Skip to content Skip to main navigation Skip to footer

All our Support Center articles

83 Articles

Welcome to!

Find out how platform works, what it can do for your business and what makes it different to other solutions.

Try our tools for free

You don’t need an account for the Light version of the tools. Go to the tool page and start scanning your systems for vulnerabilities.

What are Targets and Base Targets?

We count as base targets only the hostname or IP address of the scanned system. All URLs belonging to the same base target will count as a single target.

How to add new targets

You can add new targets either from the targets page, by directly scanning them or from the scan results of discovery tools.

The support articles are categorized as follows:

  • Getting Started (4 Articles)

    Here you will discover some tips to get you started in using the platform.

  • Targets & Workspaces (6 Articles)

    Learn more about how to manage your targets and workspaces. These how-to articles will get you through adding, deleting and modifying your targets and workspaces and will also answer the most common questions you may have.

  • Scans (6 Articles)

    Here you can learn how to run new scans, find out about scan limitations, common scan errors, and how to manage scans from all your workspaces from the /scans page.

  • Tools (24 Articles)

    Here you will find answers to the most commonly asked questions and errors related to our scanners. To find out more about how they work, see each tool’s dedicated page on our website.

  • Vulnerability Management and Reporting (16 Articles)

    The vulnerability management feature lets you manage findings from all your scans and create ready-to-go reports, according to your needs. Organize your targets in the Attack Surface View and more.

  • Automation (7 Articles)

    Learn how to automate your workflows by using templates, scan groups, pentest robots and scan scheduling

  • VPN Profiles (2 Articles)

    VPN Profiles allow you to run our tools through VPN tunnels in order to reach internal company networks or other protected network segments.

  • Account and Billing (12 Articles)

    Find answers to the most common questions about subscriptions and the billing and payment process.

  • Data Security (8 Articles)

    Data privacy and security is one of our utmost concerns.

    This category contains all the necessary information about data security, how and where your data is stored, and more security-related topics.