Skip to main content

Scan Policy Fields

This document is for:
Invicti Enterprise On-Demand, Invicti Enterprise On-Premises, Invicti Standard

This document provides a comprehensive reference to all tabs and fields available in the New Scan Policy window within Invicti Enterprise and the Scan Policy Editor dialog in Invicti Standard. Understanding these configuration options is essential for creating effective and optimized scan policies tailored to your specific security testing requirements.

General

The General tab is displayed in Invicti Enterprise only and contains the fundamental policy identification and sharing settings.

FieldDescription
NameThe title of the scan policy
DescriptionProvides an overview of the policy's features for anyone who may use it
SharedSelect this option to allow others to access the policy

Security Checks

In this tab, select the categories and Security Checks for the Scan Policy. Most security checks are enabled by default.

Best Practice

Configure security checks based on your specific application stack and compliance requirements. Review the default settings to ensure they align with your security testing objectives.

ItemDescription
Generate ProofSelect Yes to enable proof generation for the current security check group (default: True)
Proof SharingEnable or disable sharing the same proof across vulnerabilities (default: True)
Only Run on the Start Path (RoR)Select Yes to restrict attacks to the Start Path only; otherwise, all directories will be attacked (default: False)
Resource Finder LimitSets the maximum number of hidden resources and folders Invicti searches for in each directory (default: 125)
Include/ExcludeControls cookie-based security checks: Include – Specify cookie names to include in security checks; Default – Includes all cookies
Cookie NamesEnter cookie names to be managed during the scan
Check All PagesSelect True to perform CORS checks on all pages; otherwise, only unique directories are checked (default: True)
Prepend Original ValuePrepends the original value to Cross-Site Scripting payloads for increased accuracy (default: False)
Attack RefererOpt out of attacking the Referer header. If the target application requires the Referer value, disable this option (default: True)
Possible Admin InterfaceDetermines whether Invicti detects potential administration pages within the scope of HTML Content checks (default: Enabled)
Maximum Path CountSets the maximum number of paths to check against HTTP methods
Database TypeSelect the database type used by your application to optimize Boolean SQL injection payloads
Upload FoldersSpecify directories where Invicti will search for uploaded files (comma-separated format)
Search Upload FoldersDetermines whether upload folders should be visited to locate uploaded files (default: True)

For more details on configuring specific security checks, refer to the Setting Security Check Options external documentation.

Crawling

This section outlines the crawling behavior and limits for discovering content and resources within your target application.

FieldDescription
Crawling Page LimitEnter a number to set the maximum number of pages to crawl. Once this number is reached, Invicti ends the crawling phase and starts to attack (default: 2,500)
Maximum SignatureEnter a number to set the maximum number of samples to collect from pages with similar URL signatures (default: 9). The URL signature consists of path, HTTP method and parameter name
Maximum Page VisitsEnter a number to set the maximum number of times the crawler visits a page (default: 40). If this number is exceeded, Invicti will stop crawling that page
Maximum URL Rewrite SignatureEnter a number to set the maximum number of samples to collect from pages that match the same URL rewrite signature (default: 9)
Wait for the Resource Finder to finishEnable to ensure Invicti waits for the Resource Finder to finish before ending the crawling phase (default: Disabled)
Text ParserEnable to ensure the static HTML/Text Parser can search for links in HTML comments and similar locations (default: Enabled)
Text Parser ExtensionsThe Text Parser parses files for links. Specify additional file extensions (comma, whitespace or semicolon separated) beyond the default list
Parse SOAP Web ServicesCheck to enable SOAP Web Service discovery by parsing WSDL files (default: Enabled)
Parse REST Web ServicesCheck to enable REST Web Service discovery by parsing OpenAPI (Formerly Swagger) and WADL files (default: Enabled)
Parse URI FragmentsCheck to enable parsing URI fragments to discover parameters in the fragment (Default: Enabled)
Fallback to GETCheck to enable Invicti to fallback to GET requests when HEAD requests don't work (default: Disabled)
Add Related LinksCheck to specify whether all related links should be crawled when a new link is found (default: Enabled)
Enable Parameter-Based NavigationCheck to enable Parameter-Based Navigation if the target website uses parameter based navigation (default: Disabled)
Enable Query-Based NavigationCheck to enable that only query-string parameters will be recognized as navigation parameters
Navigational Parameter RegExEnter a regular expression. If a parameter name matches the regular expression, it will be considered as a navigational parameter
Maximum Page VisitsEnter a maximum number of visits to a page containing navigational parameters. This value must be between 1 and 1000 (default: 999)

For detailed information about parameter-based navigation, see Scanning Parameter-Based Navigation Websites external documentation.

JavaScript

Configure how Invicti analyzes JavaScript and AJAX content to discover additional attack surfaces in modern web applications.

FieldDescription
Analyze JavaScript/AJAXCheck to enable Invicti to analyze JavaScript and AJAX to find relevant links and pages (default: Enabled)
Select / Load a Pre-defined PresetChoose from Default, SPA (Single Page Application), or Large SPA configurations
DOM Load TimeoutEnter a number to set the amount of time (milliseconds) to wait for the page to load before analyzing JavaScript DOM simulation (default: 30000)
DOM Simulation TimeoutEnter a number to set the amount of time (milliseconds) to wait before JavaScript ends DOM simulation (default: 45000)
Interevent TimeoutEnter a number to set the amount of time (milliseconds) to wait after triggering a JavaScript event (default: 100)
Max Simulated ElementsEnter a number to set the maximum number of DOM elements the parser will simulate before terminating (default: 500)
Skip ThresholdEnter a number to set the number of elements to simulate before skipping elements. Enter '0' to disable sampling (default: 300)
Elements to SkipEnter a number to set the number of elements to skip simulation after the Skip Threshold has been exceeded (default: 10)
Max Modified Element DepthEnter a number to limit the simulation to a set number of nested elements (default: 4)
Pre-simulation WaitEnter a number to set the amount of time (milliseconds) the scanner should wait before starting simulation (default: 0)
Exclude by CSS SelectorExclude HTML elements such as logout buttons from event simulation by CSS selectors
Maximum Option ElementsEnter a number to set the maximum number of option elements, per select element, to simulate (default: 10)
Persistent JavaScript CookiesEnter the names of cookies (separated by semicolons) that are set in JavaScript and should persist
Open Redirect Conf. TimeoutEnter a number to set the time (milliseconds) to wait before ending JavaScript DOM simulation for Open Redirection confirmation (Default: 45000)
XSS Confirmation TimeoutEnter a number to set the time (milliseconds) to wait before ending JavaScript DOM simulation for XSS confirmation (default: 45000)
Exclude by Javascript EventsEnter a JavaScript event that DOM excludes from the simulation (comma separated)
Cache by CSS SelectorEnter elements to be cached via CSS selectors (Invicti Standard only)
Maximum Cache ElementsEnter a number to set the maximum number of cache elements per host (default: 1000, Invicti Standard only)
Filter Document EventsCheck to filter events that are attached to a document by name to a constant set (default: Disabled)
Ignore document eventsCheck to ignore the triggering events that are attached to the document object (default: Disabled)
Filter Colon EventsCheck to filter events that contain a colon (:) in their name (default: Disabled)
Extract Static ResourcesCheck to extract static resources from DOM elements (default: Enabled)
Allow out-of-scope XML HTTP (AJAX) requests during simulationCheck if the target website fails to load when some requests cannot be loaded (default: Enabled)
Generate Debug InfoCheck to enable the debugger to generate debug information during the scan (default: None)
Block navigation on SPAsCheck to enable Invicti to block extra navigation on single-page applications

Attacking

Configure how Invicti performs security attacks against discovered parameters and endpoints.

FieldDescription
Maximum Number of Parameters to Attack on a Single PageEnter a number to set the maximum number of parameters that Invicti should attack on a single page (default: 24)
Enable Proof GenerationCheck to generate a Proof of Exploit after a vulnerability is confirmed (default: Enabled)
Attack Parameter NamesEnable to generate extra attacks which place attack payloads into the name of a request parameter (default: Enabled)
Attack Referer HeaderEnable to generate extra attacks which place attack payloads into the Referer header (default: Disabled)
Attack User-Agent HeaderEnable to generate extra attacks which place attack payloads into the User-Agent header (default: Disabled)
Attack CookiesEnable to generate extra attacks which place payloads on cookie name and values (default: Disabled)
Optimize Header AttacksEnable to issue header attacks on each unique link path (default: Enabled)
Override Version Vulnerability SeveritiesInvicti overrides the severity of out of date library findings according to the highest known issue (Default: Enabled)
Optimize Attacks to Recurring ParametersEnable to detect recurring parameters in different URLs (default: Disabled)
Recurring Parameters Attack LimitEnter a number to set the maximum number of pages to attack for recurring parameters (default: 10)
Anti-CSRF Token Field Names (Comma Separated)Enter Anti-CSRF token field names that should be kept as they are
Attack CSRF TokenCheck to enable CSRF attacks
Enable Random Parameter Attacks in Cross-site Scripting checksEnable to attempt to add extra parameters to pages to detect XSS vulnerabilities (default: Enabled)

Custom 404

Configure how Invicti handles and detects custom error pages.

FieldDescription
Auto Custom 404Check to select an automatic 404 Error page
Manual Custom 404Check to select a manual 404 Error page
DisabledCheck to disable the 404 Error page
Maximum 404 SignaturesEnter a number to set the maximum number of 404 Error page samples to collect (default: 1000)
Maximum 404 Pages to AttackEnter a number to set the maximum number of 404 samples to crawl and attack (default: 10)

(Scan) Scope

Define the boundaries and extent of your security scan.

Legal Considerations

Ensure scan scope settings comply with your authorization and testing agreements. Inappropriate scope configuration may lead to legal issues.

FieldDescription
Case SensitiveEnable if you want to change the default behavior because your target uses case-sensitive URLs (Default: Disabled)
Bypass Scope for Static checksWhen enabled, Invicti will make requests to resources that are out of scope for static vulnerability checks (Default: Disabled)
Ignore These ExtensionsEnter the extensions of those test files you do not want Invicti to crawl or test (Invicti Standard only)
Enable Content-Type ChecksEnable to analyze pages that have a listed content-type header (Default: Disabled)
Ignore These Content TypesEnter the content types of those test files you do not want Invicti Enterprise to crawl or test
Block Ad NetworksEnable to stop sending requests to known ad networks during scanning (Default: Enabled)

Ignored Parameters

Configure which parameters should be excluded from security testing.

FieldDescription
NameThis is a friendly name for your reference/the parameter (e.g. 'ASP Session ID (COOKIE)')
PatternThis is the actual name of the parameter to be excluded from the scan (e.g. ASPSESSIONID*). Pattern matching is case-sensitive
TypeThis is the parameter type (POST, GET, COOKIE, WEBSTORAGE, ALL)

For more detailed information, refer to Excluding Parameters From a Scan external documentation.

Form Values

Configure predefined values for form fields during scanning.

FieldDescription
NameThis is a friendly name for your reference
TypeThis is the form input type (hidden, text, textarea, submit, reset, button, image, file, radio, select, checkbox, password, color, date, datetime, datetime-local, email, month, number, range, search, tel, time, etc.)
PatternThis is the value that the HTML attribute value will be matched against based on the selected Match
TargetThis is the match target (Select All, Name, Label, Placeholder, Id)
MatchThis is the match type for the Pattern field (RegEx, Exact, Contains, Starts, Ends)
ValueThis is the value Invicti will submit to the input parameter when the match is successful
ForceWhen enabled, Invicti will submit the provided value even when the parameter is already populated

For comprehensive guidance, see Configuring Pre-Defined Web Form Values external documentation.

InvictiHAWK

This table lists and explains the fields in the Invicti Hawk tab. This tab is only displayed in Invicti Enterprise On-Premises and Invicti Standard.

FieldDescription
Invicti Hawk URL (NE OP)Invicti Hawk server that will respond to Out-of-Band and SSRF-related attacks that were initiated by Netsparker.
Invicti Hawk URI (NS)Invicti Hawk server that will respond to Out-of-Band and SSRF-related attacks that were initiated by Netsparker.
Validate DNS SettingsClick to validate the DNS settings of Invicti Hawk server.
Validate Invicti HawkClick to validate whether Invicti Hawk server can report vulnerabilities.
ClearClick to clear the logs shown below.

Autocomplete

This table lists and explains the fields in the Autocomplete tab. Invicti Enterprise will only issue an alert if Autocomplete is enabled on a text input that matches one of these values.

FieldDescription
Input NameEnter a value to be matched with the input name to detect whether autocomplete is enabled for the input. The Input Name can contain any valid wildcard characters, such as '?' '*' or '#'.

Ignored Email Addresses

This table lists and explains the fields in the Ignored Email Addresses tab.

FieldDescription
Email PatternEnter any email address you'd like the scan to ignore. Email Pattern can contain any valid wildcard characters (? * #) Invicti will ignore any Email Disclosure vulnerability if it matches one of these patterns. Invicti will also ignore email addresses that start with the most common words (e.g. admin, billing, contact, support). You can amend this list, which is located at C:\Users{USER}\Documents\Netsparker\Resources\Configuration\GenericEmails.txt.

CSRF Settings

This table lists and explains the fields in the CSRF tab.

FieldDescription
Select if you want to enable CSRF checks for authenticated scans only.
Enter a list of strings to indicate a username that includes one of these.
Enter a list of strings to indicate a login form that includes one of these.
Enter a list of strings to indicate non-CSRF form values whose name or action includes one of these. Invicti won't report CSRF on these forms even if the form does not have a CSRF token.
Enter a list of strings to indicate non-CSRF input values whose name or value includes one of these. If Invicti cannot deduct the goal of the form by looking at its name or action, it will attempt to deduct it by looking at the name of the input it contains. This list defines these values.
Enter a list of strings that indicates forms that contain Captcha against CSRF.

Web Storage

This table lists and explains the fields in the Web Storage tab.

FieldDescription
TypeThis is the type of Web Storage mechanism that will be used. From the dropdown, select an item. The options are: Local or Session
KeyThis is the name of the key you want to create.
Value: Checkbox / User Name Inputs / Login Form Values / Non-CSRF Form Values / Non-CSRF Input Values / Captcha IndicatorsThis is the value you want to give the key you are creating.
OriginEnter storage data for a specific origin. (Otherwise, leave it empty to allow the DOM parser to pass it for any origin.)

Extensions

This table lists and explains the fields in the Extensions tab.

FieldDescription
ExtensionThis is a list of file extensions to which the specified Crawling and Attacking activity will be applied.
CrawlSelect the required Crawling activity for the file type (Extension). The options are: Do Not Crawl / Crawl/ Crawl Only Parameter (default)
AttackSelect the required Attacking activity for the file type (Extension). The options are: Do Not Attack / Attack Parameters (default) / Attack Parameters and Query String

HTTP Configuration

Request

This table lists and explains the fields in the Request tab. This tab is displayed in both editions. (In Invicti Standard, it is displayed once you click on the HTTP tab.)

FieldDescription
(Pre-defined) User Agent(s)Select or Enter the User Agent string to be used in all HTTP requests during scans
Force this valueEnable to force Invicti to use the User Agent, even if the HTTP request has a User-Agent value
Connection Timeout (sec)This is the number of seconds to wait before the HTTP Request times out
Read/Write Timeout (sec)Time to wait when reading from response or writing to request stream (Invicti Standard only)
Request Timeout (sec)Interval in seconds that Invicti Enterprise should wait for a response (Invicti Enterprise only)
Concurrent ConnectionsEnter the maximum number of simultaneous connections Invicti should open when scanning
Requests per secondSet the maximum number of requests initiated per second (recommendation: 30)
HTTP Keep AliveEnable to improve the server's performance and decrease the load (default: Enabled)
Support Gzip/DeflateEnable to complete the scan in less time, if the target web server supports compression (default: Enabled)
Support CookiesEnable to support HTTP cookies (default: Enabled)
Capture HTTP RequestsEnable to save HTTP requests during scans using the Fiddler session file format (Invicti Enterprise only)

Headers

This table lists and explains the fields in the Headers tab. (In Invicti Standard, it is displayed once you click on the HTTP tab.)

FieldDescription
EnabledEnable so that the custom header is added to all HTTP requests
NameThe Name field in the HTTP Header should only contain ASCII characters
ValueA header value to be used in attacks with the corresponding header
Attack ModeThe options are: None (default), Optimized (only suitable attack payloads), Full (all attack payloads)

SSL/TLS

This table lists and explains the fields in the HTTP SSL/TLS tab. (In Invicti Standard, it is displayed once you click on the HTTP tab.)

FieldDescription
Security ProtocolSelect the security protocol(s) used while making requests (SSLv3, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3)
Untrusted CertificatesAction taken when encountering untrusted certificates (Accept or Reject)

Proxy

This table lists and explains the fields in the Proxy tab. This tab is only displayed in Invicti Enterprise On-Premises and Invicti Standard. (In Invicti Standard, it is displayed once you click on the HTTP tab.)

FieldDescription
Use Application (Global) ProxyEnable to use the Application Proxy. The Applications Proxy can be defined at the Proxy tab in the Options dialog.
Use System (Internet Explorer) ProxyEnable to use the System Proxy. This is the default. The System Proxy is the system-wide proxy that is used by every program by default.
Use Custom ProxyEnable to use and configure a Custom Proxy. The Custom Proxy should be configured explicitly to be used unlike System Proxy. It is scan policy specific and valid in the scope of the policy.
Don't use proxy server for local (intranet) addressesEnable so that no proxy will be used.
Use this proxy server for the requests other than the target website(s)Enable so that this proxy is used instead of the proxy server in the agent configuration.

Additional Configuration Tabs

IndexedDB (Invicti Standard Only)

Configure IndexedDB storage data for browser-based testing.

FieldDescription
NameThis is a friendly name for your reference
OriginEnter storage data for a specific origin (leave empty for any origin)

Browser Setting

This table lists and explains the fields in the Browser Settings tab.

FieldDescription
Browser SettingsDefault Browser Parameters: These are the default browser parameters that Invicti uses when it launches a Chromium instance to scan your website. You can deselect any parameters to disable it. Or, you can add a new parameter. Headful Browser Parameters: These are the headful browser parameters that Invicti uses when it launches a Chromium instance to authenticate with your website. You can deselect any parameters to disable it. Or, you can add a new parameter.

Send To Actions (Invicti Standard Only)

Configure automatic issue forwarding to integrated systems.

FieldDescription
Send To ActionSelect integration target (Asana, Azure Boards, Bitbucket, Bugzilla, GitHub, JIRA, etc.)
SeveritiesSelect vulnerability severity levels to trigger actions
Only ConfirmedCheck to trigger actions only for confirmed vulnerabilities

Brute Force

Configure authentication brute force testing.

FieldDescription
Authentication Brute Force (Basic, NTLM, Digest)Check to enable Authentication Brute Force
Maximum Username/Password Combinations to TestEnter a number to set the maximum combinations to test (default: 10)

Knowledge Base

Configure sensitive keyword detection and knowledge base checks.

FieldDescription
Enable Knowledge BaseCheck to enable Knowledge Base checks (default: Enabled)
Sensitive Keyword PatternEnter a valid regular expression to find sensitive keywords in code comments

Need help?

Invicti Support team is ready to provide you with technical help. Go to Help Center

Was this page useful?