Skip to main content

Creating Web Application Scan

Overview

Web Application Vulnerability Scanning in DeepTraq helps organizations identify security risks, misconfigurations, and vulnerabilities in web applications before they can be exploited.

Through guided configuration and advanced scanning options, DeepTraq enables security teams to perform comprehensive vulnerability assessments and transform findings into actionable insights.

This guide explains how to configure and launch a web application vulnerability scan using DeepTraq.


Prerequisites

Before starting a web application vulnerability scan, ensure the following:

  • Active DeepTraq user account
  • Access to the target web application
  • Permission to configure and run vulnerability scans
  • Application environment details available for configuration

Accessing Web Application Scans

To begin scanning your web application:

  1. Navigate to Web Application Scans
  2. Click Start New Scan
  3. Configure scan details
  4. Set scan parameters
  5. Review and launch the scan

Creating a New Vulnerability Scan

To start a new vulnerability scan:

  1. Click Start New Scan
  2. Enter the scan details.

Required Information

  • Scan Name
    Provide a clear and identifiable name for the scan.

  • Description
    Add a short description to help identify and manage this web application scan.


Configuring the Scan Environment

Configure the environment to ensure accurate testing without impacting application performance.

Steps

  1. Select the scan environment (e.g., production, staging, development).
  2. Verify application access details.
  3. Confirm the environment configuration.

This ensures the scan runs safely within the selected environment.


Organizing Scans with Tags

Tags help organize and categorize scans for easier management.

Steps

  1. Add relevant tags to the scan.
  2. Use tags to group scans by:
    • Application
    • Environment
    • Project
    • Security initiative

Tags are optional but recommended for improved scan management.


Configuring Scan Parameters

After defining scan details, configure the scanning parameters.

Scanner Configuration

Select the appropriate scanner settings based on your application's architecture and security requirements.

Advanced Scan Options

Configure advanced options to improve vulnerability detection coverage, including settings optimized for unauthorized vulnerability scanning.

These options help ensure comprehensive security testing.


Configuring Reporting Options

DeepTraq provides intelligent reporting features to convert vulnerability findings into actionable insights.

Available Options

  • Scanner Analysis Options
    Control how the vulnerability scan analyzes your web application.

  • AI-Powered Reporting
    Automatically translate technical vulnerability findings into executive-ready summaries.

This helps both technical teams and leadership quickly understand security risks.


Scheduling Scan Frequency

DeepTraq allows automated vulnerability scanning based on your preferred schedule.

Scheduling Options

  • Run scans on-demand
  • Run scans at a specific time
  • Schedule recurring security scans

Steps

  1. Configure the scan frequency
  2. Choose a specific execution time
  3. Enable automated scanning

Scheduled scans help maintain continuous security monitoring.


Reviewing Scan Configuration

Before launching the scan:

  1. Review all configured settings
  2. Verify scan parameters
  3. Confirm scheduling configuration
  4. Ensure target application details are correct

This step helps prevent misconfiguration and ensures accurate scan results.


Launching the Security Scan

Once configuration is complete:

  1. Click Launch Scan
  2. Confirm scan activation

DeepTraq will begin analyzing your web application for vulnerabilities and security weaknesses.


Monitoring Scan Results

After launching the scan:

  1. Navigate to Web Application Scans → Results
  2. Monitor scan progress
  3. Review detected vulnerabilities
  4. Follow recommended remediation steps

DeepTraq provides detailed insights and remediation guidance to help security teams quickly resolve identified risks.


Best Practices

To maintain secure web applications:

  • Run vulnerability scans regularly
  • Schedule automated security assessments
  • Enable AI-powered reporting for faster analysis
  • Review and remediate critical vulnerabilities immediately
  • Monitor scan results for continuous security improvement