Skip to main content
Panguard Chat adapts notification content to your role. The same security event produces three entirely different messages depending on whether the recipient is an executive, engineer, or IT administrator.

Role Configuration

# Set your role during setup
panguard chat setup --user-type boss

# Change role later
panguard chat prefs --user-type developer

Role Comparison

The following example shows the same event — a C2 server communication detected and blocked — formatted for each role.

boss — Impact Summary

Target audience: executives, non-technical managers, business owners. Focus: business impact, risk level, whether action was taken.
[Panguard AI Security Notice]

Your server was detected communicating with a known
malicious server. That IP has been reported 1,247 times
globally.

The connection has been automatically blocked. No action
is required from you.

Risk Level: HIGH
Status: Automatically resolved
Key characteristics:
  • No technical jargon (no IPs, PIDs, or rule names)
  • Clear statement of impact
  • Explicit “what do I need to do” guidance
  • Business-friendly language

developer — Technical Details

Target audience: software engineers, DevOps, SRE. Focus: raw data, IPs, process details, rule matches, timeline.
[Panguard AI Alert]

Threat Intel Match: 203.0.113.50
Source: AbuseIPDB (confidence: 98%)
Tag: C2-Server, ThreatFox IOC-12345
Process: curl (PID 5678) -> 203.0.113.50:443
Action: IP blocked via iptables
Rule: sigma/network/c2-communication.yml

Timeline:
  14:23:01 - Outbound connection detected
  14:23:02 - Threat intel match confirmed
  14:23:02 - Auto-response: IP blocked
Key characteristics:
  • Full IP addresses, PIDs, and port numbers
  • Threat intelligence source and confidence score
  • Exact rule that matched
  • Precise timeline with second-level granularity

it_admin — Remediation Steps

Target audience: IT administrators, system administrators, help desk. Focus: what happened, what was done, and what to do next.
[Panguard AI - Remediation Guide]

Event: Communication with known C2 server detected
Severity: HIGH
Action taken: Automatically blocked IP 203.0.113.50

Recommended next steps:
1. Check if process curl (PID 5678) is a legitimate operation
2. If not, terminate the process: kill -9 5678
3. Check for other processes connecting to the same IP
4. Run a full system scan: panguard scan
5. If confirmed compromise, run a full investigation
Key characteristics:
  • Numbered remediation steps
  • Specific commands to execute
  • Escalation guidance
  • Reference to other Panguard tools

Notification Content by Role

Content Elementbossdeveloperit_admin
Severity levelYesYesYes
Business impactYes
Source IP addressYesYes
Process ID (PID)YesYes
Rule nameYes
MITRE ATT&CK IDYes
TimelineYes
Remediation stepsYes
”What to do” guidanceYesYes
Threat intel sourceYes
Confidence scoreYes

Selecting the Right Role

If you are…ChooseBecause
A founder or CEO getting security updates on your startup’s serversbossYou need to know the impact, not the technical details
A developer managing your own VPS or side projectdeveloperYou want raw data to debug and investigate yourself
An IT admin responsible for multiple systemsit_adminYou need clear steps to follow for each incident
An MSP managing client infrastructureit_adminStep-by-step guides help your team respond consistently
You can run panguard chat setup again at any time to switch roles. The change takes effect immediately for all future notifications.