Scan & Vulnerability Management
Manage and track your security scans, identify vulnerabilities, and prioritize remediation to maintain a strong security posture
Collections
- Vulnerabilities
Track and analyze vulnerabilities from security scans, understand their impact, and learn steps to prioritize and resolve them for better security
- Security Posture
Monitor your security posture through security grades, risk scores, and key metrics that reflect the overall security health of your environment
- Resolution & Re-scanning
Learn how to resolve identified vulnerabilities, prioritize remediation efforts, and track progress to strengthen your security defenses
Articles
- I’m seeing traffic fuzzing our infrastructure. How can I verify if requests coming to the target web app, APIs or server are from Astra?
- Overview of Continuous Scans page
- Is there any downtime when a vulnerability scan or a Pentest is happening?
- What is Vetting?
- Starting a Scan
- What is the maximum time it may take for a scan to finish?
- Continuous Scan Details
- How to cancel an ongoing scan