Documentation & Best Practices

Master the Probatum platform with our structured guides. From your first upload to complex compliance verification.

Tutorials

Step-by-step lessons to help you get started. Best for beginners.

Getting Started

  1. 1

    Upload Your Policy

    Go to Ingestion, drag & drop your "Information Security Policy.pdf". Wait for the "Processed" status.

  2. 2

    Map a Control

    Go to Dashboard > Controls. Search for "CC6.1". Click "Map Evidence" and select your uploaded document.

  3. 3

    Verify with Agent

    Ask: "Show me evidence for CC6.1". The Agent will retrieve your specifically mapped chunk.

Reference

Technical descriptions, syntax, and supported lists.

Supported Frameworks

SOC 2ISO 27001HIPAAGDPRPCI-DSSNIST CSFFedRAMPCMMC

Search Query Syntax

# Direct Control Lookup
"Show evidence for CC6.1"
# Keyword Search
"access control policy AND mfa"

Explanation

Deep dives into concepts, architecture, and "why" it works.

Agentic RAG Architecture

Unlike traditional RAG which performs a simple vector lookup, our Agentic RAG employs a multi-step reasoning graph. It intelligently decides whether to search, use structural lookups (Control IDs), or perform reasoning. It self-corrects by "grading" the retrieved documents before answering.

Reliability & Strict Citation

Trust is paramount. The system creates a "Trust Foundation" by refusing to answer if evidence is insufficient. Users can inspect the exact source text for every claim, eliminating hallucinations common in generic LLMs.

Ready to start auditing?

Jump into the dashboard and upload your first security policy to see the classification engine in action.