Summary

The Summary section provides a summary of the current security posture, the most pressing vulnerabilities, API scanning statuses, and identified secrets.

  • Login to Indusface WAS portal
  • Navigate to Summary section

Security Posture Overview

Assets Onboarded

Displays the number of assets onboarded and tracked by the system.

A screenshot of a graph

AI-generated content may be incorrect.

The chart indicates how many of your assets are in a healthy state vs. potentially insecure or in need of attention. The health status is represented by a gauge with color indicators (green for healthy, yellow for unhealthy, and red for exposed).

 

Asset Health StatusDescription
ExposedAny Assest that has Critical Vulnerbaility + High Risks as per AcuRisQ Algorithm
UnhealthyAny Assest that has Critical/high/Medium Vulnerability that need attention as per AcurisQ Algorithm
HealthyAny asset that has no Critical/High/Medium Vulnerability & no High Risk as per AcuRisQ Algorithm

High Risk AA Vulnerabilities

This section highlights the most critical vulnerabilities detected within your environment.

  • Each vulnerability is listed with a brief description (e.g., "Client-Initiated TLS Renegotiation Supported", "Content Injection").
  • For each vulnerability, there is a "Details" button that you can click to view more in-depth information about the issue and suggested fixes.

 

A screenshot of a computer

AI-generated content may be incorrect.

Clicking on the vulnerability count opens the complete details of the vulnerabilities in web application and takes you to the Web APP tab in Vulnerabilities.

A screenshot of a computer

AI-generated content may be incorrect.

API Scanning Status

This section tracks the scanning progress of your API endpoints.

A screenshot of a computer screen

AI-generated content may be incorrect.

Scan Summary: Displays the number of API scans in each state: Completed Scans, In Progress, or Discard           . 

API Findings: Each API host is listed with colored counters representing findings by severity: 

  • Red: Critical 
  • Yellow: High 
  • Blue: Medium 

View All: Selecting View All opens the complete list of API scans and navigates to the API Scan page for detailed information. 

A screenshot of a computer

AI-generated content may be incorrect.

Secrets Identified

This section provides a detailed overview of identified secrets (e.g., API keys, passwords, or tokens exposed in your environment).

A screenshot of a computer screen

AI-generated content may be incorrect.

 

Scan Summary: Displays the number of scans in each state: Completed or In Progress.

Each identified secret is linked to a URL, showing where the potential secret was detected. These links serve as a starting point to address and secure the exposed secrets.

Secrets Overview in EASM

By clicking the total identified secrets, you can view the complete details of the assets and navigate to the Secrets tab in EASM.

A screenshot of a computer screen

AI-generated content may be incorrect.

 

A screenshot of a computer

AI-generated content may be incorrect.

 

A screenshot of a computer screen

AI-generated content may be incorrect.

For comprehensive information about complete external attack surface management and identified secrets, refer to the EASM - > Secrets Documentation. 

Secrets Overview in Vulnerabilities 

By clicking Secrets, you can view the complete details and navigate to the Secrets tab in Vulnerabilities.

A screenshot of a computer screen

AI-generated content may be incorrect.

 

A screenshot of a computer

AI-generated content may be incorrect.

For comprehensive information about identified secrets, their severity and action taken, refer to the Vulnerbailities - > Secrets Documentation .  

Executive Report

Generates a high-level report summarizing security findings, intended for executives and decision-makers who need an overview of the system's security status without deep technical details.

A screenshot of a computer

AI-generated content may be incorrect.

Group(s)

The Groups section allows you to manage and track multiple groups, their associated scan services, vulnerability counts, and scan status.

A screenshot of a computer

AI-generated content may be incorrect.

Select Groups: Click the Groups option to choose one or multiple groups. All websites associated with the selected groups will be listed under the Sites section.

Click Settings and then Groups to create a new group.

A screenshot of a computer

AI-generated content may be incorrect.

 

When multiple groups are selected, the Sites list will show the unique set of websites across all selected groups.

Use the Display dropdown to choose how many records you want to view on the screen.

A screenshot of a computer

AI-generated content may be incorrect.

Click the  View Details icon to view the complete security status of the selected group. 

A screenshot of a computer

AI-generated content may be incorrect.

This action takes you to the Dashboard screen, which provides detailed insights such as:

  • Threats detected in the most recent scans
  • Top recurring or high-frequency threats
  • Additional security metrics presented in graphical format

A screenshot of a computer

AI-generated content may be incorrect.

To understand all dashboard features and visual metrics in detail, see the Dashboard Documentation.

Sites

The Sites section provides a centralized view of all applications and APIs, showing security status, audit results, and subscription plans with quick actions like view, delete, or scan. 

A screenshot of a white grid

AI-generated content may be incorrect.

 

ColumnDescription
Application NameURL of the onboarded application or API. 
Risk StatusIndicates the overall security status of each application.
Malware MonitoringNumber of findings from Malware Monitoring scans
Application AuditNumber of findings from Authentication Audit scans. 
Vulnerability AssessmentNumber of findings from Vulnerability Assessment.
API Security AuditNumber of findings from API scans.
TotalCombined count of findings from all scans.
Seal Status

Security scan result:  Not Eligible: All services not subscribed or scans incomplete. 

Fail: Critical or High-severity vulnerabilities detected; remediation required.  Pass: All services cleared with no Critical or High vulnerabilities. 

 

PlanSubscription plan assigned to the site.
Quick ControlsOptions to View Details, Delete, Scan Now.

Detailed Report: Malware Monitoring

Click the total count in the Malware Monitoring column for a specific application to view detailed findings. 

Detailed Report: Application Audit 

Click the total count in the Application Audit column for a specific application to view detailed findings. 

A screenshot of a computer

AI-generated content may be incorrect.

A screenshot of a computer

AI-generated content may be incorrect.

Detailed Report: Vulnerability Assessment

Click the total count in the Vulnerability Assessment column for a specific application to view detailed findings. 

A screenshot of a computer

AI-generated content may be incorrect.

Detailed Report: API Security Audit 

Click the total count in the API Security Audit column for a specific application to view detailed findings. 

A screenshot of a white grid

AI-generated content may be incorrect.

 

Quick Actions 

1. View Details 

Clicking the View Details button redirects to the Dashboard Tab, displaying a detailed overview of the selected site. 

 

A screenshot of a computer

AI-generated content may be incorrect.

2. Delete 

Clicking the Delete button opens a Survey Form to capture the reason for deletion and confirm the action. 

A screenshot of a white grid

AI-generated content may be incorrect.

 

 

Clicking Yes, Delete my site permanently removes the URL, and a confirmation message is displayed once the deletion is successful. 

3. Start Scan 

Clicking the Scan Now button opens the Start Scan popup. 

 

Two methods are available for providing authentication details: 

1. Using Recorded File 

  • Upload a JSON file generated via Puppeteer that records login steps. 
  • Add a Logout URL to verify session validity. 
  • The scanner replays the recorded steps for authenticated scanning. 

2. Using Login Credentials 

  • Enter Login URL, Username, and Password directly. 
  • Scanner will use these credentials for authentication. 

Click Start Scan without Authentication to proceed without verification 

Add Website 

Users can onboard Applications for scanning either through self-service or with assistance from the Indusface Support Team.  

Click the Add Website button to onboard a new application or API.

 

Select the Service to Proceed 

Choose your plan 

Select your License

A screenshot of a computer

AI-generated content may be incorrect. You will also be notified with the following details:  

  • Total licenses available  
  • Remaining licenses  
  • License expiry date  
  • Applicable promo codes for adding  

Click Proceed

Provide the domain URL in the Enter Domain Name field and click Proceed. 

A pop-up verifies the URL from the backend and requests authentication details.   Enter required details, then click Start Scan. 

Alternatively, click Start Scan without Authentication to proceed without verification. 

A confirmation message is displayed once the scan starts successfully. 

 

 

Was this helpful?