Reporting and Vulnerability Management
Manage Findings, create ready-to-go Reports, organize your Targets in Attack Surfaces and more.Findings
How is the risk level calculated?
Pentest-Tools.com scans for a wide variety of web or network vulnerabilities. Each vulnerability has a different impact and needs to be addressed accordingly. Learn how we calculate risk and which findings you should remediate first.
Simple Vulnerability Management
With findings you can keep track of issues and manage vulnerabilities discovered in your systems
How to Add Findings Manually to Your Penetration Testing Results
You can add new findings from scratch, by cloning an existing finding, or by using a template
How to validate findings?
Don't take everything for granted. Manually verify your findings before generating the final report.
What does the findings' status mean?
You can use findings status to keep track of your remediation measures, or just to pick which findings to exclude from reporting
Reporting
Editable and customizable reports
Create a penetration test report in under 3 minutes! Save yourself from dealing with formatting issues, scattered data, custom reporting scripts, tweaks, and reporting bugs.
Download your scan results
You can download a single scan or aggregate several scans in one report
Creating Report Templates
Never start from scratch. Our pentest report templates work out of the box. Choose the predefined template you need or create your own template to reuse every time.
Add your company logo to Pentest-Tools.com reports
Customize your reports in order to include your company’s logo instead of the Pentest-Tools.com logo
Attack Surface
How do I analyze my attack surface?
The data in your Pentest-Tools.com dashboard can help you with 2 out of 3 key steps that reduce your network attack surface.
Do all the tools on Pentest-Tools.com feed data into the Attack Surface view?
Sometimes, less is more. Similar to our Attack Surface view.
How do I reduce my attack surface?
Direct proportion: Reducing attack surface means increasing security
What happens to my Attack Surface view if I move or delete a target?
Moving or deleting a target from your current workspace will also delete all its associated data in the Attack Surface view.
Attack surface reduction VS. vulnerability management
Both vulnerability management and surface attack reduction share the same main goal: to reduce risk by making the environment more secure, but what's the difference?
Notifications
Scan Difference - Monitor Changes on Your Targets
“How can I track scan trends?”; “Do you offer scan difference reports?”; “Can I receive notifications only for new vulnerabilities?”
How to change how notification emails look like
Use the whitelabel feature to customize the look of emails you receive or send to additional emails with scan results
How to change the email to which scan results are sent?
You can't modify the default email, but you can add additional emails to receive scan notifications
⚙️How to set up workspace notifications
You can now setup global triggers for all the scans in a workspace. If the conditions are matched, you will receive an email notification.
How to set up custom scan notifications
Reduce noise by setting up notifications when your scan matches certain conditions such as: found a high risk vulnerability, discovered a certain open port, etc.