Verification items prove that a vulnerability exists in the environment as reported. These items can include screenshots, credentials, or code excerpts.
- From the top menu, select .
Tip: You can also access findings from applications, projects, and scans.
- Click the finding entry.
- In the Instances tab of the Grids area, click the instance entry.
- In the Instance Verifications area of the Properties tab, select one of these options:
- Add verification information.
- If you don't want to include the item in a report, deselect Include in Report.
- Enter the name.
- Select the type of verification.
- In the Description field, enter or paste the verification information.
- For image or file verifications, drag and drop the file or click Drop or click to add an attachment to upload the file.
- Click Save.