v1.0.0Latest28 changes
Initial Release
Netlier launches as a comprehensive security intelligence platform for managed service providers and IT consultants.
FeatureImprovementSecurity
Feature
- External reconnaissance with automated domain, DNS, SSL, HTTP header, and port analysis
- Microsoft 365 tenant security audits via service account or OAuth app registration
- Penetration testing toolkit with guided scan workflows and finding management
- Universal firewall configuration analysis supporting FortiGate, Palo Alto, Cisco ASA, pfSense, and 9 additional vendors
- Continuous uptime monitoring with configurable check intervals and alert thresholds
- SSL certificate expiration monitoring with automated notifications
- AI-powered risk analysis and remediation recommendations via integrated language model
- Professional PDF report generation with executive summary, findings detail, and compliance mapping
- White-label branding for customer-facing reports and client portal
- Client portal with read-only access to assessment results, compliance status, and remediation tracking
- Compliance mapping to CIS Controls v8, NIST CSF, ISO 27001, and GDPR frameworks
- Dark web and breach exposure monitoring across known data dumps and credential markets
- Phishing simulation campaigns with customizable templates and engagement tracking
- Scheduled and automated assessment workflows with cron-based execution
- Knowledge base for internal documentation and team reference
- Scan result import supporting Nmap XML, Nessus CSV, and generic CSV formats
- Asset inventory with automatic discovery and risk scoring
- Network topology visualization
- Real-time event streaming for assessment progress and monitoring alerts
Improvement
- Dashboard provides portfolio-level security posture overview across all customers
- Command palette (Cmd+K) for rapid navigation between customers, assessments, and features
- Keyboard-accessible navigation throughout the application
- Responsive layout optimized for desktop, tablet, and mobile viewports
Security
- AES-256-GCM encryption for all stored credentials and assessment results
- Invite-only registration with administrator-controlled access
- Role-based access control with admin and user permission tiers
- Rate limiting on authentication and sensitive API endpoints
- CSRF protection via HMAC-signed state tokens for OAuth flows