Acunetix version 13 introduces a new user interface that has been rewritten from the ground up. The new UI has been developed using the latest version of Angular, provides superior user experience, and improves the general usability of Acunetix. The following is a list of…
Adding Custom Vulnerability Checks to Your Acunetix Installation
Overview This document describes how to extend an Acunetix On-Premises installation with custom vulnerability checks. Even though a default installation of Acunetix already includes thousands of carefully crafted vulnerability checks, users with specific requirements and customized environments may benefit from extending scan coverage and functionality…
How to Use Allowed Hosts
When you build web applications, you often use multiple back-end web services to interface between client-side and server-side applications. For example, enterprises use functional subdomains to distribute static content or application logic between API requests. To scan the entire web application, the web vulnerability scanner…
How many users can I configure in Acunetix?
The number of users that you can configure in Acunetix depends on the edition that you have purchased. Acunetix Standard does not allows for only one user – the same user that is created when installing Acunetix. Acunetix Premium (both on-premises and online) allows for…
How to Use Excluded Hours
Acunetix provides additional functionality for managing your scans. You may encounter a situation, where scans should not interfere with scheduled deployments or hinder the web application functionality during certain times. With that in mind, it is possible to configure excluded hours for Acunetix during which…
Why Are Some Vulnerabilities Marked as Verified?
Starting from Acunetix Version 12 (build 12.0.190325161), Acunetix marks some vulnerabilities identified during a scan as verified. Verified vulnerabilities are vulnerabilities that Acunetix has detected with 100% certainty in the web application being scanned and thus they do not need to be manually verified. Acunetix…
Migrating Acunetix On-Premises to Another Server
This article explains the steps that you should take to migrate Acunetix On-Premises to another server while keeping the configuration and reports intact. This process applies to Microsoft Windows installations. Before you start the migration process, make sure to back up your Acunetix installation. You…
How to Configure Acunetix with Kenna Security
You can integrate Acunetix with Kenna Security as a connector, out of the box. The following configuration applies to both the Kenna VM appliance and the SaaS solution. First, create a new Kenna instance. On the Home page, you can see statistics for imported vulnerability…
How to Schedule Future and Recurrent Scans
With Acunetix, it is not only possible to start a scan instantaneously, but you can schedule a scan for a future date and time, or schedule recurrent scans which might be helpful for periodical reporting. These can be set up as follows: After adding the…