Continuous Scan Details
Understanding the Continuous Scan Details Page
The Continuous Scan Details page is a crucial component of Astra's security platform, providing users with an in-depth view of their automated scan results. This page helps users to monitor, manage, and act upon the vulnerabilities identified across all their targets in a streamlined and efficient manner. This guide will walk you through the various features and actions available on the Continuous Scan Details page.
What is the Continuous Scan Details Page?
The Continuous Scan Details page is designed to give users a comprehensive overview of their continuous scans, allowing them to see the results of automated scans across multiple targets. This page consolidates critical information, so you can quickly assess your security posture and take the necessary actions.
What actions are available on the Continuous Scan Details page?
The Continuous Scan Details page offers several actionable items to help you manage your scans effectively:
Request Vetting: This action allows you to request a vetting of the identified vulnerabilities by Astra's security experts. Vetting helps to ensure that the vulnerabilities are correctly identified and prioritized. Learn more about the vetting process.
Generate Reports: You can generate detailed reports of your scan results, which can be shared with stakeholders or used for further analysis. How to generate and manage reports.
Get Sitemap: This feature generates a list of every endpoint scanned in your application, giving you a detailed overview of your application's structure.
How to Track the Progress of a Continuous Scan?
The progress of your continuous scan is displayed through a progress bar on the right side of the page, visually representing each stage of the scan process. Each stage is marked with a checkmark upon successful completion.
Connectivity Check
In this initial stage, the scanner attempts to access your target. If your application or asset is protected by a firewall or Cloudflare, the connectivity check might fail. When this happens, it’s essential to whitelist the scanner's IP addresses to ensure the scan can proceed. If the check fails, reviewing and adjusting your security settings is necessary to continue with the scan.
Login Recording
If your target requires user authentication, Astra allows you to configure the scanner to perform an authenticated scan, similar to how a logged-in user would interact with the application. During this stage, you need to enter the credentials for the different user roles in your application. This setup ensures that the scanner can access areas of your application that require authentication. If you encounter issues with login recording, refer to our help article on setting up login recording for detailed guidance.
How to record a login sequence with Chrome DevTools recorder?
Vulnerability Scanning
This stage involves a comprehensive scan for vulnerabilities within your application. The scanner checks for a wide range of security issues, ensuring that all potential vulnerabilities are identified.
CVEs Scanning
In this phase, the scanner searches for known vulnerabilities, specifically Common Vulnerabilities and Exposures (CVEs). The scanner cross-references your application against Astra’s own database of CVEs to identify any potential security risks.
How to Improve Your Security Posture with Grades?
The Grades section offers a quick overview of your security posture by grading the results of your continuous scans. Grades are calculated based on the severity and number of vulnerabilities found, helping you understand your current security standing at a glance. Improving your grades involves addressing high-severity vulnerabilities promptly. Learn more about grades and their importance.
How to Track the Severity Status of the Vulnerabilities Found?
The Vulnerability Severity section provides a breakdown of vulnerabilities by their severity—Critical, High, Medium, Low, and Info. This section allows you to prioritize your remediation efforts based on the severity of the issues found. Detailed help on understanding and tracking vulnerability severity.
Where to View the Reported Vulnerabilities During the Continuous Scan?
At the center of the Continuous Scan Details page, you'll find a table listing all the vulnerabilities detected during the scan. This table is equipped with powerful filters, sorting options, and a search bar, making it easy to find specific vulnerabilities. You can click on any listed vulnerability to view detailed information about it. Learn more about viewing and managing vulnerabilities.
Frequently Asked Questions (FAQs)
1: How often should I run continuous scans?
Continuous scans are designed to run automatically at regular intervals, ensuring that your systems are consistently monitored for vulnerabilities. However, the frequency can vary depending on your specific security needs and the criticality of your assets.
2: How do I interpret the grades given to my scan results?
The grades on the Continuous Scan Details page represent an overall assessment of your security posture based on the vulnerabilities identified during the scan. Each grade is calculated by considering the severity, number, and type of vulnerabilities found. A higher grade indicates a better security posture, while a lower grade suggests that there are significant vulnerabilities that need attention. To improve your grades, prioritize resolving high-severity vulnerabilities and regularly monitor your systems.
Updated on: 04/09/2024
Thank you!