[{"data":1,"prerenderedAt":964},["ShallowReactive",2],{"contentNavigation":3,"docs-\u002Fdocs\u002Forganization-settings\u002Freport-configuration":635,"\u002Fdocs\u002Forganization-settings\u002Freport-configuration-surround":942,"mdc-rhyep0-key":945},[4,38,196,366,475,501,524,541],{"title":5,"path":6,"stem":7,"meta":8},"Welcome","\u002Fdocs","docs\u002Findex",{"icon":9,"layout":10,"cards":18},"hands-clapping",{"title":11,"description":13,"tableOfContents":15,"outline":16,"pagination":17},{"visible":12},true,{"visible":14},false,{"visible":12},{"visible":12},{"visible":12},[19,23,27,31,35],{"title":20,"description":21,"path":22},"Getting Started","Quick Start Guide","\u002Fdocs\u002Fgetting-started\u002Fquick-scan-guide",{"title":24,"description":25,"path":26},"Manage Targets","Target Configuration","\u002Fdocs\u002Fmanage-targets\u002Ftarget-configuration",{"title":28,"description":29,"path":30},"Manage Scans","View Scan Findings","\u002Fdocs\u002Fmanage-scans\u002Fscan-report",{"title":32,"description":33,"path":34},"Manage Organizations","Understanding User Roles","\u002Fdocs\u002Fmanage-organizations\u002Funderstanding-user-roles",{"title":20,"description":36,"path":37},"Concepts","\u002Fdocs\u002Fgetting-started\u002Fconcepts",{"title":20,"meta":39,"path":40,"stem":41,"children":42,"page":14},{},"\u002Fdocs\u002Fgetting-started","docs\u002F1.getting-started",[43,49,54,80,87,122,167,171,177,183,190],{"title":44,"path":45,"stem":46,"meta":47},"Welcome to ZeroThreat","\u002Fdocs\u002Fgetting-started\u002Fquickstart","docs\u002F1.getting-started\u002F01.quickstart",{"icon":48},"bullseye",{"title":50,"path":22,"stem":51,"meta":52},"Quick Scan Guide","docs\u002F1.getting-started\u002F02.quick-scan-guide",{"icon":53},"globe",{"title":55,"path":56,"stem":57,"children":58,"page":-1,"meta":60},"Authenticated Scan","\u002Fdocs\u002Fgetting-started\u002Fauthenticated-scan","docs\u002F1.getting-started\u002F03.authenticated-scan\u002Findex",[59,62,68,74],{"title":55,"path":56,"stem":57,"meta":60},{"icon":61},"shield-virus",{"title":63,"path":64,"stem":65,"meta":66},"Scan with Login Sequence","\u002Fdocs\u002Fgetting-started\u002Fauthenticated-scan\u002Fscan-with-login-sequence","docs\u002F1.getting-started\u002F03.authenticated-scan\u002F2.scan-with-login-sequence",{"icon":67},"expand",{"title":69,"path":70,"stem":71,"meta":72},"Scan MFA App","\u002Fdocs\u002Fgetting-started\u002Fauthenticated-scan\u002Fscan-mfa-app","docs\u002F1.getting-started\u002F03.authenticated-scan\u002F3.scan-mfa-app",{"imageSrc":73},"\u002FImages\u002Fscan-mfa-app-icon.svg",{"title":75,"path":76,"stem":77,"meta":78},"Scan Recorded Pages & Actions","\u002Fdocs\u002Fgetting-started\u002Fauthenticated-scan\u002Fscan-recorded-pages-and-actions","docs\u002F1.getting-started\u002F03.authenticated-scan\u002F4.scan-recorded-pages-and-actions",{"imageSrc":79},"\u002FImages\u002Fscan-navigation-sequence-icon.svg",{"title":81,"path":82,"stem":83,"meta":84},"Scan Profile","\u002Fdocs\u002Fgetting-started\u002Fscan-profile","docs\u002F1.getting-started\u002F04.scan-profile",{"icon":85,"imageSrc":86},null,"\u002FImages\u002Fscan-profile-icon.svg",{"title":88,"path":89,"stem":90,"children":91,"page":-1,"meta":93},"API Scan","\u002Fdocs\u002Fgetting-started\u002Fapi-scan","docs\u002F1.getting-started\u002F05.api-scan\u002Findex",[92,111,114,118],{"title":88,"path":89,"stem":90,"meta":93},{"imageSrc":94,"cards":95},"\u002FImages\u002Fapi-scan-icon.svg",[96,101,106],{"icon":97,"title":98,"path":99,"description":100},"file-circle-plus","Creating a Collection","\u002Fdocs\u002Fgetting-started\u002Fapi-scan\u002Fcreating-a-collection","Learn how to import and configure your API definitions in ZeroThreat.",{"icon":102,"title":103,"path":104,"description":105},"radar","Unauthenticated API Scan","\u002Fdocs\u002Fgetting-started\u002Fapi-scan\u002Funauthenticated-api-scan","Run scans on public-facing API endpoints without authentication.",{"icon":107,"title":108,"path":109,"description":110},"file-magnifying-glass","Authenticated API Scan","\u002Fdocs\u002Fgetting-started\u002Fapi-scan\u002Fauthenticated-api-scan","Configure and scan protected endpoints that require authentication.",{"title":98,"path":99,"stem":112,"meta":113},"docs\u002F1.getting-started\u002F05.api-scan\u002F2.creating-a-collection",{"icon":97},{"title":103,"path":104,"stem":115,"meta":116},"docs\u002F1.getting-started\u002F05.api-scan\u002F3.unauthenticated-api-scan",{"imageSrc":117},"\u002FImages\u002Funauthenticated-api-scan-icon.svg",{"title":108,"path":109,"stem":119,"meta":120},"docs\u002F1.getting-started\u002F05.api-scan\u002F4.authenticated-api-scan",{"imageSrc":121},"\u002FImages\u002Fauthenticated-api-scan-icon.svg",{"title":123,"path":124,"stem":125,"meta":126},"Scan Results","\u002Fdocs\u002Fgetting-started\u002Fscan-results","docs\u002F1.getting-started\u002F06.scan-results",{"icon":127,"cards":128},"square-poll-horizontal",[129,133,137,142,147,152,157,162],{"icon":127,"title":130,"path":131,"description":132},"Scanner","\u002Fdocs\u002Fmanage-scans\u002Fscan-report\u002Fscanner","Displays real-time scan progress, including authenticated and unauthenticated crawling, along with OWASP Top 10 checks.",{"icon":53,"title":134,"path":135,"description":136},"Web App Vulnerabilities","\u002Fdocs\u002Fmanage-scans\u002Fscan-report\u002Fweb-app-vulnerabilities","Lists detected security issues in web applications, categorized by severity, with detailed remediation steps.",{"icon":138,"title":139,"path":140,"description":141},"file-circle-check","Detected API Vulnerabilities","\u002Fdocs\u002Fmanage-scans\u002Fscan-report\u002Fdetected-apis-vulnerabilities","Identifies all the security flaws found in a particular API endpoint, showing affected requests and responses.",{"icon":143,"title":144,"path":145,"description":146},"circle-info","Information Exposure","\u002Fdocs\u002Fmanage-scans\u002Fscan-report\u002Finformation-exposure","Highlights sensitive data leaks like PII, secret data leaks like credentials, and cloud misconfigurations.",{"icon":148,"title":149,"path":150,"description":151},"certificate","SSL Certificate Scan","\u002Fdocs\u002Fmanage-scans\u002Fscan-report\u002Fssl-certificate","Analyzes SSL\u002FTLS configurations, checking for vulnerabilities, expiration status, and compliance issues.",{"icon":153,"title":154,"path":155,"description":156},"cube","Vulnerable Version Detection","\u002Fdocs\u002Fmanage-scans\u002Fscan-report\u002Fvulnerable-version-detection","Detects outdated JavaScript libraries and server-side technologies with known security risks.",{"icon":158,"title":159,"path":160,"description":161},"database","Server Ports Scan","\u002Fdocs\u002Fmanage-scans\u002Fscan-report\u002Fserver-ports-scan","Scans open ports on the server, assessing potential risks and providing mitigation strategies.",{"icon":163,"title":164,"path":165,"description":166},"envelope","Mail Configuration","\u002Fdocs\u002Fmanage-scans\u002Fscan-report\u002Fmail-configuration","Evaluates the mail server for misconfigurations like open relays and reverse DNS mismatches.",{"title":36,"path":37,"stem":168,"meta":169},"docs\u002F1.getting-started\u002F07.concepts",{"hidden":12,"noRobotsIndex":12,"icon":170},"lightbulb",{"title":172,"path":173,"stem":174,"meta":175},"TroubleShoot","\u002Fdocs\u002Fgetting-started\u002Ftroubleshoot","docs\u002F1.getting-started\u002F08.troubleshoot",{"icon":176},"puzzle-piece",{"title":178,"path":179,"stem":180,"meta":181},"FAQs","\u002Fdocs\u002Fgetting-started\u002Ffaqs","docs\u002F1.getting-started\u002F09.faqs",{"icon":182},"question-circle",{"title":184,"path":185,"stem":186,"meta":187},"Vulnerability Registry","\u002Fdocs\u002Fgetting-started\u002Fvulnerability-registry","docs\u002F1.getting-started\u002F10.vulnerability-registry",{"icon":188,"layout":189},"bug","default",{"title":191,"path":192,"stem":193,"meta":194},"Best Practices","\u002Fdocs\u002Fgetting-started\u002Fbest-practices","docs\u002F1.getting-started\u002F11.best-practices",{"icon":195},"clipboard",{"title":24,"meta":197,"path":198,"stem":199,"children":200,"page":14},{},"\u002Fdocs\u002Fmanage-targets","docs\u002F2.manage-targets",[201,207,213,219,223,228,288,335,360],{"title":202,"path":203,"stem":204,"meta":205},"Targets","\u002Fdocs\u002Fmanage-targets\u002Ftargets-section","docs\u002F2.manage-targets\u002F01.targets-section",{"icon":206},"crosshairs",{"title":208,"path":209,"stem":210,"meta":211},"Add a Target","\u002Fdocs\u002Fmanage-targets\u002Fadd-a-target","docs\u002F2.manage-targets\u002F2.add-a-target",{"icon":212},"plus",{"title":214,"path":215,"stem":216,"meta":217},"Target Verification","\u002Fdocs\u002Fmanage-targets\u002Ftarget-verification","docs\u002F2.manage-targets\u002F3.target-verification",{"icon":218},"check",{"title":25,"path":26,"stem":220,"meta":221},"docs\u002F2.manage-targets\u002F4.target-configuration",{"icon":222},"gear",{"title":224,"path":225,"stem":226,"meta":227},"Add Custom Headers","\u002Fdocs\u002Fmanage-targets\u002Fadd-custom-headers","docs\u002F2.manage-targets\u002F5.add-custom-headers",{"icon":97},{"title":229,"path":230,"stem":231,"children":232,"page":-1,"meta":234},"CI\u002FCD Integration","\u002Fdocs\u002Fmanage-targets\u002Fci-cd-integration","docs\u002F2.manage-targets\u002F6.ci-cd-integration\u002Findex",[233,266,270,274,279,284],{"title":229,"path":230,"stem":231,"meta":234},{"icon":235,"cards":236},"repeat",[237,241,245,249,253,257,260,262,264],{"title":238,"path":239,"description":240},"GitHub Actions","\u002Fdocs\u002Fmanage-targets\u002Fci-cd-integration\u002Fgithub-actions","Integrate ZeroThreat scans using GitHub workflows, with support for triggers, and authenticated testing.",{"title":242,"path":243,"description":244},"Azure Pipelines","\u002Fdocs\u002Fmanage-targets\u002Fci-cd-integration\u002Fazure-pipelines","Integrate ZeroThreat Scans in Azure DevOps with customizable YAML pipelines that suite your workflow.",{"title":246,"path":247,"description":248},"CircleCI","\u002Fdocs\u002Fmanage-targets\u002Fci-cd-integration\u002Fcircle-ci","Integrate ZeroThreat scans using CircleCI to trigger automated scans in your CI\u002FCD pieplines that suite your needs.",{"title":250,"path":251,"description":252},"GitLab CI\u002FCD","\u002Fdocs\u002Fmanage-targets\u002Fci-cd-integration\u002Fgitlab","Integrate ZeroThreat Scans in into GitLab CI\u002FCD pipelines that suite your workflow.",{"title":254,"path":255,"description":256},"AWS CI\u002FCD","\u002Fdocs\u002Fmanage-targets\u002Fci-cd-integration\u002Faws-ci-cd","Integrate ZeroThreat Scans in into AWS CI\u002FCD pipelines that suite your workflow.",{"title":258,"description":259},"Jenkins","Coming Soon",{"title":261,"description":259},"TeamCity",{"title":263,"description":259},"Bamboo",{"title":265,"description":259},"Travis CI",{"title":238,"path":239,"stem":267,"meta":268},"docs\u002F2.manage-targets\u002F6.ci-cd-integration\u002F1.github-actions",{"icon":269},"fa-brands fa-github",{"title":242,"path":243,"stem":271,"meta":272},"docs\u002F2.manage-targets\u002F6.ci-cd-integration\u002F2.azure-pipelines",{"imageSrc":273},"\u002FImages\u002Fazure-pipeline.svg",{"title":275,"path":247,"stem":276,"meta":277},"Circle Ci","docs\u002F2.manage-targets\u002F6.ci-cd-integration\u002F3.circle-ci",{"imageSrc":278},"\u002FImages\u002Fcircle-ci.svg",{"title":280,"path":251,"stem":281,"meta":282},"Gitlab","docs\u002F2.manage-targets\u002F6.ci-cd-integration\u002F4.gitlab",{"icon":283},"fa-brands fa-gitlab",{"title":254,"path":255,"stem":285,"meta":286},"docs\u002F2.manage-targets\u002F6.ci-cd-integration\u002F5.aws-ci-cd",{"icon":287},"fa-brands fa-aws",{"title":289,"path":290,"stem":291,"children":292,"page":-1,"meta":294},"Issue Tracking Integration","\u002Fdocs\u002Fmanage-targets\u002Fissue-tracking","docs\u002F2.manage-targets\u002F7.issue-tracking\u002Findex",[293,317,321,325,328,331],{"title":289,"path":290,"stem":291,"meta":294},{"icon":295,"cards":296},"id-card",[297,301,305,309,313],{"title":298,"path":299,"description":300},"Jira","\u002Fdocs\u002Fmanage-targets\u002Fissue-tracking\u002Fjira","Create Jira tickets from scan findings and assign them to specific boards, projects, and sprints with full vulnerability details.",{"title":302,"description":303,"path":304},"Azure Boards","Create Azure Boards work items from scan findings and assign them to specific projects, and boards with complete vulnerabiltiy details.","\u002Fdocs\u002Fmanage-targets\u002Fissue-tracking\u002Fazure-board",{"title":306,"description":307,"path":308},"GitHub Issues","Create GitHub issues from scan findings and assign them to specific repositories and Projects with full vulnerability details.","\u002Fdocs\u002Fmanage-targets\u002Fissue-tracking\u002Fgithub-issues",{"title":310,"description":311,"path":312},"GitLab Issues","Create GitLab issues from scan findings and assign them to specific projects and boards with full vulnerability details.","\u002Fdocs\u002Fmanage-targets\u002Fissue-tracking\u002Fgitlab-issues",{"title":314,"description":315,"path":316},"Trello","Create Trello cards from scan findings and assign them to specific boards and lists with full vulnerability details.","\u002Fdocs\u002Fmanage-targets\u002Fissue-tracking\u002Ftrello",{"title":298,"path":299,"stem":318,"meta":319},"docs\u002F2.manage-targets\u002F7.issue-tracking\u002F1.jira",{"icon":320},"fa-brands fa-atlassian",{"title":302,"path":304,"stem":322,"meta":323},"docs\u002F2.manage-targets\u002F7.issue-tracking\u002F2.azure-board",{"imageSrc":324},"\u002FImages\u002FAzure_Boards.svg",{"title":306,"path":308,"stem":326,"meta":327},"docs\u002F2.manage-targets\u002F7.issue-tracking\u002F3.github-issues",{"icon":269},{"title":310,"path":312,"stem":329,"meta":330},"docs\u002F2.manage-targets\u002F7.issue-tracking\u002F4.gitlab-issues",{"icon":283},{"title":314,"path":316,"stem":332,"meta":333},"docs\u002F2.manage-targets\u002F7.issue-tracking\u002F5.trello",{"icon":334},"fa-brands fa-trello",{"title":336,"path":337,"stem":338,"children":339,"page":-1,"meta":341},"Notification Integration","\u002Fdocs\u002Fmanage-targets\u002Fnotification-integration","docs\u002F2.manage-targets\u002F8.notification-integration\u002Findex",[340,352,356],{"title":336,"path":337,"stem":338,"meta":341},{"icon":342,"cards":343},"bell",[344,348],{"title":345,"path":346,"description":347},"Slack","\u002Fdocs\u002Fmanage-targets\u002Fnotification-integration\u002Fslack","Receive scan alerts in any Slack channel of your choice using incoming webhooks.",{"title":349,"description":350,"path":351},"Microsoft Teams","Use Teams workflows to post scan notifications into designated channels.","\u002Fdocs\u002Fmanage-targets\u002Fnotification-integration\u002Fmicrosoft-teams",{"title":345,"path":346,"stem":353,"meta":354},"docs\u002F2.manage-targets\u002F8.notification-integration\u002F1.slack",{"icon":355},"fa-brands fa-slack",{"title":349,"path":351,"stem":357,"meta":358},"docs\u002F2.manage-targets\u002F8.notification-integration\u002F2.microsoft-teams",{"imageSrc":359},"\u002FImages\u002FMicrosoft_Teams.svg",{"title":361,"path":362,"stem":363,"meta":364},"Playwright Specs","\u002Fdocs\u002Fmanage-targets\u002Fplaywright-specs","docs\u002F2.manage-targets\u002F9.playwright-specs",{"imageSrc":365},"\u002FImages\u002Fplaywright-specs.svg",{"title":28,"meta":367,"path":368,"stem":369,"children":370,"page":14},{},"\u002Fdocs\u002Fmanage-scans","docs\u002F3.manage-scans",[371,377,445,451,457,463,469],{"title":372,"path":373,"stem":374,"meta":375},"Scans","\u002Fdocs\u002Fmanage-scans\u002Fscans-section","docs\u002F3.manage-scans\u002F1.scans-section",{"icon":376},"magnifying-glass-chart",{"title":378,"path":30,"stem":379,"children":380,"page":-1,"meta":382},"Scan Report","docs\u002F3.manage-scans\u002F2.scan-report\u002Findex",[381,403,406,410,414,418,422,426,431,435,439],{"title":378,"path":30,"stem":379,"meta":382},{"icon":383,"cards":384},"file-lines",[385,387,391,393,396,397,399,400,401],{"icon":127,"title":130,"path":131,"description":386},"Displays real-time scan progress, including crawling and OWASP Top 10 vulnerabilities.",{"icon":383,"title":388,"path":389,"description":390},"Scan Summary","\u002Fdocs\u002Fmanage-scans\u002Fscan-report\u002Fscan-summary","Provides a high-level overview of the security posture of the entire scanned application",{"icon":53,"title":134,"path":135,"description":392},"Lists detected security issues in web applications, categorized by severity, with detailed remediation steps",{"icon":138,"title":394,"path":140,"description":395},"Detected API vulnerabilities","Identifies all the security flaws found in a particular API endpoint, showing affected requests",{"icon":143,"title":144,"path":145,"description":146},{"icon":148,"title":398,"path":150,"description":151},"SSL Certificate",{"icon":153,"title":154,"path":155,"description":156},{"icon":158,"title":159,"path":160,"description":161},{"icon":163,"title":164,"path":165,"description":402},"Evaluates the mail server for misconfigurations like open relays and reverse DNS mismatches",{"title":130,"path":131,"stem":404,"meta":405},"docs\u002F3.manage-scans\u002F2.scan-report\u002F01.scanner",{"icon":67},{"title":388,"path":389,"stem":407,"meta":408},"docs\u002F3.manage-scans\u002F2.scan-report\u002F02.scan-summary",{"icon":409},"list-check",{"title":134,"path":135,"stem":411,"meta":412},"docs\u002F3.manage-scans\u002F2.scan-report\u002F03.web-app-vulnerabilities",{"imageSrc":413},"\u002FImages\u002Fgravity-ui--diamond-exclamation.svg",{"title":394,"path":140,"stem":415,"meta":416},"docs\u002F3.manage-scans\u002F2.scan-report\u002F04.detected-apis-vulnerabilities",{"imageSrc":417},"\u002FImages\u002Fuil--exclamation-octagon.svg",{"title":144,"path":145,"stem":419,"meta":420},"docs\u002F3.manage-scans\u002F2.scan-report\u002F05.information-exposure",{"imageSrc":421},"\u002FImages\u002Fstreamline--arrow-expand.svg",{"title":398,"path":150,"stem":423,"meta":424},"docs\u002F3.manage-scans\u002F2.scan-report\u002F06.ssl-certificate",{"imageSrc":425},"\u002FImages\u002Fla--certificate.svg",{"title":427,"path":155,"stem":428,"meta":429},"Vulnerable Version detection","docs\u002F3.manage-scans\u002F2.scan-report\u002F07.vulnerable-version-detection",{"imageSrc":430},"\u002FImages\u002Ff7--exclamationmark-square.svg",{"title":159,"path":160,"stem":432,"meta":433},"docs\u002F3.manage-scans\u002F2.scan-report\u002F08.server-ports-scan",{"imageSrc":434},"\u002FImages\u002Ftdesign--server.svg",{"title":164,"path":165,"stem":436,"meta":437},"docs\u002F3.manage-scans\u002F2.scan-report\u002F09.mail-configuration",{"imageSrc":438},"\u002FImages\u002Ftabler--mail.svg",{"title":440,"path":441,"stem":442,"meta":443},"Compliance","\u002Fdocs\u002Fmanage-scans\u002Fscan-report\u002Fcompliance","docs\u002F3.manage-scans\u002F2.scan-report\u002F10. Compliance",{"imageSrc":444},"\u002FImages\u002Fgg--list.svg",{"title":446,"path":447,"stem":448,"meta":449},"Download Scan Report","\u002Fdocs\u002Fmanage-scans\u002Fdownload-report","docs\u002F3.manage-scans\u002F3.download-report",{"icon":450},"download",{"title":452,"path":453,"stem":454,"meta":455},"Share Scan Results","\u002Fdocs\u002Fmanage-scans\u002Fshare-scan-results","docs\u002F3.manage-scans\u002F4.share-scan-results",{"icon":456},"up-right-from-square",{"title":458,"path":459,"stem":460,"meta":461},"Retest Vulnerability","\u002Fdocs\u002Fmanage-scans\u002Fretest-vulnerability","docs\u002F3.manage-scans\u002F5.retest-vulnerability",{"icon":462},"rotate-right",{"title":464,"path":465,"stem":466,"meta":467},"Schedule Scan","\u002Fdocs\u002Fmanage-scans\u002Fschedule-scan","docs\u002F3.manage-scans\u002F6.schedule-scan",{"icon":468},"calendar-days",{"title":470,"path":471,"stem":472,"meta":473},"API Discovery from Code","\u002Fdocs\u002Fmanage-scans\u002Fapi-discovery-from-code","docs\u002F3.manage-scans\u002F7.api-discovery-from-code",{"icon":474},"fa-file-code",{"title":32,"meta":476,"path":477,"stem":478,"children":479,"page":14},{},"\u002Fdocs\u002Fmanage-organizations","docs\u002F4.manage-organizations",[480,492,496],{"title":481,"path":482,"stem":483,"meta":484},"Manage Organization","\u002Fdocs\u002Fmanage-organizations\u002Fmanage-organization","docs\u002F4.manage-organizations\u002F1.manage-organization",{"icon":485,"cards":486},"building",[487,489],{"title":32,"description":488,"path":34},"Understanding Roles",{"title":481,"description":490,"path":491},"How to add new User","\u002Fdocs\u002Fmanage-organizations\u002Fadd-user",{"title":33,"path":34,"stem":493,"meta":494},"docs\u002F4.manage-organizations\u002F2.understanding-user-roles",{"icon":495},"user-check",{"title":497,"path":491,"stem":498,"meta":499},"Add User","docs\u002F4.manage-organizations\u002F3.add-user",{"icon":500},"user-plus",{"title":502,"meta":503,"path":504,"stem":505,"children":506,"page":14},"Organization Settings",{},"\u002Fdocs\u002Forganization-settings","docs\u002F5.organization-settings",[507,513,518],{"title":508,"path":509,"stem":510,"meta":511},"Report Branding","\u002Fdocs\u002Forganization-settings\u002Freport-configuration","docs\u002F5.organization-settings\u002F01.report-configuration",{"imageSrc":512},"\u002FImages\u002Freport-configuration.svg",{"title":184,"path":514,"stem":515,"meta":516},"\u002Fdocs\u002Forganization-settings\u002Fvulnerability-registry-configuration","docs\u002F5.organization-settings\u002F02.vulnerability-registry-configuration",{"imageSrc":517},"\u002FImages\u002Fvulnerability-registry-config.svg",{"title":519,"path":520,"stem":521,"meta":522},"Attack Templates","\u002Fdocs\u002Forganization-settings\u002Fattack-templates","docs\u002F5.organization-settings\u002F03.attack-templates",{"imageSrc":523},"\u002FImages\u002Fattack-templates.svg",{"title":525,"path":526,"stem":527,"children":528,"page":14},"Plans","\u002Fdocs\u002Fplans","docs\u002F6.plans",[529,535],{"title":530,"path":531,"stem":532,"meta":533},"ZeroThreat Plans","\u002Fdocs\u002Fplans\u002Fzerothreat-plans","docs\u002F6.plans\u002F01.zerothreat-plans",{"imageSrc":534},"\u002FImages\u002Fzerothreat-plans.svg",{"title":536,"path":537,"stem":538,"meta":539},"Target Association","\u002Fdocs\u002Fplans\u002Ftarget-association","docs\u002F6.plans\u002F02.target-association",{"icon":540},"link",{"title":542,"path":543,"stem":544,"children":545,"page":14},"On Prem","\u002Fdocs\u002Fon-prem","docs\u002F7.on-prem",[546,552,566,572,598],{"title":547,"path":548,"stem":549,"meta":550},"On-Prem","\u002Fdocs\u002Fon-prem\u002Fon-prem","docs\u002F7.on-prem\u002F01.on-prem",{"imageSrc":551},"\u002FImages\u002Fon-prem.svg",{"title":553,"path":554,"stem":555,"children":556,"page":-1,"meta":558},"Installation","\u002Fdocs\u002Fon-prem\u002Finstallation","docs\u002F7.on-prem\u002F02.installation\u002Findex",[557,560],{"title":553,"path":554,"stem":555,"meta":558},{"imageSrc":559},"\u002FImages\u002Finstallation.svg",{"title":561,"path":562,"stem":563,"meta":564},"DNS Binding and Setup","\u002Fdocs\u002Fon-prem\u002Finstallation\u002Fdns-binding-and-setup","docs\u002F7.on-prem\u002F02.installation\u002F01.DNS-binding-and-setup",{"imageSrc":565},"\u002FImages\u002Fdns-binding.svg",{"title":567,"path":568,"stem":569,"meta":570},"License Management","\u002Fdocs\u002Fon-prem\u002Flicense-management","docs\u002F7.on-prem\u002F03.license-management",{"imageSrc":571},"\u002FImages\u002Flicense-management.svg",{"title":573,"path":574,"stem":575,"children":576,"page":-1,"meta":578},"Configuration","\u002Fdocs\u002Fon-prem\u002Fconfiguration","docs\u002F7.on-prem\u002F4.configuration\u002Findex",[577,589,594],{"title":573,"path":574,"stem":575,"meta":578},{"imageSrc":579,"cards":580},"\u002FImages\u002Fconfiguration.svg",[581,585],{"title":582,"path":583,"description":584},"AI Features Configuration","\u002Fdocs\u002Fon-prem\u002Fconfiguration\u002Fai-configuration","ZeroThreat uses AI-driven capabilities across multiple areas of the platform to improve clarity, reduce manual effort, and accelerate security analysis.",{"title":586,"path":587,"description":588},"Mail Server Configuration","\u002Fdocs\u002Fon-prem\u002Fconfiguration\u002Fmail-server-configuration","Mail server configuration allows ZeroThreat to send operational and system-related notifications from your On-Prem deployment.",{"title":590,"path":583,"stem":591,"meta":592},"Gen AI Configuration","docs\u002F7.on-prem\u002F4.configuration\u002F01.AI-configuration",{"imageSrc":593},"\u002FImages\u002Fai-config.svg",{"title":586,"path":587,"stem":595,"meta":596},"docs\u002F7.on-prem\u002F4.configuration\u002F02.mail-server-configuration",{"imageSrc":597},"\u002FImages\u002Fmail-server-config.svg",{"title":289,"path":599,"stem":600,"children":601,"page":-1,"meta":603},"\u002Fdocs\u002Fon-prem\u002Fissue-tracking-integration","docs\u002F7.on-prem\u002F5.issue-tracking-integration\u002Findex",[602,622,626,629,632],{"title":289,"path":599,"stem":600,"meta":603},{"icon":604,"cards":605},"file-circle-exclamation",[606,610,614,618],{"title":607,"path":608,"description":609},"Jira (On-Prem)","\u002Fdocs\u002Fon-prem\u002Fissue-tracking-integration\u002Fjira-on-prem","Create Jira tickets from scan findings and assign them to specific projects and boards with full vulnerability details.",{"title":611,"path":612,"description":613},"GitHub Issues (On-Prem)","\u002Fdocs\u002Fon-prem\u002Fissue-tracking-integration\u002Fgithub-issues-on-prem","Create GitHub issues from scan findings and assign them to repositories and Projects with detailed vulnerability evidence.",{"title":615,"path":616,"description":617},"GitLab Issues (On-Prem)","\u002Fdocs\u002Fon-prem\u002Fissue-tracking-integration\u002Fgitlab-issues-on-prem","Create GitLab issues from scan findings and assign them to specific projects with structured remediation details.",{"title":619,"path":620,"description":621},"Trello (On-Prem)","\u002Fdocs\u002Fon-prem\u002Fissue-tracking-integration\u002Ftrello-on-prem","Create Trello cards from scan findings and organize them into boards and lists with full vulnerability context.",{"title":607,"path":608,"stem":623,"meta":624},"docs\u002F7.on-prem\u002F5.issue-tracking-integration\u002F01.jira-on-prem",{"icon":625},"fa-brands fa-jira",{"title":611,"path":612,"stem":627,"meta":628},"docs\u002F7.on-prem\u002F5.issue-tracking-integration\u002F02.github-issues-on-prem",{"icon":269},{"title":615,"path":616,"stem":630,"meta":631},"docs\u002F7.on-prem\u002F5.issue-tracking-integration\u002F03.gitlab-issues-on-prem",{"icon":283},{"title":619,"path":620,"stem":633,"meta":634},"docs\u002F7.on-prem\u002F5.issue-tracking-integration\u002F04.trello-on-prem",{"icon":334},{"id":636,"title":508,"body":637,"description":937,"extension":938,"meta":939,"navigation":12,"path":509,"seo":940,"stem":510,"__hash__":941},"content\u002Fdocs\u002F5.organization-settings\u002F01.report-configuration.md",{"type":638,"value":639,"toc":931},"minimark",[640,644,673,676,739,744,747,821,834,838,917,920,924],[641,642,643],"p",{},"Using Report Branding, you can customize how scan reports look and read by adding your company name, branding assets, and a tailored company introduction or Scan Summary. This is especially useful for:",[645,646,647,655,661,667],"ul",{},[648,649,650,654],"li",{},[651,652,653],"strong",{},"Enterprises"," that require consistent branding across all security documentation",[648,656,657,660],{},[651,658,659],{},"MSSPs and security consultants"," delivering reports to multiple clients",[648,662,663,666],{},[651,664,665],{},"Internal security teams"," sharing scan results with leadership, auditors, or compliance teams",[648,668,669,672],{},[651,670,671],{},"Customer-facing security programs"," where professionalism and presentation matter",[641,674,675],{},"Once configured, the branding and summary are automatically applied to all generated scan reports for the organization.",[677,678,681,688,693,696,707,716,725,728],"hint",{"icon":143,"icon-class":679,"style":680},"text-sky-600","background-color:#f7fcff; border:1px solid #07405a33; color:#1e6995;",[682,683,685],"h5",{"id":684},"important",[651,686,687],{},"Important",[689,690,692],"h6",{"id":691},"report-configuration-is-an-enterprise-only-feature-and-is-available-exclusively-in-the-following-plans","Report Configuration is an enterprise-only feature and is available exclusively in the following plans:",[689,694],{"id":695},"",[689,697,699],{"id":698},"enterprise-pay-per-scan",[700,701,703,704],"div",{"style":702},"margin-top: 10px; margin-bottom: 5px;","• ",[651,705,706],{},"Enterprise Pay-Per-Scan",[689,708,710],{"id":709},"enterprise-cloud",[700,711,703,713],{"style":712},"margin-bottom: 5px;",[651,714,715],{},"Enterprise Cloud",[689,717,719],{"id":718},"enterprise-on-prem",[700,720,703,722],{"style":721},"margin-bottom: 10px;",[651,723,724],{},"Enterprise On-Prem",[689,726],{"id":727},"_1",[689,729,731,732,738],{"id":730},"if-your-current-plan-does-not-include-this-feature-the-configuration-option-will-not-be-accessible-refer-to-the-zerothreat-plans-page-for-more-details","If your current plan does not include this feature, the configuration option will not be accessible. Refer to the ",[733,734,736],"a",{"href":531,"title":735},"mention",[651,737,530],{}," page for more details.",[740,741,743],"h2",{"id":742},"what-you-can-configure","What You Can Configure",[641,745,746],{},"ZeroThreat allows you to define the following report-level settings:",[645,748,749,758,777,792],{},[648,750,751,754,757],{},[651,752,753],{},"Company Name",[755,756],"br",{},"\nDisplayed as the primary organization identifier within the scan report.",[648,759,760,763,765,766,768,771,772,776],{},[651,761,762],{},"Cover Page Logo",[755,764],{},"\nA PNG image used on the report cover page.",[755,767],{},[651,769,770],{},"Required size:"," ",[773,774,775],"code",{},"160 × 80"," pixels",[648,778,779,782,784,785,787,771,789,776],{},[651,780,781],{},"Header Logo",[755,783],{},"\nA PNG image displayed in the header on every page of the report.",[755,786],{},[651,788,770],{},[773,790,791],{},"80 × 40",[648,793,794,797,799,800,802,803],{},[651,795,796],{},"Company Description",[755,798],{},"\nA customizable organization introduction displayed prominently in the report.",[755,801],{},"\nThis section:\n",[645,804,805,811,818],{},[648,806,807,808],{},"Must be at least ",[651,809,810],{},"250 characters",[648,812,813,814,817],{},"Supports ",[651,815,816],{},"Markdown formatting",", allowing you to structure content using headings, lists, emphasis, and links",[648,819,820],{},"Is ideal for explaining scope, methodology, or client-specific context",[677,822,826],{"icon":823,"icon-class":824,"style":825},"circle-check","text-[#0a8363]","bg-#f5fdf9; border: 1px solid #10b98133; color:#0a8363;",[689,827,829,830,833],{"id":828},"for-best-visual-results-in-the-generated-pdf-it-is-strongly-recommended-to-use-high-quality-png-images-with-transparent-backgrounds-this-ensures-consistent-appearance-across-light-and-dark-sections-of-the-report-and-avoids-visual-artifacts","For best visual results in the generated PDF, it is strongly recommended to use ",[651,831,832],{},"high-quality PNG images with transparent backgrounds",". This ensures consistent appearance across light and dark sections of the report and avoids visual artifacts.",[740,835,837],{"id":836},"configuration-steps","Configuration Steps",[839,840,841,847,850,856,862,890,914],"ol",{},[648,842,843,844,846],{},"Navigate to ",[651,845,502],{}," in your ZeroThreat portal",[648,848,849],{},"Select the organization for which you want to configure report branding",[648,851,852,853,855],{},"Open the ",[651,854,508],{}," section",[648,857,858,859],{},"Enter the ",[651,860,861],{},"Organization \u002F Company Name",[648,863,864,865,880],{},"Upload:",[645,866,867,874],{},[648,868,869,870,873],{},"A ",[651,871,872],{},"cover page logo"," (PNG, 160×80 pixels)",[648,875,869,876,879],{},[651,877,878],{},"header logo"," (PNG, 80×40 pixels)",[881,882,883,887],"figure",{},[884,885],"img",{"src":886,"alt":695},"\u002FImages\u002Fimage (488).png",[888,889],"figcaption",{},[648,891,892,893,896,906],{},"Add a ",[651,894,895],{},"Company Description:",[645,897,898,903],{},[648,899,900,901],{},"Minimum length: ",[651,902,810],{},[648,904,905],{},"Markdown formatting is supported for better structure and readability",[881,907,908,912],{},[884,909],{"src":910,"alt":695,"width":911},"\u002FImages\u002Fimage (487).png",563,[888,913],{},[648,915,916],{},"Save the configuration",[641,918,919],{},"Once saved, all newly generated scan reports for the organization will include the configured branding and Company Description.",[740,921,923],{"id":922},"summary","Summary",[641,925,926,927,930],{},"Report Branding helps ensure that your security reports are not just technically accurate, but also ",[651,928,929],{},"professionally presented and aligned with your organization’s identity",". This becomes especially valuable when reports are shared beyond technical teams — such as with executives, customers, auditors, or compliance reviewers.",{"title":695,"searchDepth":932,"depth":932,"links":933},2,[934,935,936],{"id":742,"depth":932,"text":743},{"id":836,"depth":932,"text":837},{"id":922,"depth":932,"text":923},"Report Branding allows you to **white-label ZeroThreat scan reports** with your organization’s branding and messaging. This feature is designed for enterprises, large security teams, and MSSPs who need their scan reports to reflect their own identity when sharing results internally or with external stakeholders.","md",{"imageSrc":512},{"title":508,"description":937},"lIiNM3k7PY1K4qNVyDBfOFx9ugLvgzkvEMDzdaeZOUI",[943,944],{"title":497,"path":491,"stem":498,"children":-1},{"title":184,"path":514,"stem":515,"children":-1},{"data":946,"body":947},{},{"type":948,"children":949},"root",[950],{"type":951,"tag":641,"props":952,"children":953},"element",{},[954,957,962],{"type":955,"value":956},"text","Report Branding allows you to ",{"type":951,"tag":651,"props":958,"children":959},{},[960],{"type":955,"value":961},"white-label ZeroThreat scan reports",{"type":955,"value":963}," with your organization’s branding and messaging. This feature is designed for enterprises, large security teams, and MSSPs who need their scan reports to reflect their own identity when sharing results internally or with external stakeholders.",1779455391075]