Manage Vulnerabilities

Overview

The Vulnerability Dashboard is the central workspace where you view, analyze, and act on security risks across your applications. 

It consolidates scan results, shows protection status, and allows you to take remediation actions directly from the interface.

A typical workflow in this dashboard follows this sequence:

  1. Review overall risk (Open Vulnerabilities) 
  2. Identify patterns (Top Categories) 
  3. Track progress (Previous Scans) 
  4. Run or manage scans 
  5. Take action on individual vulnerabilities

Step 1: Select Application

Before analyzing vulnerabilities, select the required application from the domain/application selector at the top.

This determines:

  • Which application’s vulnerabilities are displayed 
  • Whether the data corresponds to a web application or API application

Step 2: Understand Open Vulnerabilities

This section provides a summary of all detected vulnerabilities for the selected application. It helps you quickly understand the current risk exposure and severity distribution.

Parameter 

Description 

Total Total number of vulnerabilities detected 
Critical / High / Medium / Low & Info Severity-wise distribution of vulnerabilities 
Last 30 days trend Indicates whether vulnerabilities are increasing or decreasing 
Core Rules Vulnerabilities patched using platform-managed rules 
Custom Rules Vulnerabilities patched using user-requested rules 
Needs Virtual Patching Vulnerabilities not yet patched but can be mitigated via WAF 
To be Fixed in Code Vulnerabilities that require application-level fixes 

If critical or high vulnerabilities exist under unpatched categories, your application is still exposed.

Step 3: Highest Open Vulnerabilities

This section highlights the top vulnerability categories contributing to risk. Instead of showing individual vulnerabilites, it groups them into patterns.

Section 

Description 

All Unpatched Vulnerabilities (Top 5) Categories with highest unresolved vulnerabilities 
Patched by Core Rules (Top 5) Categories mitigated by default protection 
Patched by Custom Rules (Top 5) Categories mitigated via custom rules 

Resolve with SwyftComply

The Resolve with SwyftComply option allows you to initiate automated vulnerability remediation directly from this section.

  • Applies virtual patches to open vulnerabilities 
  • Reduces the need for manual rule creation 
  • Helps accelerate remediation for high-risk categories 

For detailed steps and behavior, refer to SwyftComply Configuration and Usage.

Step 4: Previous Scans

4.1: Previous Scans (Review Scan Trends)

This section displays vulnerability trends across the last 5 scans. It helps you evaluate whether your remediation efforts are effective.

Parameter 

Description 

Critical / High / Medium Severity distribution per scan 
Patched Number of vulnerabilities resolved 
To be Patched Number of vulnerabilities still open 
Scan Timeline Date and time of each scan 

4.2 Manage Scan & Remediation

This section displays the current scan status, historical execution details, and available actions for vulnerability detection and remediation.

The available panels vary based on the type of application selected (Web or API).

4.2.1 Web Application Context

When a Web application is selected, this section displays the following panels:

  • AUTO SCAN 
  • MANUAL PENTESTING 
  • SWYFTCOMPLY 

These panels together enable automated scanning, manual testing, and autonomous patching to ensure vulnerabilities are continuously identified and addressed.

Auto Scan

The AUTO SCAN panel provides details about scheduled and on-demand vulnerability scans for the selected application.

It reflects both:

  • Scan execution status 
  • Latest scan results

Field 

Description 

Auto scan schedule Displays configured scan frequency and timing 
Current Scan Requested At Timestamp when the latest scan was triggered 
Current Scan Status Indicates if a scan is currently running 
Last Scanned Timestamp of the last completed scan 
Last Scan Status Status of the last scan 
Total Vulnerabilities Detected Number of vulnerabilities identified 
Exploits Blocked (last 30 days) Number of attacks mitigated 

Actions

Action 

Description 

Start Scan Initiates an immediate scan 
Download Report Downloads scan results in PDF format 

Accessing Auto Scan Configuration

Click the settings icon in the AUTO SCAN panel to open the Scan Configuration window

This is where:

  • Auto Scan behavior is defined
  • Global Scan settings are configured

Scan configuration can be defined at two levels:

  1. Application-Level Scan Configuration 
  2. Global Scan Configuration 

1. Application-Level Scan Configuration

Application-level configuration controls how scans are executed for a specific application.

Parameter 

Description 

Scan URL Target URL for the application scan 
Scan Behind Login Page Enables authenticated scanning when turned on 
AutoScan Status Enables or disables scheduled scanning for the application 
Initiate Auto Scan Every Defines scan frequency in weeks 
Time (24 hrs format) Specifies the scan start time 
Repeat On Selects the day(s) on which the scan should run 

Behavior

  • Applies only to the selected application
  • Overrides Global Scan settings if both are configured 
  • Can be used for critical applications requiring different scan frequency

Global Scan Configuration

Enable the “Global Scan for Web Apps” toggle in the Scan Configuration to apply a centralized scan schedule across all web applications.

Global Scan allows you to define a centralized scan schedule across multiple web applications, eliminating the need to configure scans individually.

Parameter 

Description 

AutoScan Status Enables or disables global scan scheduling 
Initiate Auto Scan Every Defines scan frequency (in weeks) 
Avoid Scan From / To Defines time window during which scans should not run 
Repeat On Selects days for scan execution 
Link Web and API Global Scan Schedules Applies a single schedule across both Web and API applications 

Scheduling Modes

1. Separate Scheduling  - Web and API applications can have independent schedules (Useful when APIs require different scan frequency)

2. Linked Scheduling - A single schedule is applied across both Web and API applications 

Enabled using “Link Web and API Global Scan Schedules”

Use this only when both application types require the same scan timing.

Global Scan Behavior: Web Applications

Newly onboarded web applications are automatically included in the global scan schedule 

Example: 
If a scan is scheduled every Thursday, all newly added web applications will follow the same schedule.

Manual Pentesting

The MANUAL PENTESTING panel allows you to request a manual penetration test for deeper vulnerability analysis. 

Manual Pentesting complements automated scanning by uncovering complex, business logic, and context-driven vulnerabilities that require expert validation.

Field 

Description 

Current Status Status of the pentest request 
Last Started Timestamp when testing began 
Total Vulnerabilities Detected Number of vulnerabilities identified 
Requested at Timestamp when the request was submitted 

Action 

Description 

Request Manual PenTest Initiates a manual penetration testing request 
  • Click Request Manual PenTest.
  • Result: A confirmation pop-up appears. 
  • Provide the confirmation and the request will be forwarded to our AppTrana team.

Behavior

  • Requests are handled by the AppTrana team 
  • Results are updated in the dashboard after completion

SWYFTCOMPLY

The SWYFTCOMPLY panel provides autonomous virtual patching. It ensures identified vulnerabilities are virtually patched without requiring manual intervention.

 

For detailed steps and behavior, refer to SwyftComply for Auto Scan & Manual Pentest

4.2.2: API Context

Selected API Scan

  • From the application menu, select the API application. 
  • Navigate to Selected API Scan field. 

This section provides details about API scan execution and allows you to configure and initiate API scans.

Field 

Description 

Auto scan schedule Indicates whether API scan scheduling is active or inactive 
Current Scan Requested At Timestamp of the most recent scan request 
Current Scan Status Indicates if a scan is currently running 
Scan Started Start time of the last scan 
Scan Finished Completion time of the last scan 
Total Vulnerabilities Found Number of vulnerabilities identified 
Exploits Blocked (last 30 days) Number of attacks mitigated 

 

Action 

Description 

API Scan Initiates an API scan 
Download API Scan Report Downloads the API scan report 
Manage APIs Opens API configuration to upload or modify APIs. See API Configuration in AppTrana for more details.  

API Scan Configuration

Clicking settings icon opens the Scan Configuration window for API applications. This window allows you to define scan behavior and scheduling for API applications.

The configuration window contains the following sections:

Section 

Parameter 

Description 

Global Scan for API Apps Toggle Enables or disables global scan scheduling for API applications 
URL Scan URL Displays the selected API application 
Scan Options Scan Behind Login Page Enables authenticated scanning if required 
Schedule Scan AutoScan Status Enables or disables scheduled scans 
Schedule Scan Initiate Auto Scan Every Defines scan frequency in weeks 
Schedule Scan Avoid Scan From / To Defines time window during which scans should not run 
Schedule Scan Repeat On Selects days for scan execution 
Schedule Scan Link Web and API Global Scan Schedules Applies a unified schedule across Web and API applications 

Global Scan settings defined here control scheduling across API applications

Schedule Scan

This section defines when and how frequently API scans are executed.

Parameter 

Description 

AutoScan Status Enables or disables global scan scheduling for API applications 
Initiate Auto Scan Every Defines how often the scan runs (in weeks) 
Avoid Scan From / To Specifies a time window during which scans should not run 
Repeat On Selects the days when scan restrictions (avoid window) apply 

Link Web and API Global Scan Schedules

Enable “Link Web and API Global Scan Schedules” to apply a single unified scan schedule across both Web and API applications.

  • When enabled → Web and API scans follow the same schedule 
  • When disabled → API scans follow their own independent schedule 

Global Scan is not applied immediately after onboarding for API applications. Global Scan is automatically applied to web applications upon onboarding, whereas API applications require initial configuration and a first successful scan before being included.

Manage API

  • To onboard and configure your API, go to Selected API Scan and click Manage APIs.
  • You will be redirected to API Security → API Scanning

Click here to follow the step-by-step API onboarding process.

SwyftComply

The SWYFTCOMPLY panel provides autonomous virtual patching  of API vulnerabilities

 

For detailed steps and behavior, refer to SwyftComply for API Scan

Step 5: List of Vulnerabilities Detected

This is the primary action section where vulnerabilities are reviewed and remediated. 

Use the tabs to filter vulnerabilities based on their current status:

Tab 

Description 

All Displays all vulnerabilities 
Needs Action Displays vulnerabilities requiring remediation 
Patched Displays vulnerabilities that are already protected 
Whitelisted Displays vulnerabilities marked as safe or ignored 

5.1 View all vulnerabilities

This section provides a detailed, row-level view of all detected vulnerabilities, enabling you to review, validate, and take action on each vulnerabilities.

Each row represents a vulnerability with the following details:

Column 

Description 

Vulnerability IDUnique identifier assigned to each vulnerability 
URL Affected endpoint 
Category Type of vulnerability 
Severity Risk level (Critical / High / Medium) 
Protected Status Indicates if vulnerability is patched 
Found On Date when vulnerability was detected 
Detected By Source of detection (Auto Scan / Manual) 
Exploits Blocked Number of blocked attempts 
POC Status Availability of proof of concept 

Click on the Vulnerability ID to open the detailed view of the selected vulnerability.

Request POC

Click Request POC to validate whether a vulnerability is practically exploitable. This helps you understand the real impact before taking remediation actions.

When you click Request POC, a confirmation pop-up appears asking you to proceed with the request.

Click View POC once it is generated to review detailed evidence demonstrating how the vulnerability can be exploited.

The POC may include request-response data, payloads, or visual proof such as browser errors, certificate issues, or application behavior that confirms the vulnerability.

Actions

Use the available actions to validate findings, apply protection, or track remediation based on your workflow. 

You can take the following actions to validate and remediate vulnerabilities:

Action 

Description 

Request Custom Rule Request protection via WAF 
Whitelist Mark vulnerability as ignored 
Create Link Create Jira issue for tracking 

5.2 Needs Action

The Needs Action tab displays vulnerabilities that are not yet fully remediated and require user or platform intervention.

Column 

Description 

Vulnerability ID Unique identifier for each vulnerability 
URL Affected endpoint 
Category Type of vulnerability 
Severity Risk level indicating priority 
Found On Date when the vulnerability was detected 
Detected By Source of detection 
Protected Status Indicates pending action (e.g., Need CR, Not Protected) 
Actions Request Custom Rule, View/Request POC, Whitelist 

Click on the Vulnerability ID in the Needs Action tab to open the detailed view of the selected vulnerability.

From this view, you can take the following actions:

Action 

Description 

Resolve with SwyftComply™ Initiates autonomous virtual patching to protect the vulnerability without requiring code changes 
Request New Custom Rule Submits a request to create a WAF rule for targeted mitigation of the vulnerability 
Request POC Validates exploitability by generating a proof of concept 

5.3 Patched

The Patched tab displays vulnerabilities that are already protected through AppTrana.

Column 

Description 

URL Affected endpoint 
Category Type of vulnerability 
Severity Risk level of the vulnerability 
Found On Date when the vulnerability was detected 
Protection Type Indicates how the vulnerability is mitigated (Core Rules, Custom Rules, Advanced Rules) 

5.4 Whitelisted

The Whitelisted tab displays vulnerabilities marked as safe or intentionally ignored.

Column 

Description 

Vulnerability ID Unique identifier for each vulnerability 
URL Affected endpoint 
Category Type of vulnerability 
Whitelisted By User who marked the vulnerability as safe 
Severity Risk level of the vulnerability 
Detected By Source of detection 
Actions Option to remove whitelist (UnWhitelist) 

To learn how to whitelisting vulnerabilities, see Whitelist Vulnerabilities.

 

Was this helpful?