With Workflows, you can prioritize what matters most. Define conditions on assets, findings, or vulnerabilities, then route alerts to the Plerion alerts dashboard or third-party tools such as Slack, Jira, or PagerDuty.

Default workflow

Plerion includes a default workflow that is already configured to detect and alert on high-risk scenarios:
  • Assets that are publicly exposed
  • Assets with a risk score greater than or equal to 9
  • Findings where potential attack paths have been identified
By default, alerts are sent to the Plerion alert engine. You can also extend actions to other integrations such as email, Slack, Jira, or PagerDuty.

Third-party integrations

You can set up workflows with the following third-party tools:
  • ClickUp
  • Drata
  • Email
  • Jira and Jira Security
  • Microsoft Teams
  • PagerDuty
  • ServiceNow
  • Slack
  • Vanta

Steps to create a new workflow

1

On the Plerion dashboard, go to Settings > Workflows

Sidebar navigation with Settings expanded and Workflows highlighted
2

Click Add workflow

Workflow page with Add workflow button on top
3

Enter a name and description

Turn on the Enabled toggle to activate the workflow and start receiving alerts.
Workflow page with name, description and Enabled toggle
4

Define your conditions

  • Add conditions for assets, findings, or vulnerabilities.
  • When multiple conditions are added, Plerion applies OR logic.
  • Click Run to preview results that match your conditions.
Add a workflow condition for assets, findings or vulnerabilities

Example of a workflow with conditions applied
5

Select where alerts should be delivered

Alerts that match the defined conditions will appear in your Plerion alerts dashboard and can also be sent to configured third-party integrations.
6

Click Save to create your workflow