Skip to main content

Create a target

A target is a scan object that FPT VA scans for security vulnerabilities. Targets are created on FPT Portal and can be a website, a public IP address, or an IP range you manage.

  1. From the menu, select Security > Cloud VA, then click Create target.

    Create target

    note

    If your Tenant has not been granted access to the service, you will see the message You do not have sufficient permissions to view this page!. Select the correct Tenant that has been allocated quota.

  2. Configure the scan by filling in the required fields:

    FieldDescription
    NameName of the scan target.
    Scanning typeSelect the target type: Website (web application) or Network (IP or IP range).
    URL*URL of the web application to scan. Required when Scanning type is Website.
    Network auto-scanEnable to also scan the IP address of the web application.
    IP addressIP address or IP range to scan. Required when Scanning type is Network.
    Scan modeScan mode for Network targets: Host Discovery, Standard Scan, Deep Scan, Brute Force Scan, or Log4Shell Scan.
    Schedule ScanScan schedule: Onetime, Daily, Weekly, or Monthly.
    Start onDate and time the system starts scanning.
    Repeat onDays the system repeats the scan within a week or month.
    Scan NowScan immediately at creation time; subsequent scans follow the schedule.
    Notify toSelect email recipients to be notified after a successful scan.

    Configure scan target

    You can also enable Advanced settings for deeper scan configuration.

    For Website targets, the following additional fields are available:

    FieldDescription
    Exclude URLsList of paths to skip during scanning.
    Custom HeaderConfigure custom headers to maintain an authenticated session during scanning. See Get website headers.
    Custom CookiesConfigure custom cookies to maintain an authenticated session during scanning. See Get website cookies.
    Login using your accountConfigure login credentials: None, Basic authentication, or Login form.

    For Network targets, the following additional fields are available:

    FieldDescription
    Port listSet of service ports to check.
    Excluded IPList of IP addresses to skip during scanning.
    Alive testMethod for determining whether a device exists on the network: Default, Custom, or Consider Alive.
    Authenticate scanLogin configuration for authenticated scanning: None, SSH, or SMB. See Enable Remote Registry on Windows for SMB.
    MonitorMonitor device status and service port status to detect anomalies.
    warning

    You are fully responsible for the URLs you declare. Only scan URLs that you own. For deeper scanning of targets that require login, configure an appropriate authentication method.

  3. Click Create to initialize the target. The system will validate resources and process the scan based on the configuration provided.

    After successful creation, the new target appears in the management dashboard with the following information:

    • Name: Target name.
    • Scanning type: Scan type.
    • Scanning status: Status of the most recent scan.
    • Detected risk: Number of risks detected in the most recent scan.
    • Last scanned: Time of the most recent scan.