SWAT Asset Management
Error rendering macro 'excerpt-include'
No link could be created for 'DocT:Common Asset Management (broken)'.
SWAT Assets (SWAT Only)
The SWAT Assets view lists all of the SWAT web applications and instances.
Select an application to view its details on the right side of the window.
SWAT Assets - Details
FINDINGS
The Findings tab presents a pie graph with a summary of all of the findings and their severity based on CVSS v2 scoring system. A list of the findings used to build the chart can be found underneath. Clicking on any of the findings takes you directly to the findings section and automatically open the details of the finding. The table inside the Findings tab is also automatically filtered by the instance that you are viewing. If you wish to go back to SWAT Assets view, either click on the SWAT Assets button in the upper menu or use back button or perform a back action in your browser to return.
OWASP TOP 10
The OWASP Top 10 tab presents an overview of the OWASP Top 10 2017 application security risk areas in which vulnerabilities were detected:
EXECUTIVE SUMMARY
If executive summary is available for the selected application, it is displayed here.
Add Assets
See Add a Configuration, for information on how to add an asset.
Configure Authentication for an Asset
See AUTHENTICATION, for configuring authentication for an asset.
Manage Assets
Select an asset to view the additional user actions.
Click on Configure Asset, to make a default configuration for the selected asset.
Click on Submit for Scoping, to submit the selected assets for scoping.
Fill in the required details and click SUBMIT.
Option Description Solution Apply a solution to the targets that you submit for scoping.
Target Start Date The date for the testing to start. If the desired date is unavailable, a new date is suggested.
Assets The URL of the specific application that should be covered by this test.
Administration interface URLs Any administration interface present on the application.
Out of scope URLs URLs that are not considered to be in scope of the testing. Example: a feature hosted by a third party.
Known sensitive functionality Any known sensitive functionality that may be affected by security testing.
Accounts Test credentials to be used during testing. Either basic authentication or web-based.
Components and Technologies Standard components and technologies used by the web application like Drupal, ASP .NET, MongoDB.
Focus Areas The part of the web application that is most important to test, e.g. order section, administer users, searching etc.
See Tags to know how to add or remove tags to an asset.
Click on Generate report to download a report. See Reports, for more information.
Delete Assets
- Select the assets to be deleted, and click on the Delete button at the bottom of the view.
- Confirm the action by clicking DELETE.
Deleting assets removes data associated with the asset findings. It however does NOT remove the associated configurations, schedules, scans or other assets linked to the deleted asset.
Copyright
© 2023 Outpost24® All rights reserved. This document may only be redistributed unedited and unaltered. This document may be cited and referenced only if clearly crediting Outpost24® and this document as the source. Any other reproduction and redistribution in print or electronically is strictly prohibited without explicit permission.
Trademark
Outpost24® and OUTSCAN™ are trademarks of Outpost24® and its affiliated companies. All other brand names, product names or trademarks belong to their respective owners.