Verification items prove that a vulnerability exists in the environment as reported. These items can include screenshots, credentials, or code excerpts.

  1. From the top menu, select Track > Findings.
    Tip: You can also access findings from applications, projects, and scans.
  2. Click the finding entry.
  3. In the Instances tab of the Grids area, click the instance entry.
  4. In the Instance Verifications area of the Properties tab, select one of these options:
    • To add a verification item, click Drop, paste, or click to add a verification remediation item.
    • To modify a verification, click the Verification Items tab and click an entry to expand it.
      Note: You can't modify verification items included in scan results except to include or exclude from reports.
  5. Add verification information.
    1. If you don't want to include the item in a report, deselect Include in Report.
    2. Enter the name.
    3. Select the type of verification.
    4. In the Description field, enter or paste the verification information.
    5. For image or file verifications, drag and drop the file or click Drop or click to add an attachment to upload the file.
  6. Click Save.