Get a demo Acunetix Website Security Scanner Get a demo
  • Product
  • Why Acunetix?
    • Solutions
      • INDUSTRIES
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • ROLES
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Case Studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our story
    • In the news
    • Careers
    • Contact
  • Resources
    • Blog
    • Webinars
    • White papers
    • Buyer’s guide
    • Partners
    • Support
  • Get a demo
ACUNETIX SUPPORT

Product Articles

CATEGORIES

How to Use Allowed Hosts

Product Articles | January 21, 2020 by Daniel Zammit

When you build web applications, you often use multiple back-end web services to interface between client-side and server-side applications. For example, enterprises use functional subdomains to distribute static content or application logic between API requests. To scan the entire web application, the web vulnerability scanner…

Read more

How many users can I configure in Acunetix?

Product Articles | December 27, 2019 by Nicholas Sciberras

The number of users that you can configure in Acunetix depends on the edition that you have purchased. Acunetix Standard does not allows for only one user – the same user that is created when installing Acunetix. Acunetix Premium (both on-premises and online) allows for…

Read more

How to Use Excluded Hours

Product Articles | October 14, 2019 by Daniel Zammit

Acunetix provides additional functionality for managing your scans. You may encounter a situation, where scans should not interfere with scheduled deployments or hinder the web application functionality during certain times. With that in mind, it is possible to configure excluded hours for Acunetix during which…

Read more

How to Configure Acunetix with Kenna Security

Product Articles | March 7, 2019 by Daniel Zammit

You can integrate Acunetix with Kenna Security as a connector, out of the box. The following configuration applies to both the Kenna VM appliance and the SaaS solution. First, create a new Kenna instance. On the Home page, you can see statistics for imported vulnerability…

Read more

Authenticated Scans on Applications That Make Use of One-time Tokens or CAPTCHAs

Product Articles | February 7, 2019 by Bernhard Abele

One-Time Tokens add another layer of security, supplementing the username and password with a code that only the individual user has access to (for example by SMS or via a security key). A CAPTCHA has a different purpose, as it provides a test used to…

Read more

Scanning applications that make use of Single Sign-On (SSO)

Product Articles | January 16, 2019 by Bernhard Abele

Single Sign-On (SSO) is a service which allows users to have one set of login credentials to access multiple web applications. SSO allows a user to log in once and gain access to various applications, without the need to re-enter login credentials at each application….

Read more

Session Detection: What to do if the LSR fails to identify a session pattern

Product Articles | January 7, 2019 by Bernhard Abele

Session Detection is the final step in the configuration of the Login Sequence Recorder (LSR). A valid Session Pattern is vital for a successful scan, as with it the scanner is able to identify whether it is authenticated or not. During a scan, the session…

Read more

Which Linux distributions can Acunetix be installed on?

Product Articles | December 11, 2018 by Nicholas Sciberras

Acunetix has been tested on the following Linux distributions: Ubuntu Desktop/Server 16.0.4 LTS or higher Suse Linux Enterprise Server 15 and openSUSE Leap 15.0 Acunetix may work on other Linux distributions. For example, we have a number of Acunetix users who installed Acunetix on Kali…

Read more

What is the difference between Acunetix for Windows and Acunetix for Linux?

Product Articles | December 7, 2018 by Nicholas Sciberras

The main difference is in the way that Acunetix is installed. The Windows version can be installed using the GUI installer, while the Linux version can be installed from Terminal. The Acunetix web UI is the same on Windows and Linux, and the same functionality…

Read more

  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • …
  • 12
  • 5 / 12
Subscribe by Email

Get the latest content on web security in your inbox each week.

We respect your privacy

Learn More
  • IIS Security
  • Apache Troubleshooting
  • Security Scanner
  • DAST vs SAST
  • Threats, Vulnerabilities, & Risks
  • Vulnerability Assessment vs Pen Testing
  • Server Security
  • Google Hacking
Blog Categories
  • Articles
  • Web Security Zone
  • News
  • Events
  • Product Releases
  • Product Articles

Categories

  • Support Videos
  • FAQs & Documentation
  • Web Vulnerabilities Index
Client: AWS
Client: Cognizant
Client: Garmin
Client: Airforce
Client: NASA
Client: American Express
Product Information
  • AcuSensor Technology
  • AcuMonitor Technology
  • Acunetix Integrations
  • Vulnerability Scanner
  • Support Plans
Use Cases
  • Penetration Testing Software
  • Website Security Scanner
  • External Vulnerability Scanner
  • Web Application Security
  • Vulnerability Management Software
Website Security
  • Cross-site Scripting
  • SQL Injection
  • Reflected XSS
  • CSRF Attacks
  • Directory Traversal
Learn More
  • White Papers
  • TLS Security
  • WordPress Security
  • Web Service Security
  • Prevent SQL Injection
Company
  • About Us
  • Customers
  • Become a Partner
  • Careers
  • Contact
Documentation
  • Case Studies
  • Support
  • Videos
  • Vulnerability Index
  • Webinars
  • Login
  • Invicti Subscription Services Agreement
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Find us on Facebook
  • Follow us on Twiter
  • Follow us on LinkedIn

© Acunetix 2025, by Invicti