Purpose
This document describes how to add personal attributes in the columns.
Introduction
In the Attributes tab, you can define up to ten custom attributes which can be used throughout the system. They can also be configured to only allow predefined values.
These attributes become available in the following sections depending on their configuration:
-
Users
-
Target
-
Reports
-
Scheduling
-
Discovery
Configure Attributes
To configure a custom attribute,
-
Go to Main Menu > Settings > Account.
-
Select Attributes tab.
-
Right click on any undefined fields and click Edit to open the Edit Attribute window.
-
Provide a name for the column to be added.
-
Enable Active field.
-
Configure the attribute according to options described in the Attribute Options table below.
-
Click Save.
Active field needs to be checked to make all the other check-boxes available. Also, Target field needs to be checked to make Reporting available.
Attribute Options table
|
Option |
Description |
|
Field Name |
Specifies the name of the custom attribute. |
|
Active |
If checked the attribute will be active in the system. |
|
User |
Creates a column in Manage Users, which is set when creating or editing a user. |
|
Target |
Creates a column in Manage Targets, which is set when editing a target or labeling a target group. |
|
Reporting |
Creates a column in Manage Targets and the Findings tab in Reporting Tools, which can be set when editing a target or labeling a target group. Only usable if target is selected. |
|
Scheduling |
Creates a column in the Scan Schedules tab in Scan Scheduling, which can be set when creating or editing a scan schedule. |
|
Vulnerability |
Creates a column in the Vulnerability Database, and in the Findings tab in Reporting Tools. This attribute can be set by editing an entry in the Vulnerability Database by right clicking the entry to edit and choose Edit Attributes. |
|
Finding |
Creates a column in the Findings tab in Reporting Tools, which can be set by editing an entry in the Findings tab by right clicking and select Edit Attributes. |
|
Export report |
Choose in what section of an exported report the attributes will be presented in. User, Target, and Scheduling are not presented in the exported reports.
|
|
Required |
If an attribute field exists for an entity, the attribute field requires a value. |
|
Field Type |
This selects a specific type of input that can be used in the attribute.
|
|
Acceptable Values |
Accepted values for the Combo and Number attributes.
Acceptable Values is only visible if Combo or Number has been selected in Field Type. |
Related Articles
- Windows 10/Windows 2019 Server
- HIAB Updates
- General Information about SMB/WinRM Scanning
- Change Risk Levels
- Removing an Agent from Windows
- ServiceNow - Legacy
- Windows 8.1
- Netsec Filters
- Discovering the Agent in OUTSCAN
- Technical Specification
- Account Settings
- How to Test SMB Authentication
- Windows 2016 Server
- Identity Provider Settings
- HIAB Server Settings
- Installing a Linux Agent
- Okta Identity Provider Configuration
- Scanning-Less Scanning
- Check Connectivity to Agent Server
- Scan Scheduling Errors
- Overview
- Event Notification Module
- HIAB Maintenance Settings
- HIAB Deployment Guide
- Database Connector (HIAB only)
- Azure AD Identity Provider Configuration
- Add Comments
- Target Groups
- Checking if Agent is Running
- Core Installation
- Windows 2008 R2 Server
- Agent Installation Introduction
- Automatic Asset Joining With Netsec
- Manage Users
- Firewall Setup for Agents
- Scanning Range
- SNMP (HIAB only)
- ADFS Identity Provider Configuration
- Splunk
- Agent Call Home
- Advanced Report Filters
- Accept Risks
- SMB Authentication from OUTSCAN/HIAB
- Virtual HIAB Appliance
- Using the Agent Info Command
- Amazon
- User Roles
- Removing an Agent from Linux
- Retrieving the Agent UUID
- Atlassian Jira
- Understanding Scanner and Scheduler
- Finding the Agent Version
- Create and Edit Event Notifications
- Installing a macOS Agent
- Syslog (HIAB only)
- Setting Up an Agent Using System Proxy
- ServiceNow - App
- Thycotic
- DNS Lookup in UI and in Console
- HIAB Console
- Auditing Guide
- Adding Agent Attributes
- HIAB Distribution Settings
- Run Verification Scans
- Agent Latest Version
- Finding New Agents In OUTSCAN
- Setting up a HIAB as an Appsec Scale Scanner
- Hardening the HIAB
- Performing a PCI DSS Scan
- Two Factor Authentication
- Attributes
- Firewall Rules
- HIAB Enrollment
- Supported Platforms for Authenticated SSH Scanning
- Authenticated Scanning Using WinRM
- OneLogin Identity Provider Configuration
- Windows 7
- HIAB Remote Support
- Compliance Scanning
- Manage Targets
- Assign Tasks
- Authenticated Scanning Using SSH
- Tickets Quick Start Guide
- Retrieving Results From the Agent in OUTSCAN
- Appliance Logs
- Converting Normal with Webapp Scans (Netsec) to Portal Workflows
- Updating the Agent
- Troubleshooting SMB Authentication
- Agent Licensing
- Mark as False Positives
- Installing a Windows Agent
- Using Farsight in Netsec
- Testing Target System for Open TCP Ports
- HIAB Restore
- Scan Stages
- Request Clarifications
- HIAB Setup Guide
- Updating Agent Attributes
- CyberArk
- LDAP/AD
- Checking if the Agent has Produced Results
- ArcSight (HIAB only)
- HIAB E-mail Whitelisting
- Adjust Identity Provider SAML Metadata File
- Scanning Critical Industrial Devices/Machines
- Reporting Tools
- Scan Scheduling
- Scanning Performance and Impact Tuning
- PCI Compliance Scanning
- Configuring and Accessing the HIAB console using SSH
- User Groups
- Create Users
- HIAB Remote SSH Guide
- Download Agents
- Create Targets
- Windows 2012 R2 Server
- HIAB Backup
- Report Scheduling
- Access Tokens
- O24AUTH
- Complementary Authenticated Scan on Default Credentials
- Authenticated Scanning Using SMB
- Dynamic Target Group