Edgescan Fullstack Vulnerability Management
- 09 May 2024
- 1 Minute to read
- Print
- DarkLight
- PDF
Edgescan Fullstack Vulnerability Management
- Updated on 09 May 2024
- 1 Minute to read
- Print
- DarkLight
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
Edgescan Fullstack Vulnerability Management is a cloud-based continuous vulnerability management and penetration testing solution that discovers, validates, and rates vulnerabilities by running continuous asset profiling to detect rogue/exposed ports, hosts or even hidden APIs.
Adapter Parameters
- Edgescan Domain (required) - The hostname of the Edgescan server.
- API Key (required) - The API Key that has read access to the server.
- Verify SSL (required, default: False) - Verify the SSL certificate offered by the host supplied in Edgescan Domain. For more details, see SSL Trust & CA Settings.
- If enabled, the SSL certificate offered by the host will be verified against the CA database inside of Axonius. If it fails validation, the connection will fail with an error.
- If disabled, the SSL certificate offered by the host will not be verified against the CA database inside of Axonius.
- HTTPS Proxy (optional, default: empty) - A proxy to use when connecting to Edgescan Domain.
- If supplied, Axonius will utilize the proxy when connecting to the host defined for this connection.
- If not supplied, Axonius will connect directly to the host defined for this connection.
Was this article helpful?