Application Security Platform
Definitions and overview

Targets overview

This document is for:
Invicti Platform

The Targets page, located under Inventory > Targets, provides a centralized view of all configured scan targets for which you have view permissions. Each target represents a web application or API endpoint that has been added to the system for security testing.

This document describes the column on the main table overview, available options, and the actions you can perform.

Main table overview

The table displays detailed information for each target across the following columns:

  • Name – The name assigned to the target.
  • Applications – Lists any applications the target is associated with.
  • Description – A user-provided description of the target.
  • URL – The full web address of the target.
  • FQDN – Fully Qualified Domain Name of the target.
  • Vulnerabilities – Summary of detected vulnerabilities by severity.
  • Agent – The scanning agent assigned (if applicable).
  • Environment – The environment type (e.g., Production, Test).
  • Last Scanned – Timestamp of the most recent scan.
  • Next Scan – Timestamp of the next scheduled scan, if set.
  • Created – Date the target was added to the system.
  • Tags – Custom labels applied to organize or group targets.

Each target entry includes a Scan now option for immediate manual scanning.

Available actions

Bulk actions

Perform operations on multiple selected targets at once, such as:

Create new target

Click Create new target to add a new application or API endpoint to be scanned with these options:

Filter and search

Use the Add a filter button to narrow down the target list by attributes such as:

  • Name
  • URL
  • Threat level
  • Tags

For more information about using filters in Invicti Platform, refer to the linked document.

Additionally, use the search bar to quickly locate a specific target.

Target detail overview (drawer)

The Target Drawer provides an at-a-glance view of key details for a selected target in the Inventory > Targets page. It appears when you click anywhere on a row and allows quick access to important data and actions without leaving the page.

From the drawer, you can perform the following actions:

  • Scan – the options are:
  • Run scan with defaults
  • Run previous scan again
  • Run custom scan
  • Edit – Opens the full edit form for the target configuration.
  • Three dots menu - the available options are:
  • View last scan report
  • Run scan with defaults
  • Run previous scan again
  • Run custom scan
  • Edit target
  • Generate report
  • Delete target

The target drawer contains three tabs:

  • Overview - as described below
  • Recent scans - with information about all recent scans for the selected target
  • Activity - showing information about what activity was performed on this target, by whom, and when

  1. Overview tab

Risk level summary

The Risk level section provides a summary of vulnerabilities detected in the most recent scan, categorized by severity. It also displays any trends by comparing the current findings with the previous scan.

Scans

The scans section provides information about the last scanned date, the default configuration, and the default authentication method used.


Target details

The target details section contains generic information about the target, such as URL, asset type, environment and application and collection information. You can also view who created the target and when.

  1. Recent scans tab

The Recent Scans tab displays a list of completed and in-progress scans for the selected target, helping users quickly assess scan activity and outcomes over time.

The table includes the following columns:

  • Date – When the scan was completed.
  • Duration – How long the scan took to complete.
  • Vulnerabilities – Total number of vulnerabilities discovered in that scan, categorized by severity.
  • Status – The final state of the scan (e.g., Completed, In Progress, Failed).

You can click on any scan entry to access full scan details, results, and available reports.

  1. Activity tab

The Activity tab logs user actions related to the target, helping maintain an audit trail. It includes:

  • What action was taken (e.g., scan started, configuration edited)
  • Who performed the action
  • When the action occurred

This is useful for monitoring changes and ensuring accountability across teams.


Share This Article