This option enables you to view a list of previously run scans, currently run scans and future scheduled scans. It also allows you to define and schedule new scans, as well as to modify and rerun existing scans.
You can save and reuse a set of scan settings as a template to start another scan quickly. Bright provides you with the option to use one of the standard templates or to create a custom one. For more information see Managing Scan Templates.
|   Projects||This option enables you to distribute scanning tasks between different teams of your organization as well as to manage scanning and fixing the detected issues within each team. For more information see Managing Projects.|
|   Authentications||This option allows you to create an authentication object and connect it for a scan. The authentication object is designed to grant Nexploit access to the protected parts of a target application. By using the authentication object, you enable complete coverage of a scan target. For more information see Managing Your Authentications.|
|   Repeaters||A Repeater is a local agent that provides a secure connection between Bright cloud engine and a target on a local network. A Repeater enables you to securely scan targets on a local network without having to whitelist Bright IP address in your firewall. For more information see Managing Repeaters.|
|   Storage||This option enables you to upload files to Bright and to manage your organization’s Bright storage. For more information see Managing Bright File Storage.|
|   Accounting and
|This option allows you to manage plan subscriptions, payment details and history. For more info see Accounting and Billing.|
|   Organization||This option enables you to manage organization-level settings and policies. For more information see Managing Your Organization.|
|   Activity Log||This option displays an audit log that shows vulnerability findings as well as user and system actions. The activity log provides multiple links that direct to the scan information across the Bright web application. Each user can only view log items within the scope of their permissions.|
Updated about 1 month ago