Findings

How is the risk level calculated?

Pentest-Tools.com scans for a wide variety of web or network vulnerabilities. Each vulnerability has a different impact and needs to be addressed accordingly. Learn how we calculate risk and which findings you should remediate first.

Written by Adina Mihaita
Updated 3 years ago

Simple Vulnerability Management

With findings you can keep track of issues and manage vulnerabilities discovered in your systems

Written by Adina Mihaita
Updated 1 year ago

How to Add Findings Manually to Your Penetration Testing Results

You can add new findings from scratch, by cloning an existing finding, or by using a template

Written by Victor Pisarciuc
Updated 3 years ago

How to validate findings?

Don't take everything for granted. Manually verify your findings before generating the final report.

Written by Adina Mihaita
Updated 1 year ago

What does the findings' status mean?

You can use findings status to keep track of your remediation measures, or just to pick which findings to exclude from reporting

Written by Adina Mihaita
Updated 3 years ago
See all articles (6) Hide articles

Reporting

Editable and customizable reports

Create a penetration test report in under 3 minutes! Save yourself from dealing with formatting issues, scattered data, custom reporting scripts, tweaks, and reporting bugs.

Written by Dragos Sandu
Updated 1 year ago

Download your scan results

You can download a single scan or aggregate several scans in one report

Written by Dragos Sandu
Updated 1 year ago

Creating Report Templates

Never start from scratch. Our pentest report templates work out of the box. Choose the predefined template you need or create your own template to reuse every time.

Written by Victor Pisarciuc
Updated 1 year ago

Add your company logo to Pentest-Tools.com reports

Customize your reports in order to include your company’s logo instead of the Pentest-Tools.com logo

Written by Victor Pisarciuc
Updated 1 year ago

Attack Surface

How do I analyze my attack surface?

The data in your Pentest-Tools.com dashboard can help you with 2 out of 3 key steps that reduce your network attack surface.

Written by Victor Pisarciuc
Updated 4 months ago

Do all the tools on Pentest-Tools.com feed data into the Attack Surface view?

Sometimes, less is more. Similar to our Attack Surface view.

Written by Victor Pisarciuc
Updated 4 months ago

How do I reduce my attack surface?

Direct proportion: Reducing attack surface means increasing security

Written by Victor Pisarciuc
Updated 3 years ago

What happens to my Attack Surface view if I move or delete a target?

Moving or deleting a target from your current workspace will also delete all its associated data in the Attack Surface view.

Written by Victor Pisarciuc
Updated 10 months ago

Attack surface reduction VS. vulnerability management

Both vulnerability management and surface attack reduction share the same main goal: to reduce risk by making the environment more secure, but what's the difference?

Written by Victor Pisarciuc
Updated 3 years ago

Notifications

Scan Difference - Monitor Changes on Your Targets

“How can I track scan trends?”; “Do you offer scan difference reports?”; “Can I receive notifications only for new vulnerabilities?”

Written by Dragos Sandu
Updated 4 months ago

How to change how notification emails look like

Use the whitelabel feature to customize the look of emails you receive or send to additional emails with scan results

Written by Adina Mihaita
Updated 1 year ago

How to change the email to which scan results are sent?

You can't modify the default email, but you can add additional emails to receive scan notifications

Written by Adina Mihaita
Updated 1 year ago

⚙️How to set up workspace notifications

You can now setup global triggers for all the scans in a workspace. If the conditions are matched, you will receive an email notification.

Written by Adina Mihaita
Updated 2 years ago

How to set up custom scan notifications

Reduce noise by setting up notifications when your scan matches certain conditions such as: found a high risk vulnerability, discovered a certain open port, etc.

Written by Adina Mihaita
Updated 2 years ago