Documentation

User Manual

Complete reference for all features in Pulse v3.1

Getting Started

Pulse runs locally on your Windows machine. Open your browser and navigate to:

http://localhost:5000
Default usernameadmin
Default passwordadmin123 — change immediately
License activationSettings → License → paste key
Live syslogSettings → Syslog → Start Listener

Threat Detection

21 automated rules run every 5 minutes. Threats are ranked Critical, High, Medium, Low. Click any threat to see evidence, block the IP, or open a PSA ticket.

📊 Analytics

30-day traffic timeline, protocol breakdown, top source IPs, and geographic map. Updates automatically. Requires at least 1 day of log data.

Security Health Score

0–100 score with A–F grade. Factors include active threats, drop rate, high-risk IPs, and compliance posture. Refreshes every 2 minutes.

📋 Compliance Reports

One-click PCI DSS v4.0, HIPAA, SOC 2, Audit Evidence ZIP, and Cyber Insurance reports. Professional and Enterprise tiers only.

🎫 PSA Tickets

ConnectWise Manage and Autotask supported. Configure credentials in Settings → PSA / Tickets. Create tickets from any threat row with one click.

🔥 Firewall API

Block IPs directly on SonicWall or FortiGate from the threat dashboard. Configure in Settings → SonicWall API or FortiGate API. Enterprise tier.

Settings Reference

Syslog, Email Alerts, Users, License, Portal, Auto-Reports, 2FA, PSA, SonicWall API, FortiGate API, White-Label, Webhooks.

⚡ All 21 Detection Rules

RuleSeverityWhat it detects
Port ScanHighRapid connections across multiple ports
Brute Force SSHHigh10+ failed SSH attempts in 60 seconds
Brute Force RDPHighRepeated failed RDP login attempts
C2 BeaconCriticalRegular outbound to known C2 servers
Data ExfiltrationHighUnusually large outbound data transfers
DNS TunnelingMediumEncoded data in DNS queries
CryptominingMediumConnections to mining pools (3333,4444,5555)
Tor Exit NodeMediumTraffic to/from known Tor exit nodes
Geo Block: High RiskMediumTraffic from RU, CN, KP, IR, SY
DDoS PatternCriticalFlood of packets exceeding thresholds
Lateral MovementHighInternal IP scanning other internal IPs
AbuseIPDB MatchHighIP with abuse score above 75%
Repeated DropsMediumIP triggering 50+ drops in one hour
SYN FloodCriticalSYN packets without ACK responses
ICMP FloodMediumExcessive ICMP ping traffic
DNS AmplificationHighAmplification-pattern DNS responses
Web ScanMediumRapid HTTP requests across multiple paths
FTP Brute ForceMediumRepeated failed FTP authentication
New Admin ProtocolLowFirst-time SSH/RDP to an admin IP
C2 BeaconCriticalTraffic matching zero-day signatures
Zero-day PatternCriticalKnown zero-day exploit signatures

License Tiers

Starter
$49/mo
Log search, 21 threat rules, health score, PDF reports, email alerts
Professional
$149/mo
Everything + live syslog, PCI/HIPAA/SOC 2, PSA, AI explanations, client portal
Enterprise
$299/mo
Everything + white-label, fleet dashboard, firewall API block, config backup