Creating Web Application Scan
Overview
Web Application Vulnerability Scanning in DeepTraq helps organizations identify security risks, misconfigurations, and vulnerabilities in web applications before they can be exploited.
Through guided configuration and advanced scanning options, DeepTraq enables security teams to perform comprehensive vulnerability assessments and transform findings into actionable insights.
This guide explains how to configure and launch a web application vulnerability scan using DeepTraq.
Prerequisites
Before starting a web application vulnerability scan, ensure the following:
- Active DeepTraq user account
- Access to the target web application
- Permission to configure and run vulnerability scans
- Application environment details available for configuration
Accessing Web Application Scans
To begin scanning your web application:
- Navigate to Web Application Scans
- Click Start New Scan
- Configure scan details
- Set scan parameters
- Review and launch the scan
Creating a New Vulnerability Scan
To start a new vulnerability scan:
- Click Start New Scan
- Enter the scan details.
Required Information
-
Scan Name
Provide a clear and identifiable name for the scan. -
Description
Add a short description to help identify and manage this web application scan.
Configuring the Scan Environment
Configure the environment to ensure accurate testing without impacting application performance.
Steps
- Select the scan environment (e.g., production, staging, development).
- Verify application access details.
- Confirm the environment configuration.
This ensures the scan runs safely within the selected environment.
Organizing Scans with Tags
Tags help organize and categorize scans for easier management.
Steps
- Add relevant tags to the scan.
- Use tags to group scans by:
- Application
- Environment
- Project
- Security initiative
Tags are optional but recommended for improved scan management.
Configuring Scan Parameters
After defining scan details, configure the scanning parameters.
Scanner Configuration
Select the appropriate scanner settings based on your application's architecture and security requirements.
Advanced Scan Options
Configure advanced options to improve vulnerability detection coverage, including settings optimized for unauthorized vulnerability scanning.
These options help ensure comprehensive security testing.
Configuring Reporting Options
DeepTraq provides intelligent reporting features to convert vulnerability findings into actionable insights.
Available Options
-
Scanner Analysis Options
Control how the vulnerability scan analyzes your web application. -
AI-Powered Reporting
Automatically translate technical vulnerability findings into executive-ready summaries.
This helps both technical teams and leadership quickly understand security risks.
Scheduling Scan Frequency
DeepTraq allows automated vulnerability scanning based on your preferred schedule.
Scheduling Options
- Run scans on-demand
- Run scans at a specific time
- Schedule recurring security scans
Steps
- Configure the scan frequency
- Choose a specific execution time
- Enable automated scanning
Scheduled scans help maintain continuous security monitoring.
Reviewing Scan Configuration
Before launching the scan:
- Review all configured settings
- Verify scan parameters
- Confirm scheduling configuration
- Ensure target application details are correct
This step helps prevent misconfiguration and ensures accurate scan results.
Launching the Security Scan
Once configuration is complete:
- Click Launch Scan
- Confirm scan activation
DeepTraq will begin analyzing your web application for vulnerabilities and security weaknesses.
Monitoring Scan Results
After launching the scan:
- Navigate to Web Application Scans → Results
- Monitor scan progress
- Review detected vulnerabilities
- Follow recommended remediation steps
DeepTraq provides detailed insights and remediation guidance to help security teams quickly resolve identified risks.
Best Practices
To maintain secure web applications:
- Run vulnerability scans regularly
- Schedule automated security assessments
- Enable AI-powered reporting for faster analysis
- Review and remediate critical vulnerabilities immediately
- Monitor scan results for continuous security improvement