Skip to main content

Overview

The Reports section allows security teams to generate, manage, and export structured reports of their external attack surface. Reports consolidate data from scans, assets, and risk signals into executive-ready and audit-friendly documents, enabling better visibility, decision-making, and compliance tracking.
Reports Dashboard

Report Types

The platform supports multiple report formats tailored for different use cases:

Executive Report

High-level PDF report summarizing assets, exposures, and risk posture for leadership and stakeholders.

Exposure Report

Detailed breakdown of all detected exposures and vulnerabilities in structured format.

Attack Surface Report

Complete inventory of all discovered external assets across your organization.

Generating Reports

To generate a report:
  1. Select the desired report type
  2. Click Generate
  3. The system compiles data from scans and exposures
  4. Report appears in Report History
Reports are generated asynchronously and updated with a status indicator.

Report History

Report History Table
The Report History section provides a complete log of all generated reports.

Fields Explained

FieldDescription
NameReport title with timestamp
Created AtWhen the report was generated
Generation Initiated ByUser who triggered the report
StatusCurrent state (Completed / Failed)

Report Status

  • ๐ŸŸข Completed โ€” Report is ready for download
  • ๐Ÿ”ด Failed โ€” Report generation failed
  • ๐ŸŸก (Processing) โ€” Report is being generated (if applicable)

Report Actions

Download and Delete Report Actions
Each report provides quick actions via the menu:
  • โฌ‡๏ธ Download Report โ€” Export the report file
  • ๐Ÿ—‘๏ธ Delete Report โ€” Remove unnecessary reports
These actions allow teams to maintain a clean and usable report repository.

How Reports Are Built

Reports aggregate data from multiple ASM components:
  1. Scans โ€” Asset discovery results
  2. Assets โ€” Subdomains, IPs, services
  3. Exposures โ€” Detected risks and misconfigurations
  4. Risk Signals โ€” Correlated findings and severity
This ensures every report reflects the latest security posture.

Workflow Example

  1. Run or complete a scan
  2. Navigate to Reports
  3. Generate an Executive or Exposure report
  4. Wait for processing to complete
  5. Download and share with stakeholders

Benefits

  • โœ… Centralized reporting for all ASM data
  • โœ… Executive-ready summaries
  • โœ… Easy export for compliance and audits
  • โœ… Full audit trail of generated reports
  • โœ… Quick access to historical reports

Best Practices

  • ๐Ÿ“… Generate reports after each major scan
  • ๐Ÿ“Š Use Executive Reports for leadership
  • ๐Ÿ” Use Exposure Reports for technical teams
  • ๐Ÿงน Clean up failed or duplicate reports regularly

From Data to Decisions

Scan โ†’ Detect โ†’ Analyze โ†’ Report โ†’ Act Reports transform raw attack surface data into actionable insights for both technical and non-technical stakeholders.

Explore Live Demo

Explore ASM Live โ€” No Signup Needed

Instantly explore how Snapsec Attack Surface Management (ASM) detects exposures, correlates signals, and enables real-time security decisions โ€” all in one unified platform.