Home

Adding Web Applications

Add the web applications you want to scan for security risks - vulnerabilities, malware and sensitive contents.

 

Have you thought about the web application settings you should use? We can help you sort this out quickly - review the basics for some ideas.

 

Go to Web Applications and click the New Web Application button. Select Blank and our wizard will help you build the web asset from scratch.

Yes, there are 3 other ways to add a web application to your account.

Import a web application in a CSV file - Go to Web Applications and select the Import option above the list. Follow the instructions to create your CSV file, and tell us where the file is located. Be sure to click the Import button. See Import web applications.

Select web applications from your catalog - Your catalog shows you web applications found in your vulnerability scans and maps (from the VM application). Go to Web Applications > Catalog to select web applications that you want to add to your subscription.

Save and edit a copy of an existing web application - Go to Web Applications, select a web application and choose Save As from the menu (or edit the web application and click Save As in the wizard). Give the new web application a name and then edit the settings as you wish.

Tell me more about:

Add the web applications you want to scan for security risks - vulnerabilities, malware and sensitive contents. We have a wizard that will help you to add your web applications to your account. The wizard to create a web application has 5 steps. These are the steps:

1. Basic Info

2. Crawl Settings

3. Default Scan Settings

4. Additional Configurations and Exclusion Lists

5. Review & Confirm

 

When you add a web application we'll build a web asset in your subscription if it doesn't already exist. This asset has a name, URL and tags (optional) and it can be easily configured for other web applications like WAF.

Where can I see my assets? You'll see an inventory of all the assets you have access to in the CyberSecurity Asset Management (CSAM) application.

Users who are not Managers need to be granted access to web assets. A Manager can do this by going to the Administration utility, editing the users' accounts, and assigning web application tags to the user scopes.

Tagging web assets lets you grant users access to them. It also gives you a convenient way to manage large volumes of web applications. For reports, for example, you can select web application tags as the report target.

 

Tip View the vulnerabilities detected by scans of all your web applications, and filter them. Go to Detections > Detections.