Requesting a Self-Published Report Ingrid A self-published report provides an organization a way to communicate their most relevant infrastructure.See infrastructure management user permissions. Instructions Self-publishing Process Flows By Inclusion By Exclusion InstructionsTo request a self-published report in the Security Posture Management application: Select the Self-Publish button at the top-right of the Infrastructure page [ Attack Surface ➔ Infrastructure]. Provide the entity’s information. If not specified, these will be copied from your Bitsight curated entity:* Required. Company Name * Required. The name for the self-published report. Official/legal names are reserved for Bitsight curated reports. The name for the self-published company cannot correspond to a legal company’s existing designation and no two companies may have the exact same name. Primary URL * Required. This is displayed in the Company Info panel in the Company Details page. Example: saperix.com Description A description of the entity, which can include their business, services, and headquarter location. Examples: Saperix Technologies LLC develops risk analysis software solutions. Guest Public Sandbox Specify the report’s visibility (public or private) to other Bitsight customers in the Rating Visibility option. Activate the Primary Rating toggle to determine if it should be highlighted as the primary. Select infrastructure tags to identify infrastructure by asset inclusion or exclusion. It can only include assets that belong to or are used by your organization. You may also manually gather and submit the details (a list of CIDR blocks/IP addresses or a list of domain names) to Bitsight Support. Select Publish. The creation of the self-published company typically takes 3-5 business days after submission. We’ll provide an estimate depending on the complexity of the request upon contact.Self-publishing Process FlowsWhen reaching out to Bitsight Support, select one of the following most common request process flow examples (options 1 through 6) that best match your request conditions for creating a self-published report.For other cases, please reach out to Bitsight Support for assistance.By Inclusion Option Description Example Organization Chart 1 A single self-published report for a single company with no group. The self-published report is derived from the provided list of all requested IP and/or domain data of a single existing company. 2 A single self-published report for a specific company within a structured group. The self-published report is derived from the provided list of all requested IP and/or domain data, that’s associated with the specific company, from the structured group that the request is directed from. 3 A self-published report for a structured group. The self-published report is derived from the provided list of all requested group IP and/or domain data that may be associated with the entire group. By Exclusion Option Description Example Organization Chart 4 A single self-published report for a single company. The self-published report is derived from the pre-existing company IP and/or domain data, where a provided list of specific IP and/or domain data is excluded from the requested self-published report. 5 A single self-published report for a single company within a structured group. The self-published report is derived from the pre-existing company IP and/or domain data, where a specific list of IP and/or domain data is excluded from the requested, company-specific, self-published report. 6 A single self-published report for a structured group. The self-published report is derived from the pre-existing group IP and/or domain data, where a specific list of IP and/or domain data is excluded from the group’s self-published report. March 19, 2026: Security Posture Management rebrand. November 4, 2022: UI optimized for Infrastructure [Beta]. September 26, 2022: Notice for upcoming infrastructure UI optimization. April 13, 2021: Updated navigation for the SPM Application. Related articles Self-Published Companies Attack Surface: Infrastructure Finding Behavior Attack Surface: Cloud Infrastructure Sync Subsidiary Attribution Feedback 0 comments Please sign in to leave a comment.