Add the web applications you want to scan for security risks - vulnerabilities, malware and sensitive contents.
A few things to consider... |
Have you thought about the web application settings you should use? We can help you sort this out quickly - review the basics for some ideas. |
I'm ready to add a web application. What are the steps? |
Go to Web Applications and click the New Web Application button. Select Blank and our wizard will help you build the web asset from scratch. |
Are there other ways to add web applications?Are there other ways to add web applications? Yes, there are 3 other ways to add a web application to your account. Import a web application in a CSV file - Go to Web Applications and select the Import option above the list. Follow the instructions to create your CSV file, and tell us where the file is located. Be sure to click the Import button. See Import web applications. Select web applications from your catalog - Your catalog shows you web applications found in your vulnerability scans and maps (from the VM application). Go to Web Applications > Catalog to select web applications that you want to add to your subscription. Save and edit a copy of an existing web application - Go to Web Applications, select a web application and choose Save As from the menu (or edit the web application and click Save As in the wizard). Give the new web application a name and then edit the settings as you wish. |
I need help with the web application settingsI need help with the web application settings Tell me more about: Add the web applications you want to scan for security risks - vulnerabilities, malware and sensitive contents. We have a wizard that will help you to add your web applications to your account. The wizard to create a web application has 5 steps. These are the steps: 1. Basic Info 4. Additional Configurations and Exclusion Lists 5. Review & Confirm |
Tell me about web assets |
What are web assets?What are web assets? When you add a web application we'll build a web asset in your subscription if it doesn't already exist. This asset has a name, URL and tags (optional) and it can be easily configured for other web applications like WAF. Where can I see my assets? You'll see an inventory of all the assets you have access to in the CyberSecurity Asset Management (CSAM) application. |
Permissions to web assetsPermissions to web assets Users who are not Managers need to be granted access to web assets. A Manager can do this by going to the Administration utility, editing the users' accounts, and assigning web application tags to the user scopes. |
Why tag web assets?Why tag web assets? Tagging web assets lets you grant users access to them. It also gives you a convenient way to manage large volumes of web applications. For reports, for example, you can select web application tags as the report target. |
Detections > Detections.
View the vulnerabilities detected by scans of all your web applications, and filter them. Go to