Jump to Content
Home
Guides
API Reference
Changelog
v5.80.0
v5.81.0
v5.82.0
v5.82.1
v6.0.0
v6.1.0
v6.2.0
v6.3.0
v6.4.0
v6.5.0
v6.5.1
v6.6.0
v6.6.1
v6.7.0
v6.8.0
v6.9.0-rev1
v6.9.0-rev2
v6.9.0
v6.9.2-rev0
v6.9.4-rev0
v6.9.5-rev0
v6.9.5-rev1
v6.9.6-rev0
v6.9.7-rev0
v6.9.8-rev0
v6.10.0
v6.11.0-rev1
v6.11.0
v6.11.1
v6.11.2-rev1
v6.11.2
v6.11.3
v6.12.0
v6.13.0
v6.14.0
v6.14.1
v6.14.2-rev1
v6.14.2
v6.15.0
v6.15.1
v6.15.2
v6.16.0
v6.16.1-rev1
v6.16.1-rev2
v6.16.1-rev3
v6.16.1-rev4
v6.16.1
v6.16.2
v6.16.3
v6.17.0
v6.18.0
v6.18.1
v6.18.2
v6.18.3
v6.19.0-rev1
v6.19.0
v6.19.1
v6.20.0
v6.20.1
v6.20.2
v6.20.3
Guides
v6.20.3
Home
Guides
API Reference
Changelog
Search
Setup
Setup General
Setup Classification
Setup Compliance Settings
Setup Email Settings
Setup Single Sign-On (SSO)
Setup Theming and Branding
Setup User Management and Roles
Roles
Setup Security Policies
Setup Cause Codes
Setup Facilities
Setup File System
Setup Functional Roles
Setup Modules and Features
Setup Risk Configuration
Setup Tags
Setup Service Accounts
Logs and Utilization
Security
Builders
Form Builder
Export Builder
Creating an Export Builder DOCX Template
Wayfinder Builder
Report Builder
Dashboard Builder
Questionnaire Builder
Questionnaire Rules
Features
RegML (AI)
RegML Explainer
RegML Author
RegML Auditor
RegML Extractor
Compliance Exports
eMASS Exports
eMASS Hardware Software List Export (.xlsx)
eMASS POAMs Export (.xlsx)
eMASS Ports and Protocols Export (.xlsx)
eMASS SAP/SAR Export (.xlsx)
eMASS SLCM Export (.xlsx)
FedRAMP Exports
FedRAMP CIS/CRM Export (.xlsx)
FedRAMP Inventory Export (.xlsx)
FedRAMP POAMs Export (.xlsx)
FedRAMP Risk Exposure Export (.xlsx)
FedRAMP Test Case Procedure Export (.xlsx)
Automation Manager
AD/LDAP
Microsoft Teams
Slack
Webhooks
Utilities
Builder Utility
Inheritance Utility
Categorization Utility
Deviations Utility
Date Extension Requests Utility
Recurrence Utility
Control Mapping Utility
Subsystems
Comments Subsystem
Files Subsystem
Links Subsystem
Kanban Subsystem
History Subsystem
Workflow Subsystem
Classification Subsystem
Time Travel Subsystem
Timeline Subsystem
Relationship Subsystem
Stakeholders Subsystem
Properties Subsystem
Data Subsystem
Workflow
News Feed
Workbench
3rd Party Risk
Continuous Monitoring
Evidence Management
Risk Management Framework (RMF)
Modules
Assets
Assessments
Assessment Plans
Capabilities
Case Management
Catalogues
Causal Analysis
Changes
Components
Data Calls
Evidence Locker
Exceptions
Incidents
Interconnections
Issues
Policies
Programs
Projects
Questionnaires
Requirements
Risks
Security Controls
Security Plans
Security Profiles
Supply Chain
Tasks
Threats
Threat Models
Command Line Interface (CLI)
Getting Started
CLI Configuration File
Orchestration and Scheduling
Running in a Docker Container
Internal CLI Libraries
About
Admin Actions
Assessment Editor
Catalog Tools
Compare
Config
Control Editor
Encrypt/Decrypt
Evidence
Health Check
Import
Init
Issue (POA&M) Editor
Login
Model
Commercial CLI Libraries
Active Directory (AD)
All Scanner Integrations
Amazon Web Services (AWS) Security Hub
Amazon Web Services (AWS) - Inspector
Amazon Web Services (AWS) ECR
Aqua
Azure
Burp Suite
Crowdstrike
Dependabot
GitLab
Google Cloud Provider (GCP)
IBM AppScan
Jira
Microsoft Defender
Microsoft InTune
Nexpose (Rapid 7)
NPM Audit
Okta
OpenText
Prisma
Qualys
Salesforce
ServiceNow
Sicura
Snyk
SonarCloud
STIG
Tenable Nessus
Tenable Security Center
Tenable Vulnerability Management (Formerly Tenable IO)
Veracode
Wiz
Xray
Extra CLI Libraries
Airflow
Server
Developer Documentation
Public/Government CLI Libraries
DHS CISA
eMASS
FedRAMP
NIST Control Sort
NIST OSCAL
Self-Hosting
Self-Hosting Installation
Getting Started
Prerequisites
Post-Deployment Steps
Multi-Tenancy
Sizing Guide
Upgrade Guide
Installation Options
Docker Standalone Deployment
Kubernetes Deployment
Podman Standalone Deployment
Local AI Server Deployment
Best Practices & Guides
Rapid Certification
FedRAMP Continuous Monitoring in RegScale
Understanding the RegScale Information Architecture
Building Security Plans and Conducting Assessments
Implementing the RMF
Understanding Cyber Security in RegScale
About
Support
Subprocessor List
Third Party Software
Powered by
Suggest
The General section contains high-level tenant configuration settings and license information. Administrators can customize the look and feel of the platform and manage key branding options.