Error rendering macro 'excerpt-include'

No link could be created for 'DocT:Common Asset Management (broken)'.

SWAT Assets (SWAT Only)

The SWAT Assets view lists all of the SWAT web applications and instances. 

Select an application to view its details on the right side of the window. 

SWAT Assets - Details



The Findings tab presents a pie graph with a summary of all of the findings and their severity based on CVSS v2 scoring system. A list of the findings used to build the chart can be found underneath. Clicking on any of the findings takes you directly to the findings section and automatically open the details of the finding. The table inside the Findings tab is also automatically filtered by the instance that you are viewing. If you wish to go back to SWAT Assets view, either click on the SWAT Assets button in the upper menu or use back button or perform a back action in your browser to return.


The OWASP Top 10 tab presents an overview of the OWASP Top 10 2017 application security risk areas in which vulnerabilities were detected:

OWASP Top 10


If executive summary is available for the selected application, it is displayed here.


Add Assets

See Add a Configuration, for information on how to add an asset. 

Configure Authentication for an Asset

See AUTHENTICATION, for configuring authentication for an asset.

Manage Assets

Select an asset to view the additional user actions.

Manage Assets

  1. Click on Configure Asset, to make a default configuration for the selected asset.

  2. Click on Submit for Scoping, to submit the selected assets for scoping.

    Submit for Scoping

    Fill in the required details and click SUBMIT.


    Apply a solution to the targets that you submit for scoping.

    Target Start Date

    The date for the testing to start. If the desired date is unavailable, a new date is suggested.


    The URL of the specific application that should be covered by this test.

    Administration interface URLs

    Any administration interface present on the application.

    Out of scope URLs

    URLs that are not considered to be in scope of the testing. Example: a feature hosted by a third party.

    Known sensitive functionality

    Any known sensitive functionality that may be affected by security testing.


    Test credentials to be used during testing. Either basic authentication or web-based.

    Components and Technologies

    Standard components and technologies used by the web application like Drupal, ASP .NET, MongoDB.

    Focus Areas

    The part of the web application that is most important to test, e.g. order section, administer users, searching etc.

  3. See Tags to know how to add or remove tags to an asset.

  4. Click on Generate report to download a report. See Reportsfor more information. 

  5. Delete Assets

    1. Select the assets to be deleted, and click on the Delete button at the bottom of the view.
    2. Confirm the action by clicking DELETE.

      Delete Assets

Deleting assets removes data associated with the asset findings. It however does NOT remove the associated configurations, schedules, scans or other assets linked to the deleted asset.


© 2023 Outpost24® All rights reserved. This document may only be redistributed unedited and unaltered. This document may be cited and referenced only if clearly crediting Outpost24® and this document as the source. Any other reproduction and redistribution in print or electronically is strictly prohibited without explicit permission.


Outpost24® and OUTSCAN™ are trademarks of Outpost24® and its affiliated companies. All other brand names, product names or trademarks belong to their respective owners.