diff --git a/content/de/security/10-security-scanner/10-introduction/_index.md b/content/de/security/10-security-scanner/10-introduction/_index.md
new file mode 100644
index 00000000..98df7a27
--- /dev/null
+++ b/content/de/security/10-security-scanner/10-introduction/_index.md
@@ -0,0 +1,10 @@
+---
+title: "Einleitung"
+linkTitle: "Einleitung"
+date: 2024-11-20T11:51:03+01:00
+type: "docs"
+weight: 10
+description: >
+ Einführung in den Security Scanner
+---
+
diff --git a/content/de/security/10-security-scanner/10-introduction/quickstart_guide/_index.md b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/_index.md
new file mode 100644
index 00000000..05d7326e
--- /dev/null
+++ b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/_index.md
@@ -0,0 +1,70 @@
+---
+title: "Security Scanner - Schnelleinstieg"
+linkTitle: "Security Scanner - Schnelleinstieg"
+date: 2024-11-20
+type: docs
+weight: 1
+description: "Schnelleinstieg in den Security Scanner"
+---
+
+# Security Scanner - Quickstart-Guide
+
+## Inhalt
+1. [Schnelleinstieg](#schnelleinstieg)
+2. [Ziel erstellen und validieren](#ziel-erstellen-und-validieren)
+3. [Scan-Aufgabe erstellen und starten](#scan-aufgabe-erstellen-und-starten)
+4. [Schwachstellenberichte anzeigen & auswerten](#schwachstellenberichte-anzeigen--auswerten)
+
+## 1. Schnelleinstieg
+
+Dieses Dokument dient Ihnen zum schnellen Einstieg in den Vulnerability Scanner und die damit verbundenen Selfservice-Funktionen. Dieser Artikel behandelt Schritt für Schritt, wie nach der initialen Anmeldung die Einrichtung einer vollständigen Scan-Aufgabe durchgeführt wird. Dieses Dokument setzt voraus, dass Sie sowohl Ihre Zugangsdaten (Benutzername und Kennwort) als auch Ihre Mandanten-URL bereits vorliegen haben. Mit diesen Daten gelangen Sie direkt in das Mandanten-Portal. Zusätzlich ist es hilfreich, die zu prüfenden IP-Adressen vorliegen zu haben. Diese können Sie auch im plusserver-Kundenportal einsehen.
+
+## 2. Ziel erstellen und validieren
+
+![Scan-Konfiguration Navigation](./ziel-erstellen.png)
+
+Über den Menüpunkt Scan-Konfiguration gelangen Sie zu dem Unterpunkt Ziele. Die Übersicht unterteilt sich in Interne und Externe Ziele. Bei internen Zielen handelt es sich um abgeschottete Netzwerke (z. B. Klasse-C-Netzwerke wie 10.0.0.0/8), die nicht über das Internet erreicht werden können. Interne Ziele können nur über das Vulnerability Scanner Gateway erreicht werden. Externe Ziele besitzen eine öffentliche IP-Adresse (z. B. 1.1.1.1), welche durch den Vulnerability Scanner direkt über das Internet erreicht werden kann.
+
+![Neues externes Ziel erstellen](./externes-ziel-erstellen.png)
+
+Um ein Ziel zu erstellen, klicken Sie auf "Neues externes Ziel erstellen". Danach geben Sie einen Namen und das zu scannende System an. Über "Erweiterte Einstellungen anzeigen" haben Sie die Möglichkeit, die zu prüfenden Ports, den Erreichbarkeitstest sowie Anmeldedaten für authentifizierte Prüfungen einzustellen. Nach dem Speichern des Ziels über "Ziel erstellen" wird Ihnen der Eintrag in der Übersicht angezeigt.
+
+Bevor der Schwachstellenscan gestartet werden kann, ist eine Verifizierung notwendig, um die missbräuchliche Untersuchung von IP-basierten System zu unterbinden. Hierzu klicken Sie auf das letzte Symbol unter der Spalte "Aktion".
+
+![Host-Validierung-1](./host-validierung-1.png)
+![Host-Validierung-2](./host-validierung-2.png)
+
+Im nächsten Schritt wird die Validierung mithilfe von "Host-Validierung anfragen" initiiert. Hierbei sind drei Optionen aufgeführt:
+
+1. **I am the owner**: Wählen Sie diese Option immer dann, wenn die IP-Adresse Ihrer Organisation zugeordnet ist und Sie dadurch befugt sind, eine Schwachstellenprüfung durchzuführen. Bitte wählen Sie diese Option zwingend, sofern Sie IP-Adressen von Ihren Systemen bei plusserver scannen! Falls Sie die anderen Optionen in diesem Fall wählen, kommt es zu unnötigen Verzögerungen.
+
+2. **Technical Contact Person**: Sie sind nicht der Eigentümer der IP-Adresse, haben aber einen Auftrag zur Schwachstellenprüfung, dann nutzen Sie bitte diese Option. Dabei wird eine E-Mail-Anfrage an die E-Mail-Adresse gesendet, die in dem RIPE-Eintrag hinterlegt ist. Der Eigentümer muss diesen Auftrag bestätigen, bevor die Schwachstellenprüfung ausgeführt werden kann. Dieser Vorgang kann einige Zeit in Anspruch nehmen - halten Sie ggf. Rücksprache mit dem Eigentümer.
+
+3. **Partner-Verifizierung**: Diese Option ist für die Validierung nicht vorgesehen.
+
+## 3. Scan-Aufgabe erstellen und starten
+
+![Scan-Aufgabe erstellen](./scan-erstellen.png)
+
+Mit dem zuvor erstellen Ziel kann nun eine Scan-Aufgabe erstellt und dieses dort eingebunden werden. Im Feld "Namen" können Sie ggf. den gleichen Namen wählen, den Sie auch beim Ziel vergeben haben. Unter "Ziel auswählen" geben Sie das gewünschte Ziel an.
+
+![Scanverwaltung](./scan-starten.png)
+
+Der Schwachstellenscan kann nun gestartet werden. Wechseln Sie hierzu über den Menü-Punkt "Scanverwaltung" auf die Übersicht der Scan-Aufgaben. Klicken Sie auf das Symbol zum Starten der Scan-Aufgabe.
+
+## 4. Schwachstellenberichte anzeigen & auswerten
+
+![Schwachstellenberichte](./schwachstellen-berichte-1.png)
+
+Sobald der Schwachstellenscan erfolgreich ausgeführt wurde, ändert sich der Status der Scan-Aufgabe in "Abgeschlossen". Um den Schwachstellenbericht anzuzeigen, klicken Sie auf die Zahl innerhalb der Spalte "Berichte".
+
+![Schwachstellenbericht Details](./schwachstellen-berichte-2.png)
+
+Nun sehen Sie eine Übersicht aller durchgeführten Schwachstellenscans. Über einen Klick auf das Symbol gelangen Sie zum Schwachstellenbericht.
+
+![Schwachstellenbericht Details 2](./schwachstellen-berichte-3.png)
+
+Sie haben diverse Möglichkeiten, um die Liste der Schwachstellen anzuzeigen und weiterzuverarbeiten. Hierzu zählt die Kachel- und Tabellenübersicht ebenso wie ein Export als PDF- oder XML-Dokument.
+
+**Wichtiger Hinweis für plusserver IP-Adressen**:
+Wählen Sie zwingend die Option "I am the owner" bei der Host-Validierung, um unnötige Verzögerungen zu vermeiden.
diff --git a/content/de/security/10-security-scanner/10-introduction/quickstart_guide/externes-ziel-erstellen.png b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/externes-ziel-erstellen.png
new file mode 100644
index 00000000..ffe1f3cc
Binary files /dev/null and b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/externes-ziel-erstellen.png differ
diff --git a/content/de/security/10-security-scanner/10-introduction/quickstart_guide/host-validierung-1.png b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/host-validierung-1.png
new file mode 100644
index 00000000..a9759c4b
Binary files /dev/null and b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/host-validierung-1.png differ
diff --git a/content/de/security/10-security-scanner/10-introduction/quickstart_guide/host-validierung-2.png b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/host-validierung-2.png
new file mode 100644
index 00000000..fef61f8c
Binary files /dev/null and b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/host-validierung-2.png differ
diff --git a/content/de/security/10-security-scanner/10-introduction/quickstart_guide/scan-erstellen.png b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/scan-erstellen.png
new file mode 100644
index 00000000..5095c12b
Binary files /dev/null and b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/scan-erstellen.png differ
diff --git a/content/de/security/10-security-scanner/10-introduction/quickstart_guide/scan-starten.png b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/scan-starten.png
new file mode 100644
index 00000000..d253201f
Binary files /dev/null and b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/scan-starten.png differ
diff --git a/content/de/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-1.png b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-1.png
new file mode 100644
index 00000000..e9733f9a
Binary files /dev/null and b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-1.png differ
diff --git a/content/de/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-2.png b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-2.png
new file mode 100644
index 00000000..86df9a04
Binary files /dev/null and b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-2.png differ
diff --git a/content/de/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-3.png b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-3.png
new file mode 100644
index 00000000..c73df6b1
Binary files /dev/null and b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-3.png differ
diff --git a/content/de/security/10-security-scanner/10-introduction/quickstart_guide/ziel-erstellen.png b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/ziel-erstellen.png
new file mode 100644
index 00000000..70e1f924
Binary files /dev/null and b/content/de/security/10-security-scanner/10-introduction/quickstart_guide/ziel-erstellen.png differ
diff --git a/content/de/security/10-security-scanner/20-documentation/_index.md b/content/de/security/10-security-scanner/20-documentation/_index.md
new file mode 100644
index 00000000..f9a559bb
--- /dev/null
+++ b/content/de/security/10-security-scanner/20-documentation/_index.md
@@ -0,0 +1,10 @@
+---
+title: "Dokumentation"
+linkTitle: "Dokumentation"
+date: 2024-11-20T11:50:51+01:00
+type: "docs"
+weight: 20
+description: >
+ Dokumentation für den Security Scanner
+---
+
diff --git a/content/de/security/10-security-scanner/30-tutorials/_index.md b/content/de/security/10-security-scanner/30-tutorials/_index.md
new file mode 100644
index 00000000..9b734526
--- /dev/null
+++ b/content/de/security/10-security-scanner/30-tutorials/_index.md
@@ -0,0 +1,9 @@
+---
+title: "Tutorials"
+linkTitle: "Tutorials"
+type: "docs"
+weight: 30
+date: 2024-02-27
+description: >
+ Tutorials für den Security Scanner
+---
diff --git a/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/_index.md b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/_index.md
new file mode 100644
index 00000000..61347d59
--- /dev/null
+++ b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/_index.md
@@ -0,0 +1,92 @@
+---
+title: "Security Scanner - Scan von internen IP-Adressen mit dem Gateway"
+linkTitle: "Security Scanner - Scan von internen IP-Adressen mit dem Gateway"
+date: 2024-11-20
+weight: 10
+description: "Anleitung zum Scannen interner IP-Adressen mit dem Gateway"
+type: docs
+---
+
+# Security Scanner - Scan von internen IP-Adressen mit dem Gateway
+
+## Einleitung
+
+Da nicht alle IP-Adressen Ihrer Infrastruktur von extern geprüft werden können, haben Sie die Möglichkeit ein Gateway einzurichten. Mithilfe dessen können auch isolierte Netzwerke (z. B. RfC-1918) auf Schwachstellen hin überprüft werden.
+
+# Gateway installieren
+
+## Gateway Image herunterladen
+
+Navigieren Sie auf https://sec-scan.psmanaged.com/ui/gsp/entities/gateway/list/. Dort wählen Sie die vorhandene Plattform aus und laden das Image runter.
+
+![Gateway Image herunterladen](./vmware-download.png)
+
+## Image in den Katalog der vAPP-Vorlagen Ihrer PlusCloud hochladen
+
+![vAPP-Vorlagen](./vapp-vorlagen.png)
+
+## Neue virtuelle Maschine anlegen
+
+![Neue VM anlegen](./neue-vm.png)
+
+## Hostnamen der VM angeben und Template auswählen
+
+![Hostname und Template](./hostname-template.png)
+
+## Netzwerk & IP-Adresse einstellen
+
+![Netzwerk Einstellungen](./netzwerk-einstellungen.png)
+
+## Firewall einstellen
+
+Um in Schritt (2.3) Web-UI des Gateways öffnen das Gateway via Web-GUI konfigurieren zu können, muss die interne IP-Adresse des Gateways mithilfe von SNAT-, DNAT- und Firewall-Regeln über eine öffentlich erreichbare IP-Adresse Ihres Edge-Gateways verfügbar gemacht werden.
+
+## Mit der VM-Konsole verbinden
+
+![Mit VM verbinden](./vm-verbinden.png)
+Nachdem der Login-Prompt angezeigt wird, muss als Benutzername und Passwort admin angegeben werden.
+
+## Network configuration auswählen
+
+![Network Configuration](./network-config.png)
+
+## Informationen der Netzwerkkonfiguration einstellen
+
+![Network Info](./network-info.png)
+
+## Netzwerkverbindung zum Security Scanner testen
+
+![Netzwerktest](./network-test.png)
+
+## Gateway configuration auswählen
+
+![Gateway Configuration](./gateway-config.png)
+
+## Set web password auswählen & Passwort vergeben
+
+![Web Password](./web-password.png)
+
+# Gateway konfigurieren
+
+## Neues Gateway erstellen
+
+![Gateway erstellen](./gateway-create.png)
+Bitte geben Sie eine weitere freie IP-Adresse aus dem Netzwerk an, in dem Sie das Gateway installiert haben.
+
+## Token kopieren
+
+Um das Gateway mit dem Security-Scanner zu verbinden, ist eine Authentifizierung und Verschlüsselung notwendig. Hierzu kopieren Sie den API-Schlüssel aus den Einstellungen des Gateways heraus.
+
+![Token Configuration](./token-config.png)
+
+## Web-UI des Gateways öffnen
+
+Sie haben in Schritt (1.6) Firewall einstellen das Gateway über eine öffentlich erreichbare IP-Adresse verfügbar gemacht. Geben Sie die IP-Adresse des Gateways nun im Browser ein und melden sich mithilfe des vergebenen Web-Passworts an (z. B. https://195.252.XXX.XXX).
+
+![Web UI](./web-ui.png)
+
+## Status des Gateways überprüfen
+
+![Gateway Status](./gateway-status.png)
+
+Das Gateway ist nun eingerichtet. Sie können beim Anlegen einer Scan-Aufgabe das Gateway für die Prüfung auswählen.
diff --git a/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-config.png b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-config.png
new file mode 100644
index 00000000..883a07ff
Binary files /dev/null and b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-config.png differ
diff --git a/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-create.png b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-create.png
new file mode 100644
index 00000000..f815dc41
Binary files /dev/null and b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-create.png differ
diff --git a/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-status.png b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-status.png
new file mode 100644
index 00000000..ab93b91a
Binary files /dev/null and b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-status.png differ
diff --git a/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/hostname-template.png b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/hostname-template.png
new file mode 100644
index 00000000..dbc16bdf
Binary files /dev/null and b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/hostname-template.png differ
diff --git a/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-config.png b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-config.png
new file mode 100644
index 00000000..7ac41b0e
Binary files /dev/null and b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-config.png differ
diff --git a/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-info.png b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-info.png
new file mode 100644
index 00000000..eb7c1181
Binary files /dev/null and b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-info.png differ
diff --git a/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-test.png b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-test.png
new file mode 100644
index 00000000..f45ba3b4
Binary files /dev/null and b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-test.png differ
diff --git a/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/netzwerk-einstellungen.png b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/netzwerk-einstellungen.png
new file mode 100644
index 00000000..d0ede8f0
Binary files /dev/null and b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/netzwerk-einstellungen.png differ
diff --git a/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/neue-vm.png b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/neue-vm.png
new file mode 100644
index 00000000..34de1bd1
Binary files /dev/null and b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/neue-vm.png differ
diff --git a/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/token-config.png b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/token-config.png
new file mode 100644
index 00000000..5e456f6d
Binary files /dev/null and b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/token-config.png differ
diff --git a/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/vapp-vorlagen.png b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/vapp-vorlagen.png
new file mode 100644
index 00000000..7ffb4d7f
Binary files /dev/null and b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/vapp-vorlagen.png differ
diff --git a/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/vm-verbinden.png b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/vm-verbinden.png
new file mode 100644
index 00000000..bad420cc
Binary files /dev/null and b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/vm-verbinden.png differ
diff --git a/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/vmware-download.png b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/vmware-download.png
new file mode 100644
index 00000000..bbc8f072
Binary files /dev/null and b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/vmware-download.png differ
diff --git a/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/web-password.png b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/web-password.png
new file mode 100644
index 00000000..5c3ce9fd
Binary files /dev/null and b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/web-password.png differ
diff --git a/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/web-ui.png b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/web-ui.png
new file mode 100644
index 00000000..ba6b989a
Binary files /dev/null and b/content/de/security/10-security-scanner/30-tutorials/scan_interne_adressen/web-ui.png differ
diff --git a/content/de/security/10-security-scanner/40-releasenotes/_index.md b/content/de/security/10-security-scanner/40-releasenotes/_index.md
new file mode 100644
index 00000000..be2ecca9
--- /dev/null
+++ b/content/de/security/10-security-scanner/40-releasenotes/_index.md
@@ -0,0 +1,10 @@
+---
+title: "Release Notes"
+linkTitle: "Release Notes"
+date: 2024-11-20T11:51:13+01:00
+type: "docs"
+weight: 40
+description: >
+ Release Notes für den Security Scanner
+---
+
diff --git a/content/de/security/10-security-scanner/_index.md b/content/de/security/10-security-scanner/_index.md
new file mode 100644
index 00000000..f894e44a
--- /dev/null
+++ b/content/de/security/10-security-scanner/_index.md
@@ -0,0 +1,11 @@
+---
+title: "Greenbone Security Scanner"
+linkTitle: "Security Scanner"
+date: 2024-11-20T12:27:06+01:00
+type: "docs"
+weight: 21
+description: >
+ Der Security Scanner ermöglicht Ihnen die Identifizierung von Schwachstellen
+ in Ihren internen und externen Systemen. Er bietet umfassende Scanning-Funktionen
+ und detaillierte Berichterstattung, um die Sicherheit Ihrer Infrastruktur zu gewährleisten.
+---
diff --git a/content/de/security/20-siem-reporting/10-introduction/_index.md b/content/de/security/20-siem-reporting/10-introduction/_index.md
new file mode 100644
index 00000000..3256d091
--- /dev/null
+++ b/content/de/security/20-siem-reporting/10-introduction/_index.md
@@ -0,0 +1,9 @@
+---
+title: "Einführung"
+linkTitle: "Einführung"
+date: 2024-11-26T10:35:17+01:00
+type: docs
+description: "Einführung in das SIEM Reporting"
+weight: 10
+---
+
diff --git a/content/de/security/20-siem-reporting/10-introduction/reporting-guide/_index.md b/content/de/security/20-siem-reporting/10-introduction/reporting-guide/_index.md
new file mode 100644
index 00000000..35059f84
--- /dev/null
+++ b/content/de/security/20-siem-reporting/10-introduction/reporting-guide/_index.md
@@ -0,0 +1,75 @@
+---
+title: "Anleitung zum Reporting"
+linkTitle: "Anleitung zum Reporting"
+date: 2024-11-26
+type: docs
+description: "Anleitung zur Verwendung der Reporting Dashboards"
+type: docs
+---
+# Reporting Guide
+
+Sie finden Ihre Reporting Dashboards unter https://reporting.plussecurity.io - klicken Sie dort auf „Mit SSO anmelden", um sich mit Ihren bekannten IDM-Anmeldedaten anzumelden.
+
+![Grafana Login Screen](./grafana-login.png)
+
+Nach der Anmeldung stehen Ihnen standardmäßig nur Berechtigungen für die „Main Org" zur Verfügung. Die Berechtigungen für weitere Organisationen oder Bereiche müssen manuell für jeden Benutzer eingerichtet werden.
+
+Um die Benutzer freizuschalten, eröffnen Sie bitte einen Service Request über unseren Help Desk und geben Sie dabei den Benutzernamen sowie die zugehörige E-Mail-Adresse an.
+
+Nachdem Ihre Freischaltung erfolgt ist, können Sie oben links Ihre Organisation auswählen. Keine Sorge – die „Main Org" ist die Standardorganisation und enthält keine Inhalte.
+
+Unter dem Burger-Menü finden Sie die folgenden Dashboards:
+
+![Grafana Menu](./grafana-menu.png)
+
+Verwenden Sie die Zeitauswahl oben rechts, um den gewünschten Zeitbereich für die Datenanzeige festzulegen (siehe Bild unten):
+
+![Time Selection](./grafana-time-selection.png)
+
+### EDR-Computer-Übersicht
+
+Dieses Dashboard zeigt einen Überblick über die Computer im EDR.
+
+- Ergebnis der aktuellen Computeranzahl in der EDR Platform
+ - Zeigt den täglichen Bericht der Computer im EDR
+- Ergebnis der Computeranzahl im letzten Monat
+ - Zeigt den Bericht vom 01. des Monats als Referenz
+- Aktuelle Endpoints mit Problemen
+ - Computer, deren Status nicht OK ist
+- Liste der Endpoints
+
+### EDR-Übersicht
+
+Dieses Dashboard zeigt Einblicke in die EDR-Plattform, aktuelle Alarme und Regeln, die ausgelöst wurden.
+
+- Übersicht über Offenses
+ - Tortendiagramm der Offenses
+- Anzahl der Ereignisse
+ - Gesamtanzahl der Ereignisse in SIEM
+- Top 10 Computer
+ - Top 10 der Computer, die in Ereignissen und Verstößen auftauchen
+- Top 10 der Regeln, die eine Offense ausgelöst haben
+- Top 10 der EDR-Ereignisse
+ - Top 10 der Ereignisse innerhalb des EDRs
+- Übersicht der Offenses
+
+Die Schwere eines Vorfalls wird basierend auf Relevanz, Glaubwürdigkeit und Schweregrad berechnet:
+
+**Relevanz**: Gibt an, wie stark der Vorfall Ihr Netzwerk beeinflussen könnte. Beispielsweise hat ein offener Port eine hohe Relevanz, da er ein potenzielles Einfallstor für Angriffe darstellt.
+
+**Glaubwürdigkeit**: Beschreibt die Verlässlichkeit des Vorfalls, basierend auf der Glaubwürdigkeitsbewertung der Protokollquelle. Die Glaubwürdigkeit steigt, wenn mehrere Quellen denselben Vorfall melden.
+
+**Schweregrad**: Bewertet das Bedrohungsniveau, das die Quelle in Bezug auf die Verteidigungsbereitschaft des Ziels darstellt. Ein schlecht geschütztes Ziel führt zu einem höheren Schweregrad.
+
+Diese Faktoren werden kombiniert, um die Gesamtschwere des Vorfalls zu bewerten und geeignete Gegenmaßnahmen zu priorisieren.
+
+### SOC-Übersicht
+
+Dieses Dashboard zeigt Einblicke in das SOC, aktuelle Verstöße und einen Überblick über die Daten, die sich derzeit im SOC befinden.
+
+- Übersicht der Offenses im Zeitverlauf
+ - Zeigt an, wann die gefundenen Offenses stattgefunden haben
+- Status der Angriffe
+ - Zeigt Details zu Offenses
+- Top-Benutzer
+ - Zeigt Top-Benutzer
diff --git a/content/de/security/20-siem-reporting/10-introduction/reporting-guide/grafana-login.png b/content/de/security/20-siem-reporting/10-introduction/reporting-guide/grafana-login.png
new file mode 100644
index 00000000..f98eb86e
Binary files /dev/null and b/content/de/security/20-siem-reporting/10-introduction/reporting-guide/grafana-login.png differ
diff --git a/content/de/security/20-siem-reporting/10-introduction/reporting-guide/grafana-menu.png b/content/de/security/20-siem-reporting/10-introduction/reporting-guide/grafana-menu.png
new file mode 100644
index 00000000..9633aa52
Binary files /dev/null and b/content/de/security/20-siem-reporting/10-introduction/reporting-guide/grafana-menu.png differ
diff --git a/content/de/security/20-siem-reporting/10-introduction/reporting-guide/grafana-time-selection.png b/content/de/security/20-siem-reporting/10-introduction/reporting-guide/grafana-time-selection.png
new file mode 100644
index 00000000..542db720
Binary files /dev/null and b/content/de/security/20-siem-reporting/10-introduction/reporting-guide/grafana-time-selection.png differ
diff --git a/content/de/security/20-siem-reporting/20-documentation/_index.md b/content/de/security/20-siem-reporting/20-documentation/_index.md
new file mode 100644
index 00000000..aba87019
--- /dev/null
+++ b/content/de/security/20-siem-reporting/20-documentation/_index.md
@@ -0,0 +1,8 @@
+---
+title: "Dokumentation"
+date: 2024-11-26T10:35:00+01:00
+type: docs
+description: "Dokumentation für das SIEM Reporting"
+weight: 20
+---
+
diff --git a/content/de/security/20-siem-reporting/30-tutorials/_index.md b/content/de/security/20-siem-reporting/30-tutorials/_index.md
new file mode 100644
index 00000000..c423c2c5
--- /dev/null
+++ b/content/de/security/20-siem-reporting/30-tutorials/_index.md
@@ -0,0 +1,8 @@
+---
+title: "Tutorials"
+date: 2024-11-26T10:35:21+01:00
+type: docs
+description: "Tutorials für das SIEM Reporting"
+weight: 30
+---
+
diff --git a/content/de/security/20-siem-reporting/40-releasenotes/_index.md b/content/de/security/20-siem-reporting/40-releasenotes/_index.md
new file mode 100644
index 00000000..ce6e0584
--- /dev/null
+++ b/content/de/security/20-siem-reporting/40-releasenotes/_index.md
@@ -0,0 +1,8 @@
+---
+title: "Release Notes"
+date: 2024-11-26T10:35:08+01:00
+type: docs
+description: "Release Notes für das SIEM Reporting"
+weight: 40
+---
+
diff --git a/content/de/security/20-siem-reporting/_index.md b/content/de/security/20-siem-reporting/_index.md
new file mode 100644
index 00000000..94679248
--- /dev/null
+++ b/content/de/security/20-siem-reporting/_index.md
@@ -0,0 +1,8 @@
+---
+title: "SIEM Reporting"
+date: 2024-11-26T10:34:52+01:00
+type: "docs"
+weight: 31
+description: Das SIEM Reporting ermöglicht Ihnen, die Sicherheitsereignisse aus Ihrem SIEM-System zu analyisieren.
+---
+
diff --git a/content/de/security/30-workload-protection/10-introduction/_index.md b/content/de/security/30-workload-protection/10-introduction/_index.md
new file mode 100644
index 00000000..5c47ef75
--- /dev/null
+++ b/content/de/security/30-workload-protection/10-introduction/_index.md
@@ -0,0 +1,9 @@
+---
+title: "Einführung"
+linkTitle: "Einführung"
+date: 2024-11-28T17:42:34+01:00
+type: docs
+weight: 10
+description: Einführung in die Workload Protection
+---
+
diff --git a/content/de/security/30-workload-protection/10-introduction/workload-protection-webui/_index.md b/content/de/security/30-workload-protection/10-introduction/workload-protection-webui/_index.md
new file mode 100644
index 00000000..203bb6bb
--- /dev/null
+++ b/content/de/security/30-workload-protection/10-introduction/workload-protection-webui/_index.md
@@ -0,0 +1,38 @@
+---
+title: "Workload Protection Webui"
+linkTitle: "Workload Protection Webui"
+date: 2024-11-28T17:47:33+01:00
+type: docs
+weight: 10
+description: >
+ Schnellstartanleitung für die Einrichtung und die Nutzung der Workload Protection
+---
+
+# Workload Protection
+
+## URL der Administrationsoberfläche und die Zugangsdaten
+
+Die Administrationsoberfläche ist unter dem folgenden Link zu finden:
+
+![Checkpoint Login Screen](./checkpoint-login.png)
+
+Nach der Einrichtung Ihres Kundenaccounts, werden Sie eine Bestätigungsmail bekommen. Dort sind Sie in der Lage das Passwort einzurichten.
+
+Mehr Infos zum "Berechtigung Management" sind in der Herstellerdokumentation unter "Users & Roles" zu finden:
+
+![Users and Roles Management](./cloudguard-users-roles.png)
+
+## Herstellerdokumentation
+
+Unter dem folgendem Link ist eine ausführliche Dokumentation von Checkpoint zu finden (Siehe Screenshot):
+
+
+![CloudGuard Documentation](./cloudguard-docs.png)
+
+## Dokumentation zur Einbindung der PSKE
+
+Um die PSKE einzubinden, bitte die folgende Dokumentation nutzen:
+
+In unserem Fall wird der Punkt "Onboarding a Cluster Manually" benötigt, die Schritte 1-4 sind in diesem Fall relevant! (Siehe Screenshot)
+
+![Kubernetes Onboarding](./kubernetes-onboarding.png)
diff --git a/content/de/security/30-workload-protection/10-introduction/workload-protection-webui/checkpoint-login.png b/content/de/security/30-workload-protection/10-introduction/workload-protection-webui/checkpoint-login.png
new file mode 100644
index 00000000..52e4dde9
Binary files /dev/null and b/content/de/security/30-workload-protection/10-introduction/workload-protection-webui/checkpoint-login.png differ
diff --git a/content/de/security/30-workload-protection/10-introduction/workload-protection-webui/cloudguard-docs.png b/content/de/security/30-workload-protection/10-introduction/workload-protection-webui/cloudguard-docs.png
new file mode 100644
index 00000000..5adbf964
Binary files /dev/null and b/content/de/security/30-workload-protection/10-introduction/workload-protection-webui/cloudguard-docs.png differ
diff --git a/content/de/security/30-workload-protection/10-introduction/workload-protection-webui/cloudguard-users-roles.png b/content/de/security/30-workload-protection/10-introduction/workload-protection-webui/cloudguard-users-roles.png
new file mode 100644
index 00000000..a6f053aa
Binary files /dev/null and b/content/de/security/30-workload-protection/10-introduction/workload-protection-webui/cloudguard-users-roles.png differ
diff --git a/content/de/security/30-workload-protection/10-introduction/workload-protection-webui/kubernetes-onboarding.png b/content/de/security/30-workload-protection/10-introduction/workload-protection-webui/kubernetes-onboarding.png
new file mode 100644
index 00000000..85ea2159
Binary files /dev/null and b/content/de/security/30-workload-protection/10-introduction/workload-protection-webui/kubernetes-onboarding.png differ
diff --git a/content/de/security/30-workload-protection/20-documentation/_index.md b/content/de/security/30-workload-protection/20-documentation/_index.md
new file mode 100644
index 00000000..610d9418
--- /dev/null
+++ b/content/de/security/30-workload-protection/20-documentation/_index.md
@@ -0,0 +1,10 @@
+---
+title: "Dokumentation"
+linkTitle: "Dokumentation"
+date: 2024-11-28T17:45:36+01:00
+type: docs
+weight: 20
+description: >
+ Dokumentation für Workload Protection
+---
+
diff --git a/content/de/security/30-workload-protection/30-tutorials/_index.md b/content/de/security/30-workload-protection/30-tutorials/_index.md
new file mode 100644
index 00000000..af03d5f6
--- /dev/null
+++ b/content/de/security/30-workload-protection/30-tutorials/_index.md
@@ -0,0 +1,10 @@
+---
+title: "Tutorials"
+linkTitle: "Tutorials"
+date: 2024-11-28T17:45:08+01:00
+type: docs
+weight: 30
+description: >
+ Tutorials für die Workload Protection
+---
+
diff --git a/content/de/security/30-workload-protection/40-releasenotes/_index.md b/content/de/security/30-workload-protection/40-releasenotes/_index.md
new file mode 100644
index 00000000..43dd07a3
--- /dev/null
+++ b/content/de/security/30-workload-protection/40-releasenotes/_index.md
@@ -0,0 +1,10 @@
+---
+title: "Release Notes"
+linkTitle: "Release Notes"
+date: 2024-11-28T17:42:47+01:00
+type: docs
+weight: 40
+description: >
+ Release Notes für die Workload Protection
+---
+
diff --git a/content/de/security/30-workload-protection/_index.md b/content/de/security/30-workload-protection/_index.md
new file mode 100644
index 00000000..6ee4b072
--- /dev/null
+++ b/content/de/security/30-workload-protection/_index.md
@@ -0,0 +1,13 @@
+---
+title: "Workload Protection"
+linkTitle: "Workload Protection"
+date: 2024-11-28T17:38:00+01:00
+type: docs
+weight: 41
+description: >
+ Der Workload Protection Service bietet Echtzeit-Überwachung und Bedrohungserkennung
+ für Ihre Cloud-Workloads und Container. Er analysiert kontinuierlich das Systemverhalten,
+ erkennt Anomalien und hilft dabei, Sicherheitsvorfälle zu verhindern, bevor diese
+ Ihre Anwendungen beeinträchtigen können.
+---
+
diff --git a/content/de/security/Keycloak/_index.md b/content/de/security/Keycloak/_index.md
index e5948123..7a8315cc 100644
--- a/content/de/security/Keycloak/_index.md
+++ b/content/de/security/Keycloak/_index.md
@@ -2,5 +2,5 @@
title: "Keycloak as a Service"
linkTitle: "Keycloak as a Service"
type: "docs"
-weight: 30
+weight: 11
---
diff --git a/content/en/security/10-security-scanner/10-introduction/_index.md b/content/en/security/10-security-scanner/10-introduction/_index.md
new file mode 100644
index 00000000..0732c6be
--- /dev/null
+++ b/content/en/security/10-security-scanner/10-introduction/_index.md
@@ -0,0 +1,10 @@
+---
+title: "Introduction"
+linkTitle: "Introduction"
+date: 2024-11-20T12:27:26+01:00
+type: "docs"
+weight: 10
+description: >
+ Introduction to the Security Scanner
+---
+
diff --git a/content/en/security/10-security-scanner/10-introduction/quickstart_guide/_index.md b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/_index.md
new file mode 100644
index 00000000..00eb312b
--- /dev/null
+++ b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/_index.md
@@ -0,0 +1,72 @@
+---
+title: "Security Scanner - Quickstart Guide"
+linkTitle: "Security Scanner - Quickstart Guide"
+date: 2024-11-20
+weight: 1
+description: "Quick start guide for the Security Scanner"
+type: docs
+---
+
+# Security Scanner - Quickstart Guide
+
+## Contents
+1. [Quick Start](#quick-start)
+2. [Creating and Validating Targets](#creating-and-validating-targets)
+3. [Creating and Starting Scan Tasks](#creating-and-starting-scan-tasks)
+4. [Viewing & Analyzing Vulnerability Reports](#viewing--analyzing-vulnerability-reports)
+
+## 1. Quick Start
+
+This document serves as a quick introduction to the Vulnerability Scanner and its associated self-service functions. This article provides step-by-step guidance on how to set up a complete scan task after initial login. This document assumes that you already have your access credentials (username and password) as well as your tenant URL. With this data, you can directly access the tenant portal. Additionally, it is helpful to have the IP addresses that need to be scanned. These can also be viewed in the plusserver customer portal.
+
+## 2. Creating and Validating Targets
+
+![Scan Configuration Navigation](./ziel-erstellen.png)
+
+Navigate to the Targets submenu via the Scan Configuration menu item. The overview is divided into Internal and External Targets. Internal targets are isolated networks (e.g., Class C networks like 10.0.0.0/8) that cannot be reached via the Internet. Internal targets can only be reached via the Vulnerability Scanner Gateway. External targets have a public IP address (e.g., 1.1.1.1) which can be reached directly via the Internet by the Vulnerability Scanner.
+
+![Create New External Target](./externes-ziel-erstellen.png)
+
+To create a target, click on "Create New External Target". Then enter a name and specify the system to be scanned. Under "Show Advanced Settings", you have the option to configure the ports to be checked, the reachability test, and credentials for authenticated checks. After saving the target via "Create Target", the entry will be displayed in the overview.
+
+Before the vulnerability scan can be started, verification is necessary to prevent misuse of IP-based system scanning. To do this, click on the last icon under the "Action" column.
+
+![Host Validation 1](./host-validierung-1.png)
+![Host Validation 2](./host-validierung-2.png)
+
+In the next step, validation is initiated using "Request Host Validation". There are three options available:
+
+1. **I am the owner**: Select this option whenever the IP address is assigned to your organization and you are therefore authorized to perform a vulnerability assessment. Please make sure to select this option if you are scanning IP addresses of your systems at plusserver! If you choose other options in this case, unnecessary delays will occur.
+
+2. **Technical Contact Person**: If you are not the owner of the IP address but have been commissioned to perform a vulnerability assessment, please use this option. An email request will be sent to the email address stored in the RIPE entry. The owner must confirm this request before the vulnerability assessment can be carried out. This process may take some time - please consult with the owner if necessary.
+
+3. **Partner Verification**: This option is not intended for validation.
+
+## 3. Creating and Starting Scan Tasks
+
+![Create Scan Task](./scan-erstellen.png)
+
+With the previously created target, you can now create a scan task and incorporate it. In the "Name" field, you can use the same name that you assigned to the target if desired. Under "Select Target", specify the desired target.
+
+![Scan Management](./scan-starten.png)
+
+The vulnerability scan can now be started. To do this, switch to the scan task overview via the "Scan Management" menu item. Click on the icon to start the scan task.
+
+## 4. Viewing & Analyzing Vulnerability Reports
+
+![Vulnerability Reports](./schwachstellen-berichte-1.png)
+
+Once the vulnerability scan has been successfully completed, the status of the scan task changes to "Completed". To view the vulnerability report, click on the number within the "Reports" column.
+
+![Vulnerability Report Details](./schwachstellen-berichte-2.png)
+
+You will now see an overview of all completed vulnerability scans. Click on the icon to access the vulnerability report.
+
+![Vulnerability Report Details 2](./schwachstellen-berichte-3.png)
+
+You have various options for displaying and processing the list of vulnerabilities. This includes tile and table views as well as export as PDF or XML document.
+
+**Important note for plusserver IP addresses**:
+Make sure to select the "I am the owner" option during host validation to avoid unnecessary delays.
+
+
diff --git a/content/en/security/10-security-scanner/10-introduction/quickstart_guide/externes-ziel-erstellen.png b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/externes-ziel-erstellen.png
new file mode 100644
index 00000000..ffe1f3cc
Binary files /dev/null and b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/externes-ziel-erstellen.png differ
diff --git a/content/en/security/10-security-scanner/10-introduction/quickstart_guide/host-validierung-1.png b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/host-validierung-1.png
new file mode 100644
index 00000000..a9759c4b
Binary files /dev/null and b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/host-validierung-1.png differ
diff --git a/content/en/security/10-security-scanner/10-introduction/quickstart_guide/host-validierung-2.png b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/host-validierung-2.png
new file mode 100644
index 00000000..fef61f8c
Binary files /dev/null and b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/host-validierung-2.png differ
diff --git a/content/en/security/10-security-scanner/10-introduction/quickstart_guide/scan-erstellen.png b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/scan-erstellen.png
new file mode 100644
index 00000000..5095c12b
Binary files /dev/null and b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/scan-erstellen.png differ
diff --git a/content/en/security/10-security-scanner/10-introduction/quickstart_guide/scan-starten.png b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/scan-starten.png
new file mode 100644
index 00000000..d253201f
Binary files /dev/null and b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/scan-starten.png differ
diff --git a/content/en/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-1.png b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-1.png
new file mode 100644
index 00000000..e9733f9a
Binary files /dev/null and b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-1.png differ
diff --git a/content/en/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-2.png b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-2.png
new file mode 100644
index 00000000..86df9a04
Binary files /dev/null and b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-2.png differ
diff --git a/content/en/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-3.png b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-3.png
new file mode 100644
index 00000000..c73df6b1
Binary files /dev/null and b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/schwachstellen-berichte-3.png differ
diff --git a/content/en/security/10-security-scanner/10-introduction/quickstart_guide/ziel-erstellen.png b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/ziel-erstellen.png
new file mode 100644
index 00000000..70e1f924
Binary files /dev/null and b/content/en/security/10-security-scanner/10-introduction/quickstart_guide/ziel-erstellen.png differ
diff --git a/content/en/security/10-security-scanner/20-documentation/_index.md b/content/en/security/10-security-scanner/20-documentation/_index.md
new file mode 100644
index 00000000..1ac1c58a
--- /dev/null
+++ b/content/en/security/10-security-scanner/20-documentation/_index.md
@@ -0,0 +1,10 @@
+---
+title: "Documentation"
+linkTitle: "Documentation"
+date: 2024-11-20T12:27:18+01:00
+type: "docs"
+weight: 20
+description: >
+ Documentation for the Security Scanner
+---
+
diff --git a/content/en/security/10-security-scanner/30-tutorials/_index.md b/content/en/security/10-security-scanner/30-tutorials/_index.md
new file mode 100644
index 00000000..232d87db
--- /dev/null
+++ b/content/en/security/10-security-scanner/30-tutorials/_index.md
@@ -0,0 +1,10 @@
+---
+title: "Tutorials"
+linkTitle: "Tutorials"
+date: 2024-11-20T12:27:43+01:00
+type: "docs"
+weight: 30
+description: >
+ Tutorials for the Security Scanner
+---
+
diff --git a/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/_index.md b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/_index.md
new file mode 100644
index 00000000..e4d407ec
--- /dev/null
+++ b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/_index.md
@@ -0,0 +1,92 @@
+---
+title: "Security Scanner - Scanning Internal IP Addresses with the Gateway"
+linkTitle: "Security Scanner - Scanning Internal IP Addresses with the Gateway"
+date: 2024-11-20
+weight: 1
+description: "Guide for scanning internal IP addresses with the Gateway"
+type: docs
+---
+
+# Security Scanner - Scanning Internal IP Addresses with the Gateway
+
+## Introduction
+
+Since not all IP addresses in your infrastructure can be checked externally, you have the option to set up a gateway. This allows isolated networks (e.g., RfC-1918) to be checked for vulnerabilities.
+
+# Installing Gateway
+
+## Download Gateway Image
+
+Navigate to https://sec-scan.psmanaged.com/ui/gsp/entities/gateway/list/. There, select the available platform and download the image.
+
+![Gateway Image Download](./vmware-download.png)
+
+## Upload Image to the vAPP Template Catalog of your PlusCloud
+
+![vAPP Templates](./vapp-vorlagen.png)
+
+## Create New Virtual Machine
+
+![Create New VM](./neue-vm.png)
+
+## Specify VM Hostname and Select Template
+
+![Hostname and Template](./hostname-template.png)
+
+## Configure Network & IP Address
+
+![Network Settings](./netzwerk-einstellungen.png)
+
+## Configure Firewall
+
+To configure the gateway via Web GUI in step (2.3) Open Gateway Web UI, the internal IP address of the gateway must be made available through a publicly accessible IP address of your Edge Gateway using SNAT, DNAT, and firewall rules.
+
+## Connect to VM Console
+
+![Connect to VM](./vm-verbinden.png)
+After the login prompt appears, enter admin as both username and password.
+
+## Select Network Configuration
+
+![Network Configuration](./network-config.png)
+
+## Set Network Configuration Information
+
+![Network Info](./network-info.png)
+
+## Test Network Connection to Security Scanner
+
+![Network Test](./network-test.png)
+
+## Select Gateway Configuration
+
+![Gateway Configuration](./gateway-config.png)
+
+## Select Set Web Password & Assign Password
+
+![Web Password](./web-password.png)
+
+# Configure Gateway
+
+## Create New Gateway
+
+![Create Gateway](./gateway-create.png)
+Please specify another free IP address from the network where you installed the gateway.
+
+## Copy Token
+
+To connect the gateway to the Security Scanner, authentication and encryption are necessary. For this, copy the API key from the gateway settings.
+
+![Token Configuration](./token-config.png)
+
+## Open Gateway Web UI
+
+In step (1.6) Configure Firewall, you made the gateway available through a publicly accessible IP address. Now enter the gateway's IP address in your browser and log in using the assigned web password (e.g., https://195.252.XXX.XXX).
+
+![Web UI](./web-ui.png)
+
+## Check Gateway Status
+
+![Gateway Status](./gateway-status.png)
+
+The gateway is now set up. You can select the gateway for scanning when creating a scan task.
diff --git a/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-config.png b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-config.png
new file mode 100644
index 00000000..883a07ff
Binary files /dev/null and b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-config.png differ
diff --git a/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-create.png b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-create.png
new file mode 100644
index 00000000..f815dc41
Binary files /dev/null and b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-create.png differ
diff --git a/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-status.png b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-status.png
new file mode 100644
index 00000000..ab93b91a
Binary files /dev/null and b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/gateway-status.png differ
diff --git a/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/hostname-template.png b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/hostname-template.png
new file mode 100644
index 00000000..dbc16bdf
Binary files /dev/null and b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/hostname-template.png differ
diff --git a/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-config.png b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-config.png
new file mode 100644
index 00000000..7ac41b0e
Binary files /dev/null and b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-config.png differ
diff --git a/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-info.png b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-info.png
new file mode 100644
index 00000000..eb7c1181
Binary files /dev/null and b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-info.png differ
diff --git a/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-test.png b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-test.png
new file mode 100644
index 00000000..f45ba3b4
Binary files /dev/null and b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/network-test.png differ
diff --git a/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/netzwerk-einstellungen.png b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/netzwerk-einstellungen.png
new file mode 100644
index 00000000..d0ede8f0
Binary files /dev/null and b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/netzwerk-einstellungen.png differ
diff --git a/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/neue-vm.png b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/neue-vm.png
new file mode 100644
index 00000000..34de1bd1
Binary files /dev/null and b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/neue-vm.png differ
diff --git a/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/token-config.png b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/token-config.png
new file mode 100644
index 00000000..5e456f6d
Binary files /dev/null and b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/token-config.png differ
diff --git a/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/vapp-vorlagen.png b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/vapp-vorlagen.png
new file mode 100644
index 00000000..7ffb4d7f
Binary files /dev/null and b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/vapp-vorlagen.png differ
diff --git a/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/vm-verbinden.png b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/vm-verbinden.png
new file mode 100644
index 00000000..bad420cc
Binary files /dev/null and b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/vm-verbinden.png differ
diff --git a/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/vmware-download.png b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/vmware-download.png
new file mode 100644
index 00000000..bbc8f072
Binary files /dev/null and b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/vmware-download.png differ
diff --git a/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/web-password.png b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/web-password.png
new file mode 100644
index 00000000..5c3ce9fd
Binary files /dev/null and b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/web-password.png differ
diff --git a/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/web-ui.png b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/web-ui.png
new file mode 100644
index 00000000..ba6b989a
Binary files /dev/null and b/content/en/security/10-security-scanner/30-tutorials/scan_interne_adressen/web-ui.png differ
diff --git a/content/en/security/10-security-scanner/40-releasenotes/_index.md b/content/en/security/10-security-scanner/40-releasenotes/_index.md
new file mode 100644
index 00000000..c86b4b07
--- /dev/null
+++ b/content/en/security/10-security-scanner/40-releasenotes/_index.md
@@ -0,0 +1,9 @@
+---
+title: "Release Notes"
+linkTitle: "Release Notes"
+date: 2024-11-20T12:27:34+01:00
+type: "docs"
+weight: 40
+description: >
+ Release Notes for the Security Scanner
+---
diff --git a/content/en/security/10-security-scanner/_index.md b/content/en/security/10-security-scanner/_index.md
new file mode 100644
index 00000000..a1bacb68
--- /dev/null
+++ b/content/en/security/10-security-scanner/_index.md
@@ -0,0 +1,12 @@
+---
+title: "Greenbone Security Scanner"
+linkTitle: "Security Scanner"
+date: 2024-11-20T12:27:06+01:00
+type: "docs"
+weight: 21
+description: >
+ The Security Scanner enables you to identify vulnerabilities in both your
+ internal and external systems. It provides comprehensive scanning capabilities
+ and detailed reporting, allowing you to maintain the security of your infrastructure.
+---
+
diff --git a/content/en/security/20-siem-reporting/10-introduction/_index.md b/content/en/security/20-siem-reporting/10-introduction/_index.md
new file mode 100644
index 00000000..7dbb0935
--- /dev/null
+++ b/content/en/security/20-siem-reporting/10-introduction/_index.md
@@ -0,0 +1,9 @@
+---
+title: "Introduction"
+date: 2024-11-26T10:34:44+01:00
+
+type: "docs"
+weight: 10
+description: "Introduction to SIEM Reporting"
+---
+
diff --git a/content/en/security/20-siem-reporting/10-introduction/reporting-guide/_index.md b/content/en/security/20-siem-reporting/10-introduction/reporting-guide/_index.md
new file mode 100644
index 00000000..d132cd67
--- /dev/null
+++ b/content/en/security/20-siem-reporting/10-introduction/reporting-guide/_index.md
@@ -0,0 +1,77 @@
+---
+title: "Reporting Guide"
+linkTitle: "Reporting Guide"
+date: 2024-11-26
+type: docs
+description: "Guide for using the Reporting Dashboards"
+type: docs
+---
+# Reporting Guide
+
+You can find the reporting dashboard under https://reporting.plussecurity.io - click "Sign in with SSO" to sign in via your known Customer IDM credentials.
+
+![Grafana Login Screen](./grafana-login.png)
+
+After logging in, only authorizations for the "Main Org" are available to you by default. The authorizations for other organizations or areas must be set up manually for each user.
+
+To activate the users, please open a service request via our Help Desk and enter the user name and the corresponding e-mail address.
+
+Once you have been activated, you can select your organization in the top left-hand corner. Don't worry - the "Main Org" is the default organization and does not contain any content.
+
+You will find the following dashboards under the burger menu:
+
+![Grafana Menu](./grafana-menu.png)
+
+Use the time selection at the top right to set the desired time range for the data display (see image below):
+
+![Time Selection](./grafana-time-selection.png)
+
+### EDR Computer overview
+
+This dashboard shows an overview of the computers in the EDR.
+
+- Result of the current number of computers in the EDR Platform
+ - Shows the daily report of computers in the EDR
+- Result of the number of computers in the last month
+ - Shows the report from the first of the month for reference
+- Current endpoints with problems
+ - Endpoints whose status is not OK
+- List of endpoints
+
+### EDR Overview
+
+This dashboard shows insights into the EDR platform, current alarms and rules that have been triggered.
+
+- Overview of Offenses
+ - Pie chart of the offenses
+- Number of events
+ - Total number of events in SIEM
+- Top 10 computers
+ - Top 10 computers that appear in events and offenses
+- Top 10 rules that triggered an offense
+- Top 10 EDR events
+ - Top 10 events within the EDR
+- Overview of offenses
+
+The severity of an incident is calculated based on relevance, credibility and severity:
+
+**Relevance**: Indicates how much the incident could affect your network. For example, an open port has a high relevance as it is a potential gateway for attacks.
+
+**Credibility**: Describes the reliability of the incident, based on the credibility rating of the log source. Credibility increases when multiple sources report the same incident.
+
+**Severity**: Evaluates the threat level that the source represents in relation to the target's defense readiness. A poorly protected target leads to a higher severity level.
+
+These factors are combined to assess the overall severity of the incident and prioritize appropriate countermeasures.
+
+### SOC Overview
+
+This dashboard shows insight of the SOC, current offenses and an overview of data that is currently residing inside the SOC.
+
+- Offenses overview over time
+ - Shows when offenses occurred
+- Top Logsources
+ - Shows logsources with corresponding eventcount
+- Top Talker Source IP
+ - Shows top talker IPs that appear in events
+- Top Users
+ - Shows top users that appear in events
diff --git a/content/en/security/20-siem-reporting/10-introduction/reporting-guide/grafana-login.png b/content/en/security/20-siem-reporting/10-introduction/reporting-guide/grafana-login.png
new file mode 100644
index 00000000..f98eb86e
Binary files /dev/null and b/content/en/security/20-siem-reporting/10-introduction/reporting-guide/grafana-login.png differ
diff --git a/content/en/security/20-siem-reporting/10-introduction/reporting-guide/grafana-menu.png b/content/en/security/20-siem-reporting/10-introduction/reporting-guide/grafana-menu.png
new file mode 100644
index 00000000..9633aa52
Binary files /dev/null and b/content/en/security/20-siem-reporting/10-introduction/reporting-guide/grafana-menu.png differ
diff --git a/content/en/security/20-siem-reporting/10-introduction/reporting-guide/grafana-time-selection.png b/content/en/security/20-siem-reporting/10-introduction/reporting-guide/grafana-time-selection.png
new file mode 100644
index 00000000..542db720
Binary files /dev/null and b/content/en/security/20-siem-reporting/10-introduction/reporting-guide/grafana-time-selection.png differ
diff --git a/content/en/security/20-siem-reporting/20-documentation/_index.md b/content/en/security/20-siem-reporting/20-documentation/_index.md
new file mode 100644
index 00000000..7eb16ec0
--- /dev/null
+++ b/content/en/security/20-siem-reporting/20-documentation/_index.md
@@ -0,0 +1,9 @@
+---
+title: "Documentation"
+date: 2024-11-26T10:34:03+01:00
+
+type: "docs"
+weight: 20
+description: "Documentation for SIEM Reporting"
+---
+
diff --git a/content/en/security/20-siem-reporting/30-tutorials/_index.md b/content/en/security/20-siem-reporting/30-tutorials/_index.md
new file mode 100644
index 00000000..1b40b8b8
--- /dev/null
+++ b/content/en/security/20-siem-reporting/30-tutorials/_index.md
@@ -0,0 +1,8 @@
+---
+title: "Tutorials"
+date: 2024-11-26T10:34:03+01:00
+
+type: "docs"
+weight: 20
+description: "Tutorials for SIEM Reporting"
+---
diff --git a/content/en/security/20-siem-reporting/40-releasenotes/_index.md b/content/en/security/20-siem-reporting/40-releasenotes/_index.md
new file mode 100644
index 00000000..2c450afa
--- /dev/null
+++ b/content/en/security/20-siem-reporting/40-releasenotes/_index.md
@@ -0,0 +1,9 @@
+---
+title: "Release Notes"
+date: 2024-11-26T10:34:17+01:00
+
+type: "docs"
+weight: 40
+description: "Release Notes for SIEM Reporting"
+---
+
diff --git a/content/en/security/20-siem-reporting/_index.md b/content/en/security/20-siem-reporting/_index.md
new file mode 100644
index 00000000..f4aace20
--- /dev/null
+++ b/content/en/security/20-siem-reporting/_index.md
@@ -0,0 +1,8 @@
+---
+title: "SIEM Reporting"
+date: 2024-11-26T10:33:39+01:00
+type: "docs"
+weight: 31
+description: The SIEM Reporting enables you to analyze security events from your SIEM system.
+---
+
diff --git a/content/en/security/30-workload-protection/10-introduction/10-workload-protection-webui/_index.md b/content/en/security/30-workload-protection/10-introduction/10-workload-protection-webui/_index.md
new file mode 100644
index 00000000..d24c2b9c
--- /dev/null
+++ b/content/en/security/30-workload-protection/10-introduction/10-workload-protection-webui/_index.md
@@ -0,0 +1,37 @@
+---
+title: "Workload Protection Webui"
+date: 2024-11-28T17:51:22+01:00
+type: docs
+weight: 10
+description: >
+ Quick start guide for setting up and using Workload Protection
+---
+
+# Workload Protection
+
+## URL of the administration interface and access data
+
+The administration interface can be found at the following link:
+
+![Checkpoint Login Screen](./checkpoint-login.png)
+
+After setting up your customer account, you will receive a confirmation email. There you will be able to set up the password.
+
+More information about "Permission Management" can be found in the manufacturer's documentation under "Users & Roles"
+
+![Users and Roles Management](./cloudguard-users-roles.png)
+
+## Manufacturer Documentation
+
+A detailed documentation from Checkpoint can be found under the following link (See Screenshot):
+
+
+![CloudGuard Documentation](./cloudguard-docs.png)
+
+## Documentation for PSKE Integration
+
+To integrate the PSKE, please use the following documentation:
+
+In our case, the section "Onboarding a Cluster Manually" is needed, steps 1-4 are relevant in this case! (See Screenshot)
+
+![Kubernetes Onboarding](./kubernetes-onboarding.png)
diff --git a/content/en/security/30-workload-protection/10-introduction/10-workload-protection-webui/checkpoint-login.png b/content/en/security/30-workload-protection/10-introduction/10-workload-protection-webui/checkpoint-login.png
new file mode 100644
index 00000000..52e4dde9
Binary files /dev/null and b/content/en/security/30-workload-protection/10-introduction/10-workload-protection-webui/checkpoint-login.png differ
diff --git a/content/en/security/30-workload-protection/10-introduction/10-workload-protection-webui/cloudguard-docs.png b/content/en/security/30-workload-protection/10-introduction/10-workload-protection-webui/cloudguard-docs.png
new file mode 100644
index 00000000..5adbf964
Binary files /dev/null and b/content/en/security/30-workload-protection/10-introduction/10-workload-protection-webui/cloudguard-docs.png differ
diff --git a/content/en/security/30-workload-protection/10-introduction/10-workload-protection-webui/cloudguard-users-roles.png b/content/en/security/30-workload-protection/10-introduction/10-workload-protection-webui/cloudguard-users-roles.png
new file mode 100644
index 00000000..a6f053aa
Binary files /dev/null and b/content/en/security/30-workload-protection/10-introduction/10-workload-protection-webui/cloudguard-users-roles.png differ
diff --git a/content/en/security/30-workload-protection/10-introduction/10-workload-protection-webui/kubernetes-onboarding.png b/content/en/security/30-workload-protection/10-introduction/10-workload-protection-webui/kubernetes-onboarding.png
new file mode 100644
index 00000000..85ea2159
Binary files /dev/null and b/content/en/security/30-workload-protection/10-introduction/10-workload-protection-webui/kubernetes-onboarding.png differ
diff --git a/content/en/security/30-workload-protection/10-introduction/_index.md b/content/en/security/30-workload-protection/10-introduction/_index.md
new file mode 100644
index 00000000..5505bcd7
--- /dev/null
+++ b/content/en/security/30-workload-protection/10-introduction/_index.md
@@ -0,0 +1,8 @@
+---
+title: "Introduction"
+date: 2024-11-28T17:42:17+01:00
+type: docs
+weight: 10
+description: Introduction to the Workload Protection
+---
+
diff --git a/content/en/security/30-workload-protection/20-documentation/_index.md b/content/en/security/30-workload-protection/20-documentation/_index.md
new file mode 100644
index 00000000..37379b44
--- /dev/null
+++ b/content/en/security/30-workload-protection/20-documentation/_index.md
@@ -0,0 +1,8 @@
+---
+title: "Documentation"
+date: 2024-11-28T17:41:41+01:00
+type: docs
+weight: 20
+description: Documentation for Workload Protection
+---
+
diff --git a/content/en/security/30-workload-protection/30-tutorials/_index.md b/content/en/security/30-workload-protection/30-tutorials/_index.md
new file mode 100644
index 00000000..1b0d20b2
--- /dev/null
+++ b/content/en/security/30-workload-protection/30-tutorials/_index.md
@@ -0,0 +1,8 @@
+---
+title: "Tutorials"
+date: 2024-11-28T17:41:30+01:00
+type: docs
+weight: 30
+description: Tutorials for Workload Protection
+---
+
diff --git a/content/en/security/30-workload-protection/40-releasenotes/_index.md b/content/en/security/30-workload-protection/40-releasenotes/_index.md
new file mode 100644
index 00000000..f0b3afd6
--- /dev/null
+++ b/content/en/security/30-workload-protection/40-releasenotes/_index.md
@@ -0,0 +1,8 @@
+---
+title: "Release Notes"
+date: 2024-11-28T17:41:46+01:00
+type: docs
+description: Release Notes for Workload Protection
+weight: 40
+---
+
diff --git a/content/en/security/30-workload-protection/_index.md b/content/en/security/30-workload-protection/_index.md
new file mode 100644
index 00000000..71e299cf
--- /dev/null
+++ b/content/en/security/30-workload-protection/_index.md
@@ -0,0 +1,12 @@
+---
+title: "Workload Protection"
+date: 2024-11-28T17:38:35+01:00
+type: docs
+weight: 41
+description: >
+ The Workload Protection service provides real-time monitoring and threat detection
+ for your cloud workloads and containers. It continuously analyzes system behavior,
+ detects anomalies, and helps prevent security incidents before they can impact
+ your applications.
+---
+