Settings
Last updated: February 18, 2026
The Settings page controls instance-wide configuration for security, users, integrations, and data classification. Use these settings to align Cyrisma with your organization’s authentication requirements, user access model, and scanning configuration.
General
General settings apply to authentication and platform defaults for the instance.
Security settings
Two-Factor Authentication (2FA): Set the login verification method for instance users (Disabled, Email code, or Authenticator).
Password Expiration: Enforce periodic password changes for local instance users (30, 60, or 90 days).
User Inactivity Timeout: Automatically log users out after inactivity (5, 10, 20, 30, or 60 minutes).
Platform settings
Password Protect Reports: Require password authentication to open exported reports. Toggle on or off.
Currency: Sets the currency used for risk calculations and financial reporting.
Risk Suppression Duration: Sets how long acknowledged risk alerts remain suppressed (30, 60, or 90 days).
User Management
User Management controls instance users, their access level, and how users are organized by department.
Users
The Users view lists all users in the instance along with access type, department, last login date, and status (Active or Disabled).
Use Add User to create a new user and assign their access type and department.
Use the actions menu on a user row to edit user details, update role/department assignment, enable or disable the account, and (if applicable) set or change a local password.
Departments
General Departments are system-defined and cannot be modified.
Custom Departments can be created for your environment and used to organize users and reporting. You can add a name and description, and enable or disable custom departments as needed.
Integrations
Integrations connect cloud services to the instance to support cloud data sensitivity scanning.
Microsoft 365: Configure a Microsoft 365 connection for cloud email and file scanning.
Google Workspace: Configure a Google Workspace connection for cloud email and file scanning.
Data Classification
Data Classification lets you define custom detection logic that can be used as sensitive data categories during data sensitivity scans.
Custom Regex Pattern
Create regex-based patterns to identify organization-specific sensitive data formats (for example internal IDs or unique identifiers).
Each pattern can be assigned a score/grade to influence how findings are categorized.
Custom Keywords
Create keyword-based identifiers for sensitive data (for example internal classification markers).
Keywords can also be assigned a score/grade.
Score legend
Scores map to grade bands from 1 (A+, lowest risk) to 13 (F, highest risk). Values above 13 are treated as 13.