Skip to main content
Reports listing view in ASM

ASM Reports Overview


Overview

The Reports page in Attack Surface Management (ASM) allows you to generate and view detailed and compliance-ready security reports.
Each report contains a full summary of your organization’s external attack surface, exposures, and actionable remediation steps.
Generated reports are automatically archived for auditing and tracking purposes, ensuring transparency and repeatability for quarterly or ad-hoc assessments.

Key Capabilities

Generate PDF Reports

Export detailed Attack Surface summaries with one click using the Generate Report button.

Comprehensive Breakdown

Reports include project summary, exposure catalog, key findings, methodology, and tools used.

Audit Trail

Track when and by whom each report was generated, providing complete audit visibility.

Executive Insights

Each report contains executive-level summaries and recommendations to aid leadership decisions.

Report Structure

Each generated report follows a consistent and compliance-focused layout:
SectionDescription
Project SummaryOutlines scope, objectives, and key dates.
Executive SummaryHigh-level overview of findings, exposure counts, and priorities.
Executive Action PlanA clear roadmap for remediation priorities and accountability.
Exposure CatalogueSummarizes all detected assets (subdomains, IPs, ports, etc.) with severity.
MethodologyExplains how assets and exposures were identified, including detection techniques.
Tools UsedLists open-source and enterprise tools used for discovery (Subfinder, Nmap, CRT.sh, etc.).
Detailed Exposure TablesProvides structured data for each exposure type (e.g., invalid certs, open ports).
Conclusion & ContactsCloses with analyst notes, conclusions, and key contact details.

Actions

Each report can be viewed, downloaded, or deleted directly from the dashboard.
Report Actions (view, download, delete)

Report Actions

  • 👁️ Preview — View the report inline before downloading.
  • ⬇️ Download — Export a local PDF copy for archiving or sharing.
  • 🗑️ Delete — Remove outdated or test reports to keep your workspace clean.

Workflow Example

  1. Click Generate Report after your latest ASM scan is complete.
  2. The platform compiles all assets, exposures, and analytics into a structured PDF.
  3. Review the document online or download it for internal distribution.
  4. Present the findings to your executive or compliance team for review.

Benefits

✅ Audit-ready documentation for security and compliance reviews
✅ Automated and consistent report formatting
✅ Executive-ready summaries for leadership briefings
✅ Complete visibility into attack surface trends over time

Next Steps

View Exposure Details

Explore the individual exposures that power these reports.