The name and a description will appear on the report header. The report name also appears in the reports list when you download and save the report.
Choose tags, web applications or both to identify the report target. To find a tag in the tag selector, begin typing the tag name in the tag selector in the Search field. Click a tag to select it, then click outside the tree to add the selected tag.
Want to exclude web applications from the scan? Add tags to the "Exclude web application" section. Select All to include the web applications that match all of the tags listed. Select Any to include web applications that match at least one of the tags listed.
You might want to limit your report to certain vulnerabilities. It's easy - just add search lists (or vulnerability sets) to include or exclude. Each search list defines one or more vulnerabilities. Need to create new search lists? Just click the links to add them. "Create static list" lets you add a list of vulnerability QIDs. "Create dynamic list" lets you define vulnerability criteria - we'll include vulnerabilities that match this criteria when we create your report.
Include vulnerabilities detected for a specific URL. Enter any part of the URL in the field provided.
Filter the findings type: Qualys, Burp or Bugcrowd you want to include in the web application report. Select the check box for each detection type you want to include in the report and clear the check box for each detection type you want to filter out of the report.
Include vulnerabilities with certain status. Select the check box for each status you want to include in the report and clear the check box for each status you want to filter out of the report.
By default, ignored findings do not appear in reports. You have the option to include ignored vulnerabilities and sensitive contents. You can include ignored findings in addition to or instead of non ignored findings.
Click to highlight the components (left) and graphs (right) that you want to include in the report. Grayed components and graphs are omitted from the report. Note that to include selected graphs in the report, you must include the Graphs component.
The left column shows the included vulnerability groups and the order in which they appear in the report. Add groups to the report by clicking them in the right column. Groups are automatically added to the bottom of sorting order. You can define the sorting order by removing groups and adding them in the order you prefer.
By default severity levels 1 to 5 (Lowest to Critical) are displayed. You have the option to choose Low, Medium and High.
Define a customized footer and it is displayed in the WAS report:Web application report and scan report (HTML and PDF formats). Use the report template when you generate the report and the custom footer is displayed in the reports.