferences¶
Profile Settings¶
- Click user menu (top right)
- Select Profile
- Update preferences
Configurable: - Display name - Email notifications - Time zone - Date format - Language (if available)
Notification Preferences¶
Configure Alerts:
- Go to Profile → Notifications
- Choose notification types:
- Email notifications
- In-app notifications
- Webhook notifications (advanced)
Notification Types: - Scan completed - Vulnerability found - Critical findings - Scan failed - System updates
Frequency: - Real-time - Daily digest - Weekly summary - Disabled
Dashboard Preferences¶
Customize Your View:
- Navigate to Dashboard
- Click Customize
- Configure widgets:
- Add/remove widgets
- Resize widgets
- Rearrange layout
- Click Save Layout
See API Keys
Test API Access¶
Verify API Key Works:
# Using curl
curl -H "X-Api-Key: YOUR_KEY" \
https://api.hive.darksidesecurity.io/executions-cli/executions
# Using APHIDS CLI
aphids-cli --api-key YOUR_KEY --help
Scope Definition¶
Understanding Scope¶
Scope defines what you're authorized to test.
Scope Types:
- IP ranges (e.g., 192.168.1.0/24)
- Domain names (e.g., example.com)
- Subdomains (e.g., *.example.com)
- Specific URLs (e.g., https://app.example.com)
Define Engagement Scope¶
When Creating Engagement:
- Navigate to Operations → Engagements
- Click Create Engagement
- In Scope section:
- Add authorized targets
- Specify exclusions
- Define testing windows
- Set rate limits
Example Scope:
In Scope:
- 192.168.1.0/24
- *.example.com
- https://app.example.com
Out of Scope:
- 192.168.1.1 (firewall)
- admin.example.com
- Production database servers
Testing Windows:
- Monday-Friday: 6pm-6am
- Weekends: Anytime
- Holidays: No testing
Rate Limits:
- Max 100 requests/second
- Max 10 concurrent scans
Scope Verification¶
Before Scanning:
✅ Verify Authorization: Written permission
✅ Check Scope: Target in defined scope
✅ Review Exclusions: Avoid out-of-scope targets
✅ Confirm Timing: Within testing windows
✅ Check Rate Limits: Won't overwhelm systems
Notification Configuration¶
Email Notifications¶
Configure Email Alerts:
- Go to Profile → Notifications
- Enable email notifications
- Select events:
- Scan completed
- Critical vulnerabilities
- Scan failures
- Weekly summaries
Email Format: - HTML or plain text - Include details or summary only - Attach reports (optional)
Webhook Notifications¶
For Integration (Advanced):
- Navigate to Configuration → Webhooks
- Click Create Webhook
- Configure:
- URL: Your endpoint
- Events: Select triggers
- Secret: For verification
- Retry: Enable/disable
- Click Create
Webhook Events:
- scan.started
- scan.completed
- scan.failed
- vulnerability.found
- asset.discovered
See API Integration
Integration Setup¶
SIEM Integration¶
Forward Logs to SIEM:
- Navigate to Configuration → Integrations
- Select SIEM type (Splunk, ELK, etc.)
- Configure:
- Endpoint URL
- Authentication
- Log format
- Filtering rules
- Test connection
- Enable integration
Ticketing Integration¶
Create Tickets Automatically:
- Go to Configuration → Integrations
- Select ticketing system (Jira, ServiceNow)
- Configure:
- API credentials
- Project/board
- Issue type
- Priority mapping
- Test connection
- Enable auto-ticketing
Ticket Creation Rules: - Create ticket for critical vulns - Create ticket for high vulns - Group by asset - Assign to team
Security Configuration¶
Session Settings¶
Configure Session Behavior:
- Go to Configuration → Settings → Security
- Configure:
- Session timeout (default: 30 min)
- Max session duration (default: 8 hours)
- Concurrent sessions (allow/deny)
- Remember me duration (default: 30 days)
Password Policy¶
Admin Only:
- Navigate to Configuration → Settings → Security
- Configure password requirements:
- Minimum length
- Complexity requirements
- Expiration period
- History (prevent reuse)
- Lockout policy
MFA Enforcement¶
Admin Only:
- Go to Configuration → Settings → Security
- Enable Require MFA for all users
- Set grace period for enrollment
- Configure backup options
Best Practices¶
Initial Configuration Checklist¶
- Profile completed
- MFA enabled
- Notifications configured
- API key created (if needed)
- Scope defined
- Dashboard customized
- Team members invited (if admin)
- Integrations configured (if needed)
Security Best Practices¶
✅ Enable MFA: Two-factor authentication
✅ Strong Passwords: 12+ characters
✅ API Key Security: Store securely, rotate regularly
✅ Scope Verification: Always verify authorization
✅ Audit Logs: Review regularly
✅ Least Privilege: Minimum necessary permissions
Operational Best Practices¶
✅ Clear Naming: Use descriptive names
✅ Documentation: Document scope and authorization
✅ Testing Windows: Define and respect
✅ Rate Limits: Prevent system overload
✅ Notifications: Configure for critical events
✅ Regular Reviews: Review settings periodically
Troubleshooting¶
Can't Create API Key¶
Check: - You have appropriate permissions - Organization allows API access - Not at API key limit
Solution: - Contact administrator - Request API key permissions - Delete unused keys
Notifications Not Working¶
Check: - Email address verified - Notifications enabled in profile - Check spam folder - Webhook endpoint accessible
Solution: - Verify email address - Re-enable notifications - Test webhook endpoint - Check firewall rules
Scope Validation Errors¶
Check: - Scope format correct - No overlapping ranges - Exclusions properly defined - CIDR notation valid
Solution: - Review scope syntax - Use scope validator - Contact support if needed
Next Steps¶
Configuration complete! Now:
- Explore Dashboard - Learn the interface
- Create Engagement - Start your first project
- Run First Scan - Execute security test
- Install APHIDS CLI - Set up command-line tool
Related: First Login | API Keys | Dashboard