How can we help you today?

Findings

Simple Vulnerability Management

With findings you can keep track of issues and manage vulnerabilities discovered in your systems

Written by Adina Mihaita
Updated 1 month ago

What does the findings' status mean?

You can use findings status to keep track of your remediation measures, or just to pick which findings to exclude from reporting

Written by Adina Mihaita
Updated 1 month ago

How is the risk level calculated?

Pentest-Tools.com scans for a wide variety of web or network vulnerabilities. Each vulnerability has a different impact and needs to be addressed accordingly. Learn how we calculate risk and which findings you should remediate first.

Written by Adina Mihaita
Updated 1 month ago

How to validate findings?

Don't take everything for granted. Manually verify your findings before generating the final report

Written by Adina Mihaita
Updated 1 month ago

Mark a finding as false positive

False positives are an inherent risk of automated security testing

Written by Victor Pisarciuc
Updated 1 month ago
See all articles (6) Hide articles

Reporting

Download your scan results

You can download a single scan or aggregate several scans in one report

Written by Dragos Sandu
Updated 1 month ago

Editable and customizable reports

Create a penetration test report in under 3 minutes! Save yourself from dealing with formatting issues, scattered data, custom reporting scripts, tweaks, and reporting bugs.

Written by Dragos Sandu
Updated 1 month ago

Creating Report Templates

Never start from scratch. Our pentest report templates work out-of-the-box. Choose the predefined template you need or create your own template to reuse every time.

Written by Victor Pisarciuc
Updated 1 month ago

Add your company logo to Pentest-Tools.com reports

Customize your reports in order to include your company’s logo instead of the Pentest-Tools.com logo

Written by Victor Pisarciuc
Updated 1 month ago

Attack Surface

How do I analyze my attack surface?

The data in your Pentest-Tools.com dashboard can help you with 2 out of 3 key steps that reduce your network attack surface.

Written by Victor Pisarciuc
Updated 4 months ago

Attack surface reduction VS. vulnerability management

Both vulnerability management and surface attack reduction share the same main goal: to reduce risk by making the environment more secure, but what's the difference?

Written by Victor Pisarciuc
Updated 1 month ago

How do I reduce my attack surface?

Direct proportion: Reducing attack surface means increasing security

Written by Victor Pisarciuc
Updated 1 month ago

Do all the tools on Pentest-Tools.com feed data into the Attack Surface view?

Sometimes, less is more. Similar to our Attack Surface view.

Written by Victor Pisarciuc
Updated 1 month ago

What happens to my Attack Surface view if I move or delete a target?

Moving or deleting a target from your current workspace may also delete all its associated data in the Attack Surface view.

Written by Victor Pisarciuc
Updated 1 month ago
See all articles (6) Hide articles

Notifications

JIRA Integration

Integrating Pentest-Tools.com into your JIRA workflow makes it easier for your team to scale security efforts and prioritize issues to resolve.

Written by Adina Mihaita
Updated 2 months ago

⚙️How to setup workspace notifications

You can now setup global triggers for all the scans in a workspace. If the conditions are matched, you will receive an email notification.

Written by Adina Mihaita
Updated 1 month ago

How to set up custom scan notifications

Reduce noise by setting up notifications when your scan matches certain conditions such as: found a high risk vulnerability, discovered a certain open port, etc.

Written by Adina Mihaita
Updated 1 month ago

How to change how notification emails look like

Use the whitelabel feature to customize the look of emails you receive or send to additional emails with scan results

Written by Adina Mihaita
Updated 1 month ago