{"version":1,"pages":[{"id":"NDoh0khJyJlTgtoCQPVG","title":"Welcome","pathname":"/docs","siteSpaceId":"sitesp_rP7D4","description":""},{"id":"41zKgWkMuleHsjXC3jz9","title":"Platform Overview","pathname":"/docs/platform/overview","siteSpaceId":"sitesp_rP7D4","description":"","breadcrumbs":[{"label":"Platform"}]},{"id":"zexrLkOoGY10TelkdfmC","title":"Getting Started Guide","pathname":"/docs/platform/getting-started-guide","siteSpaceId":"sitesp_rP7D4","description":"Best practices for getting up and running with Halo Security.","breadcrumbs":[{"label":"Platform"}]},{"id":"M8OrLdGBGEqTJzFm5bA2","title":"Discovery","pathname":"/docs/platform/discovery","siteSpaceId":"sitesp_rP7D4","description":"","breadcrumbs":[{"label":"Platform"}]},{"id":"JgpKL7zQHjfqIA0HgCBQ","title":"Domain Discovery","pathname":"/docs/platform/discovery/domain-discovery","siteSpaceId":"sitesp_rP7D4","description":"","breadcrumbs":[{"label":"Platform"},{"label":"Discovery"}]},{"id":"cvx78jT5dNDiS0FReMUm","title":"Network Discovery","pathname":"/docs/platform/discovery/network-discovery","siteSpaceId":"sitesp_rP7D4","description":"","breadcrumbs":[{"label":"Platform"},{"label":"Discovery"}]},{"id":"Q022rjM9kNczQhfJlExb","title":"Discovered Assets","pathname":"/docs/platform/discovery/discovered-assets","siteSpaceId":"sitesp_rP7D4","description":"Managing assets that have been discovered.","breadcrumbs":[{"label":"Platform"},{"label":"Discovery"}]},{"id":"Dewr1Zycc1r6CiA95LPL","title":"Targets","pathname":"/docs/platform/targets","siteSpaceId":"sitesp_rP7D4","description":"How to manage targets within the platform.","breadcrumbs":[{"label":"Platform"}]},{"id":"hZP7QgrsrktJXcVNzRl9","title":"Scan Policies","pathname":"/docs/platform/targets/scan-policies","siteSpaceId":"sitesp_rP7D4","description":"","breadcrumbs":[{"label":"Platform"},{"label":"Targets"}]},{"id":"U8LJbZ0CWCrvxSQ6gYwN","title":"Add-on Services","pathname":"/docs/platform/targets/services","siteSpaceId":"sitesp_rP7D4","description":"Additional services that we offer.","breadcrumbs":[{"label":"Platform"},{"label":"Targets"}]},{"id":"DiRbSApT91tk6mNAZzXA","title":"Tags & Filtering","pathname":"/docs/platform/targets/tags-and-filtering","siteSpaceId":"sitesp_rP7D4","description":"Tags & Filtering features let you customize how you view targets.","breadcrumbs":[{"label":"Platform"},{"label":"Targets"}]},{"id":"hlsIGeYkT1GhN8z8WUKC","title":"Default Tags","pathname":"/docs/platform/targets/tags-and-filtering/default-tags","siteSpaceId":"sitesp_rP7D4","description":"","breadcrumbs":[{"label":"Platform"},{"label":"Targets"},{"label":"Tags & Filtering"}]},{"id":"6YBTOBApItWXA85hTlTp","title":"Managing Targets","pathname":"/docs/platform/targets/managing-targets","siteSpaceId":"sitesp_rP7D4","description":"Add, remove, and archive targets in your account.","breadcrumbs":[{"label":"Platform"},{"label":"Targets"}]},{"id":"5s25AYvnlXTdTIAWvEtl","title":"Scan Configuration","pathname":"/docs/platform/targets/scan-configuration","siteSpaceId":"sitesp_rP7D4","description":"Additional settings and information related to scans.","breadcrumbs":[{"label":"Platform"},{"label":"Targets"}]},{"id":"ixiHDqEgTIXqerfwO2TV","title":"Issues","pathname":"/docs/platform/issues","siteSpaceId":"sitesp_rP7D4","description":"Monitor issues and vulnerabilities that pose a risk to your organization.","breadcrumbs":[{"label":"Platform"}]},{"id":"e0YpxbKiJvcIqqjjKMeL","title":"Vulnerability Management","pathname":"/docs/platform/issues/vulnerability-management","siteSpaceId":"sitesp_rP7D4","description":"How to manage vulnerabilities that have been discovered.","breadcrumbs":[{"label":"Platform"},{"label":"Issues"}]},{"id":"hEkoaoEhWTvUHEfjMxnA","title":"Issue Settings","pathname":"/docs/platform/issues/issue-settings","siteSpaceId":"sitesp_rP7D4","description":"Customize how issues are handled within your account.","breadcrumbs":[{"label":"Platform"},{"label":"Issues"}]},{"id":"MN0hvFQFvqEMECdF1AqX","title":"Risk","pathname":"/docs/platform/risk","siteSpaceId":"sitesp_rP7D4","description":"What risk means and how we calculate it.","breadcrumbs":[{"label":"Platform"}]},{"id":"3OzwJC92vmUDSfIErw5Z","title":"Technology","pathname":"/docs/platform/apps","siteSpaceId":"sitesp_rP7D4","description":"Monitor the technology in use on your attack surface.","breadcrumbs":[{"label":"Platform"}]},{"id":"VqHMX7a2ZOU5l6Q19pHu","title":"Firewalls","pathname":"/docs/platform/firewalls","siteSpaceId":"sitesp_rP7D4","description":"Network information about ports, HTTP servers, and DNS records.","breadcrumbs":[{"label":"Platform"}]},{"id":"VUEJiNHmJNaixk9a46UN","title":"Ports","pathname":"/docs/platform/firewalls/ports","siteSpaceId":"sitesp_rP7D4","description":"Firewall ports and how they are assigned risk.","breadcrumbs":[{"label":"Platform"},{"label":"Firewalls"}]},{"id":"zQbMVsb0WcZE5gJtN2Aa","title":"HTTP Servers","pathname":"/docs/platform/firewalls/http-servers","siteSpaceId":"sitesp_rP7D4","description":"HTTP servers that were detected on firewall assets.","breadcrumbs":[{"label":"Platform"},{"label":"Firewalls"}]},{"id":"XGMCPRBabYIB4z53Kp3K","title":"DNS Records","pathname":"/docs/platform/firewalls/dns-records","siteSpaceId":"sitesp_rP7D4","description":"DNS records for your assets.","breadcrumbs":[{"label":"Platform"},{"label":"Firewalls"}]},{"id":"3yamOzby5NkYCE1NTw8d","title":"Websites","pathname":"/docs/platform/websites","siteSpaceId":"sitesp_rP7D4","description":"Information about web servers that were identified.","breadcrumbs":[{"label":"Platform"}]},{"id":"ECbRKkuKiPcBVj4LY5gg","title":"Certificates","pathname":"/docs/platform/websites/certificates","siteSpaceId":"sitesp_rP7D4","description":"Identify TLS certificates that are in use and any data associated with them.","breadcrumbs":[{"label":"Platform"},{"label":"Websites"}]},{"id":"vpcb8KU418vb2wCq8EYL","title":"Scripts","pathname":"/docs/platform/websites/scripts","siteSpaceId":"sitesp_rP7D4","description":"Monitor additions and modifications to scripts on your website and the sites that host them.","breadcrumbs":[{"label":"Platform"},{"label":"Websites"}]},{"id":"yXTjiO9s1nHXrM0JYJOY","title":"Cookies","pathname":"/docs/platform/websites/cookies","siteSpaceId":"sitesp_rP7D4","description":"Keep track of cookies and their attributes.","breadcrumbs":[{"label":"Platform"},{"label":"Websites"}]},{"id":"H0EUdtNa0pyaOTmWrfVp","title":"Headers","pathname":"/docs/platform/websites/headers","siteSpaceId":"sitesp_rP7D4","description":"Monitor HTTP response headers and their values.","breadcrumbs":[{"label":"Platform"},{"label":"Websites"}]},{"id":"TvewssDFVXLtxi36hPeN","title":"Forms","pathname":"/docs/platform/websites/forms","siteSpaceId":"sitesp_rP7D4","description":"Identify forms that are transmitting sensitive data and monitor changes and destination sites.","breadcrumbs":[{"label":"Platform"},{"label":"Websites"}]},{"id":"LFaNq6xITsPQmQ6Yeyir","title":"Links","pathname":"/docs/platform/websites/links","siteSpaceId":"sitesp_rP7D4","description":"View information related to links.","breadcrumbs":[{"label":"Platform"},{"label":"Websites"}]},{"id":"5ci0DJBpAvMUnXaMTmd4","title":"Downloads","pathname":"/docs/platform/websites/downloads","siteSpaceId":"sitesp_rP7D4","description":"Monitor downloads that are available on your site.","breadcrumbs":[{"label":"Platform"},{"label":"Websites"}]},{"id":"JaASgNykEwjDkWzJoXfA","title":"Traffic Hosts","pathname":"/docs/platform/websites/traffic-hosts","siteSpaceId":"sitesp_rP7D4","description":"View which hosts transmit data when accessing your site.","breadcrumbs":[{"label":"Platform"},{"label":"Websites"}]},{"id":"KBZb4BURh1GRLfrvuWWM","title":"Meta Tags","pathname":"/docs/platform/websites/meta-tags","siteSpaceId":"sitesp_rP7D4","description":"View meta tags found on your site.","breadcrumbs":[{"label":"Platform"},{"label":"Websites"}]},{"id":"eMtSXzVCSgMde50rZUns","title":"Pages","pathname":"/docs/platform/websites/pages","siteSpaceId":"sitesp_rP7D4","description":"View what pages were crawled during scanning.","breadcrumbs":[{"label":"Platform"},{"label":"Websites"}]},{"id":"nI1uTOEj8VgMQd3IE123","title":"Reports","pathname":"/docs/platform/reports","siteSpaceId":"sitesp_rP7D4","description":"Access reports and data related to findings.","breadcrumbs":[{"label":"Platform"}]},{"id":"MtggX3t55b2BwW9thVOd","title":"Events","pathname":"/docs/platform/events","siteSpaceId":"sitesp_rP7D4","description":"Get notified when changes occur.","breadcrumbs":[{"label":"Platform"}]},{"id":"QVrCXwRcuy8YWA5L25VR","title":"Event Rules","pathname":"/docs/platform/events/alerts","siteSpaceId":"sitesp_rP7D4","description":"Configure notifications for critical events across your attack surface.","breadcrumbs":[{"label":"Platform"},{"label":"Events"}]},{"id":"YGPGI3DWhU93ht22TqCm","title":"Event Types","pathname":"/docs/platform/events/event-types","siteSpaceId":"sitesp_rP7D4","description":"Event Types that can be configured to send you alerts.","breadcrumbs":[{"label":"Platform"},{"label":"Events"}]},{"id":"YTehREXjdGkzzJiPdfS4","title":"PCI Compliance","pathname":"/docs/platform/compliance","siteSpaceId":"sitesp_rP7D4","description":"Manage PCI Compliance for your assets.","breadcrumbs":[{"label":"Platform"}]},{"id":"iq99K8aC1ETIXaLg4FrK","title":"Automations","pathname":"/docs/platform/automations","siteSpaceId":"sitesp_rP7D4","description":"Automatically manage targets, assets, and issues.","breadcrumbs":[{"label":"Platform"}]},{"id":"9MHp34AnlWBtHHKd8zYQ","title":"Target Automations","pathname":"/docs/platform/automations/target-automations","siteSpaceId":"sitesp_rP7D4","description":"Automatically manage targets.","breadcrumbs":[{"label":"Platform"},{"label":"Automations"}]},{"id":"C1nw6JPFANUfnI7qZdjI","title":"Asset Automations","pathname":"/docs/platform/automations/asset-automations","siteSpaceId":"sitesp_rP7D4","description":"Automatically manage assets.","breadcrumbs":[{"label":"Platform"},{"label":"Automations"}]},{"id":"LufgSbZ6QLesMghzjddC","title":"Target Issue Automations","pathname":"/docs/platform/automations/target-issue-automations","siteSpaceId":"sitesp_rP7D4","description":"Automatically manage target issues.","breadcrumbs":[{"label":"Platform"},{"label":"Automations"}]},{"id":"SiGxRuk09i75KMaZKKKA","title":"Projects","pathname":"/docs/platform/projects","siteSpaceId":"sitesp_rP7D4","description":"Manage Projects and additional services.","breadcrumbs":[{"label":"Platform"}]},{"id":"roB5GvdSYWZuDll40rQK","title":"Penetration Testing","pathname":"/docs/platform/projects/penetration-testing","siteSpaceId":"sitesp_rP7D4","description":"Penetration Testing services.","breadcrumbs":[{"label":"Platform"},{"label":"Projects"}]},{"id":"D6EKBN1zMURKbmh4Tcnj","title":"Other Projects","pathname":"/docs/platform/projects/other-projects","siteSpaceId":"sitesp_rP7D4","description":"Additional projects that we can assist you with.","breadcrumbs":[{"label":"Platform"},{"label":"Projects"}]},{"id":"wAXHj4RxJWfoupQTRhtZ","title":"Settings","pathname":"/docs/platform/settings","siteSpaceId":"sitesp_rP7D4","breadcrumbs":[{"label":"Platform"}]},{"id":"q2VakH6jaBrHUwxNZPHD","title":"Advanced Settings","pathname":"/docs/platform/settings/advanced-settings","siteSpaceId":"sitesp_rP7D4","breadcrumbs":[{"label":"Platform"},{"label":"Settings"}]},{"id":"YqbRS2EcrRhffl1YgsMg","title":"Discovery Integrations","pathname":"/docs/integrations/discovery-integrations","siteSpaceId":"sitesp_rP7D4","description":"Automatically sync asset information with cloud providers.","breadcrumbs":[{"label":"Integrations"}]},{"id":"q9Fs9whLT9osrVfx5u2B","title":"Azure","pathname":"/docs/integrations/discovery-integrations/azure","siteSpaceId":"sitesp_rP7D4","description":"Import assets from Azure DNS.","breadcrumbs":[{"label":"Integrations"},{"label":"Discovery Integrations"}]},{"id":"m6n5fiIx7E3T32dYAAMi","title":"Google Cloud","pathname":"/docs/integrations/discovery-integrations/gcp","siteSpaceId":"sitesp_rP7D4","description":"Import assets from Google Cloud DNS.","breadcrumbs":[{"label":"Integrations"},{"label":"Discovery Integrations"}]},{"id":"YIJx3jkrrXBpB18v68fW","title":"AWS","pathname":"/docs/integrations/discovery-integrations/aws","siteSpaceId":"sitesp_rP7D4","description":"You can import new assets directly from your AWS by giving Halo Security restricted read access.","breadcrumbs":[{"label":"Integrations"},{"label":"Discovery Integrations"}]},{"id":"Gjbg4bgZNofRI2TyNP3G","title":"Cloudflare","pathname":"/docs/integrations/discovery-integrations/cloudflare","siteSpaceId":"sitesp_rP7D4","description":"Import assets using a Cloudflare API token.","breadcrumbs":[{"label":"Integrations"},{"label":"Discovery Integrations"}]},{"id":"l00izJgB9c3FahAYEK8o","title":"Linode","pathname":"/docs/integrations/discovery-integrations/linode","siteSpaceId":"sitesp_rP7D4","description":"Import assets from Linode.","breadcrumbs":[{"label":"Integrations"},{"label":"Discovery Integrations"}]},{"id":"2Gcg6tLoHaSbnUS5yKMP","title":"Akamai","pathname":"/docs/integrations/discovery-integrations/akamai","siteSpaceId":"sitesp_rP7D4","description":"Import assets from Akamai.","breadcrumbs":[{"label":"Integrations"},{"label":"Discovery Integrations"}]},{"id":"q1aehGViCUSKUco3hKVV","title":"Oracle Cloud Infrastructure","pathname":"/docs/integrations/discovery-integrations/oci","siteSpaceId":"sitesp_rP7D4","description":"Import assets from OCI.","breadcrumbs":[{"label":"Integrations"},{"label":"Discovery Integrations"}]},{"id":"jMYlHIrW9Ira9Oce3yBy","title":"F5","pathname":"/docs/integrations/discovery-integrations/f5","siteSpaceId":"sitesp_rP7D4","description":"Import assets from F5 BIG-IP.","breadcrumbs":[{"label":"Integrations"},{"label":"Discovery Integrations"}]},{"id":"KrQOHvaD98fCksXX3xwd","title":"GoDaddy","pathname":"/docs/integrations/discovery-integrations/godaddy","siteSpaceId":"sitesp_rP7D4","description":"Import DNS zones and records from GoDaddy.","breadcrumbs":[{"label":"Integrations"},{"label":"Discovery Integrations"}]},{"id":"xzW1Yg5XgKoZXhhWT4Jw","title":"Wiz","pathname":"/docs/integrations/discovery-integrations/wiz","siteSpaceId":"sitesp_rP7D4","description":"Import assets from Wiz.","breadcrumbs":[{"label":"Integrations"},{"label":"Discovery Integrations"}]},{"id":"1ebjsH1q1sc0u1x4H5yr","title":"Axonius","pathname":"/docs/integrations/discovery-integrations/axonius","siteSpaceId":"sitesp_rP7D4","description":"Import assets from Axonius.","breadcrumbs":[{"label":"Integrations"},{"label":"Discovery Integrations"}]},{"id":"7p8vkWaPQ9KKptowYtJk","title":"Fortigate","pathname":"/docs/integrations/discovery-integrations/fortigate","siteSpaceId":"sitesp_rP7D4","description":"Import assets from Fortigate.","breadcrumbs":[{"label":"Integrations"},{"label":"Discovery Integrations"}]},{"id":"Wn0AQFxV782SWSEdUPes","title":"Meraki","pathname":"/docs/integrations/discovery-integrations/meraki","siteSpaceId":"sitesp_rP7D4","description":"Import assets from Meraki.","breadcrumbs":[{"label":"Integrations"},{"label":"Discovery Integrations"}]},{"id":"nctQ1Bo6BgiJ3vTeLrKQ","title":"HTTP","pathname":"/docs/integrations/discovery-integrations/http","siteSpaceId":"sitesp_rP7D4","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Discovery Integrations"}]},{"id":"nT3gTH33nHuurgshUwTb","title":"Workflow Integrations","pathname":"/docs/integrations/workflow-integrations","siteSpaceId":"sitesp_rP7D4","description":"Connect the tools you use for managing issues and alerts.","breadcrumbs":[{"label":"Integrations"}]},{"id":"pPbXPV7DEZZdFKR4py4U","title":"Slack","pathname":"/docs/integrations/workflow-integrations/slack","siteSpaceId":"sitesp_rP7D4","description":"Receive real-time notifications about your attack surface directly in your Slack workspace.","breadcrumbs":[{"label":"Integrations"},{"label":"Workflow Integrations"}]},{"id":"v6MDIeOgYARmmYYBLtmE","title":"Google Chat","pathname":"/docs/integrations/workflow-integrations/google-chat","siteSpaceId":"sitesp_rP7D4","description":"Receive real-time notifications about your attack surface directly in Google Chat.","breadcrumbs":[{"label":"Integrations"},{"label":"Workflow Integrations"}]},{"id":"G1yPJlbCrCzQN86FfscU","title":"Jira","pathname":"/docs/integrations/workflow-integrations/jira","siteSpaceId":"sitesp_rP7D4","description":"Automatically create tickets in Atlassian Jira for streamlined issue remediation.","breadcrumbs":[{"label":"Integrations"},{"label":"Workflow Integrations"}]},{"id":"YxSsdzYtMzXT21ecwefx","title":"Linear","pathname":"/docs/integrations/workflow-integrations/linear","siteSpaceId":"sitesp_rP7D4","description":"Automatically create issues in Linear for streamlined vulnerability remediation.","breadcrumbs":[{"label":"Integrations"},{"label":"Workflow Integrations"}]},{"id":"Vi7tg3GGnoPEHdkNGKLC","title":"Telegram","pathname":"/docs/integrations/workflow-integrations/telegram","siteSpaceId":"sitesp_rP7D4","description":"Receive real-time alerts directly in your Telegram account.","breadcrumbs":[{"label":"Integrations"},{"label":"Workflow Integrations"}]},{"id":"7qEIGWymSbLeQZjXx5i8","title":"PagerDuty","pathname":"/docs/integrations/workflow-integrations/pagerduty","siteSpaceId":"sitesp_rP7D4","description":"Receive events in PagerDuty","breadcrumbs":[{"label":"Integrations"},{"label":"Workflow Integrations"}]},{"id":"YoceL2TEMYj7EROXehdJ","title":"Splunk","pathname":"/docs/integrations/workflow-integrations/splunk","siteSpaceId":"sitesp_rP7D4","description":"Send Halo Security events directly to your Splunk instance for advanced log analysis and correlation.","breadcrumbs":[{"label":"Integrations"},{"label":"Workflow Integrations"}]},{"id":"8oH5W6A28SB7rr5IxAtv","title":"AWS","pathname":"/docs/integrations/workflow-integrations/aws","siteSpaceId":"sitesp_rP7D4","description":"Send Halo Security events directly to AWS services for automated response and integration.","breadcrumbs":[{"label":"Integrations"},{"label":"Workflow Integrations"}]},{"id":"lX6iSxb4F8sBqjxlcGeg","title":"Vanta","pathname":"/docs/integrations/workflow-integrations/vanta","siteSpaceId":"sitesp_rP7D4","description":"Automatically manage and track your compliance initiatives with Vanta.","breadcrumbs":[{"label":"Integrations"},{"label":"Workflow Integrations"}]},{"id":"eWHqy5fR33vWIMLUWr7x","title":"Microsoft Teams","pathname":"/docs/integrations/workflow-integrations/microsoft-teams","siteSpaceId":"sitesp_rP7D4","description":"Receive real-time notifications about your attack surface directly in Microsoft Teams.","breadcrumbs":[{"label":"Integrations"},{"label":"Workflow Integrations"}]},{"id":"SYJPWwun2u4K5DGZXbap","title":"ArmorCode","pathname":"/docs/integrations/workflow-integrations/armorcode","siteSpaceId":"sitesp_rP7D4","breadcrumbs":[{"label":"Integrations"},{"label":"Workflow Integrations"}]},{"id":"vbvxohRGg6nwl7YbUaj2","title":"Power BI","pathname":"/docs/integrations/workflow-integrations/powerbi","siteSpaceId":"sitesp_rP7D4","description":"Analyze your Halo Security attack surface data in Microsoft Power BI.","breadcrumbs":[{"label":"Integrations"},{"label":"Workflow Integrations"}]},{"id":"dZ05Xdk5MOi8K8zhMGnC","title":"Zapier","pathname":"/docs/integrations/workflow-integrations/zapier","siteSpaceId":"sitesp_rP7D4","description":"Integrate with Zapier to connect your Halo Security account to 3rd party applications.","breadcrumbs":[{"label":"Integrations"},{"label":"Workflow Integrations"}]},{"id":"1iEzbVFwFbWqR93gZlgZ","title":"Slack (via Zapier)","pathname":"/docs/integrations/workflow-integrations/zapier/slack-via-zapier","siteSpaceId":"sitesp_rP7D4","description":"How to connect Halo Security to Slack via Zapier","breadcrumbs":[{"label":"Integrations"},{"label":"Workflow Integrations"},{"label":"Zapier"}]},{"id":"Sg6JhvPYJXlSylrzAiRq","title":"Jira (via Zapier)","pathname":"/docs/integrations/workflow-integrations/zapier/jira-via-zapier","siteSpaceId":"sitesp_rP7D4","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Workflow Integrations"},{"label":"Zapier"}]},{"id":"HEmssU4tJ6jIt1AIAXw5","title":"Service Now (via Zapier)","pathname":"/docs/integrations/workflow-integrations/zapier/service-now-via-zapier","siteSpaceId":"sitesp_rP7D4","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Workflow Integrations"},{"label":"Zapier"}]},{"id":"XJhvmApgXJIxJCZ1CTJ3","title":"Feeds","pathname":"/docs/integrations/feeds","siteSpaceId":"sitesp_rP7D4","description":"Share data from your Halo Security account with other security tools.","breadcrumbs":[{"label":"Integrations"}]},{"id":"WlrSAVes9J4KtSNxUHvN","title":"Using Feeds with Google Sheets","pathname":"/docs/integrations/feeds/using-feeds-with-google-sheets","siteSpaceId":"sitesp_rP7D4","description":"Integrate Halo Security data directly into Google Sheets for custom analysis and reporting of your attack surface data.","breadcrumbs":[{"label":"Integrations"},{"label":"Feeds"}]},{"id":"sjvuYvjdLkDX9qKEeoTk","title":"API","pathname":"/docs/integrations/api","siteSpaceId":"sitesp_rP7D4","description":"Halo Security offers API access for many features of the platform.","breadcrumbs":[{"label":"Integrations"}]},{"id":"p4Gb5h6stgfHwv0tUT4d","title":"Webhooks","pathname":"/docs/integrations/webhooks","siteSpaceId":"sitesp_rP7D4","description":"","breadcrumbs":[{"label":"Integrations"}]},{"id":"UdVzrAV0EWYhSTvYm3JR","title":"Account Overview","pathname":"/docs/account/account-overview","siteSpaceId":"sitesp_rP7D4","description":"","breadcrumbs":[{"label":"Account"}]},{"id":"AyVI04nMqfJ68me75VNB","title":"Account Security","pathname":"/docs/account/account-overview/account-security","siteSpaceId":"sitesp_rP7D4","description":"Protecting your Halo Security account.","breadcrumbs":[{"label":"Account"},{"label":"Account Overview"}]},{"id":"IQaMm9Ve9jD2X3aACLnA","title":"Users","pathname":"/docs/account/users","siteSpaceId":"sitesp_rP7D4","description":"Add and manage users on your account.","breadcrumbs":[{"label":"Account"}]},{"id":"FtRgiEedi3XaT6et5oku","title":"Roles & Permissions","pathname":"/docs/account/users/roles-and-permissions","siteSpaceId":"sitesp_rP7D4","description":"Roles and permissions limit user access to data in your organization's account.","breadcrumbs":[{"label":"Account"},{"label":"Users"}]}]}