Skip to main content
All CollectionsThreats
How to create a custom threat
How to create a custom threat

This guide will walk you through the process of creating your own custom threats

Alan Butcher avatar
Written by Alan Butcher
Updated over a year ago

Congratulations on taking the first step towards securing your organisation by creating a custom threat on Defense.com! This guide will walk you through the simple process of creating a custom threat for a risk that was found outside of the Defense.com platform.

  1. Login to your Defense.com account and select the Threats icon from the left-hand menu.

  2. Next, click Threat List

  3. Once on the Threat List page, click on the "Add Custom Threat" button located in the top right corner of the page.


  4. You will now be redirected to a new page where you can input information about your custom threat manually. Here, you will need to provide the following details.

    Title: Give your threat a specific and descriptive title.

    Description: Describe your threat in as much detail as possible, including its cause and impact.

    Risk Score: Define the severity level of this threat from info, low, medium, high, and critical.

  5. Once you have provided the basic details of your threat, it's time to add remediation tasks. These are the tasks that need to be completed to resolve the threat. Here, you will need to provide the following details.

    Title: Give your remediation task a specific and descriptive title.

    Description: Describe the task in as much detail as possible, including the steps that need to be taken to complete it.

    You can add as many remediation tasks as you need to resolve the threat. To add a remediation task, click on the Add another remediation button. Clicking on the Remove remediation button removes that remediation and all of its contents

  6. Once you have provided all the necessary details about your custom threat and its remediation tasks, click on the Create threat button to create and save your threat.

  7. Once created, you can now view the threat and manage it from the Threat List!

That's it! 🎉 you have successfully created a custom threat which can be managed along side the threats detected by Defense.com.

Did this answer your question?