Monitoring rules - Third-party Vulnerability Analytics