ScanSuite
  • Introduction
  • Architecture
  • Installation
    • Technical Requirements
    • Install ScanSuite server
    • Set up DefectDojo
    • Troubleshooting
    • SSL/TLS Setup
  • Administration
    • Setup parameters and services
    • Configuring API keys for external systems
    • User administration
    • Security logs
  • Usage
    • Products
    • Performing a static code analysis
      • Git repository authentication
      • Scheduling Periodic and Incremental Scans
      • (Optional) Compiling the code
      • Executing the OpenAI scan
    • Managing scan execution
    • Working with scan results
      • Checking for exploitable vulnerabilities
      • Export to Securitm
      • (Optional) Parsing CSV exports
    • Performing dynamic web scanning
      • Authenticated scans
      • API scans
    • Running infrastructure tests
    • Scheduling the scan
    • Creating own scanning rules
  • Versions History
    • v 1.0
    • v 1.1
    • v 1.2
Powered by GitBook
On this page
  1. Usage
  2. Working with scan results

Export to Securitm

PreviousChecking for exploitable vulnerabilitiesNext(Optional) Parsing CSV exports

Last updated 3 months ago

Infrastructure scanning reports can be auto uploaded to SGRC Securitm. The next scanner reports are currently supported for upload:

  • Nessus

  • OpenVAS

  • Nmap

To configure the upload, retrieve the API token as described in Securitm .

Fill in the instance URL and API key into the respective fields of Settings Menu:

Once the values are specified, results will be auto uploaded to Securitm after each Infrastructure vulnerability scan:

Vulnerabilities will be visible in the respective Securitm chapter:

API Documentation