{% extends "base.html" %} {% block title %}Settings - Hermetic Suite{% endblock %} {% block content %}

Network Configuration

Comma-separated list of network ranges to scan during discovery

System Information

nmap Path: {{ config.NMAP_PATH }}
Default Timeout: {{ config.SCAN_TIMEOUT }}s

Version Information

Installed Version: {{ config.VERSION | default('1.0.0') }}
Latest Version: Checking...
Last checked: Never

Scan Queue Configuration

Number of parallel scan threads (1-16). Restart required after changes.
{% if scan_worker_info.status %}

Current Status

Active Workers: {{ scan_worker_info.status.active_workers }} / {{ scan_worker_info.status.max_workers }}
Running Scans: {{ scan_worker_info.status.running | length }}
Pending: {{ scan_worker_info.status.pending_count }}
{% endif %}

System Capabilities

These capabilities are configured during installation via setup.sh. To change them, update /etc/sudoers.d/hsuite and /opt/hsuite/.env.

Capability Status Description
Sudo nmap {% if system_capabilities.nmap_sudo %} Enabled {% else %} Disabled {% endif %} Run nmap with elevated privileges for TTL-based host type detection (load balancers, network devices)
Self-restart {% if system_capabilities.self_restart %} Enabled {% else %} Disabled {% endif %} Allow Hermetic Suite to restart itself after plugin updates (via systemctl)
{% if system_capabilities.self_restart %}
Restart Hermetic Suite to apply configuration or plugin changes.
{% endif %} {% if not system_capabilities.nmap_sudo or not system_capabilities.self_restart %}
To enable a capability:
    {% if not system_capabilities.nmap_sudo %}
  1. For sudo nmap: echo "hsuite ALL=(ALL) NOPASSWD: /usr/bin/nmap" | sudo tee -a /etc/sudoers.d/hsuite
  2. {% endif %} {% if not system_capabilities.self_restart %}
  3. For self-restart: echo "hsuite ALL=(ALL) NOPASSWD: /usr/bin/systemctl restart hsuite" | sudo tee -a /etc/sudoers.d/hsuite
  4. {% endif %}
  5. Add NMAP_USE_SUDO=true and/or SELF_RESTART_ENABLED=true to /opt/hsuite/.env
  6. Restart Hermetic Suite: sudo systemctl restart hsuite
{% endif %}
{% if current_user and current_user.is_admin %}

Email Notifications (SMTP)

Configure SMTP settings for email notifications from plugins. Users can set their email address in their profile to receive alerts.

Leave blank to keep existing password
{% endif %}

Scan Profiles

{% if profiles %} {% for profile in profiles %} {% endfor %}
Name Type Ports nmap Args Timeout Actions
{{ profile.name }} {% if profile.description %}
{{ profile.description }} {% endif %}
{{ profile.scan_type.value }} {{ profile.port_range }} {{ profile.nmap_args }} {{ profile.timeout_per_host }}s
{% else %}

No scan profiles configured. Add one to customize your scans.

{% endif %}
{% if current_user and current_user.is_admin %}

SSH Keys

{% if ssh_keys %} {% for key in ssh_keys %} {% endfor %}
Name Type Fingerprint Default Created Actions
{{ key.name }} {{ key.key_type }} {{ key.fingerprint or 'N/A' }} {% if key.is_default %} Default {% else %}
{% endif %}
{{ key.created_at.strftime('%Y-%m-%d') }}
{% else %}

No SSH keys configured. Add a key to enable authenticated scanning.

{% endif %}

User Management

{% if users %} {% for user in users %} {% endfor %}
Username Email Role Status Last Login Actions
{{ user.username }} {{ user.email or '-' }} {{ 'Admin' if user.is_admin else 'User' }} {{ 'Active' if user.is_active else 'Disabled' }} {{ user.last_login.strftime('%Y-%m-%d %H:%M') if user.last_login else 'Never' }} {% if user.username != current_user.username %}
{% else %} (you) {% endif %}
{% else %}

No users found.

{% endif %}
{% endif %}

Common nmap Arguments

Argument Description
-sVService version detection
-sCRun default NSE scripts
-OOS detection (requires root)
-sSTCP SYN scan (stealthy, requires root)
-sTTCP connect scan (no root required)
-sUUDP scan (slow)
-AAggressive scan (OS, version, scripts, traceroute)
-T4Timing template (0-5, higher = faster)
--script vulnersUse vulners.com vulnerability database
{% endblock %}