Web Apps Overview

The SP360 Web Apps Dashboard offers significant functionality for continuous monitoring of Web App vulnerabilities. It enables you to get deep insights into different Key Performance Indicators (KPIs) for your Web Apps by offering many filters to configure your view into your vulnerability data. The Web App dashboard displays data through various charts that can be filtered and tailored as detailed in this help section.

This dashboard enables you to focus on the vulnerabilities that are most important for your organization. In addition to illustrating the “current state” of vulnerabilities, it also provides significant insight into the historical “trending” so you can see the progress your organization is making addressing any and all outstanding vulnerabilities.

Filtering Chart Content

For ease of use, the dashboard has options/buttons at the top of the dashboard that can be used to filter the chart information. In addition, the last section of the dashboard (i.e., the Web Apps list) allows you to include or exclude the Web Apps that contribute to the vulnerability data.

Options/Buttons Descriptions
SeverityFrom this drop-down you can select one or more severities of interest to alter the charts accordingly. The severity of each vulnerability is classified as either Urgent, Critical, Serious, Medium, or Minimal.
Duration Using this control, you can establish the time-period the chart covers. The available options are 4 weeks, 3 months, 6 months or 1 year.
IntervalUsing this control, you can establish the period of time each data point represents. The available intervals are 1 week, 4 weeks, 3 months, 6 months or 1 year. This option allows you to view the trending over the desired time periods; for example, month-over-month, or quarter-over-quarter.
Use this toggle button to view the vulnerability counts for each interval in all the charts. This removes the need to hover over the chart.

The Web Apps dashboard provides information in three sections:

  1. Vulnerabilities Trending History
  2. Current Vulnerabilities (i.e., current counts)
  3. Vulnerability Metrics

Vulnerabilities Trending History

The Vulnerability Trending History (which is a collapsible section) provides you with an overall trending of vulnerability counts, so that you can observe the progress made over time. The data is represented in charts (as shown above) and segmented with a separate chart for:

  1. Total Number of Vulnerabilities
  2. New Vulnerabilities
  3. Reopened Vulnerabilities
  4. Fixed Vulnerabilities
  5. Ignored Vulnerabilities

Note: In the lower four Trending Charts, you will find two annotations. The annotation displayed on top shows the number of vulnerabilities (i.e., New, Reopened, Fixed or Ignored) discovered since the completion of the last Interval chosen, so it represents a partial Interval. It grows by a day, each day.

The annotation displayed on the bottom shows the vulnerabilities discovered during the last full Interval retroactively from today, such as 1-week, 4-weeks, and so on. This is a moving interval that changes each day. When selecting a 1-week Interval, both annotations are “drillable”, allowing you to see the corresponding vulnerabilities. For Intervals other than 1-week, only the second annotation is “drillable”.

Total Number of Vulnerabilities

This chart shows the trending of all existing vulnerabilities (i.e., New, Reopened or Existing) and is filtered according to the controls discussed above. Often organizations will be most interested in the highest severity vulnerabilities and will limit the charts to Urgent and Critical vulnerabilities.

New Vulnerabilities

This chart provides you with insight into “new” vulnerabilities, meaning those vulnerabilities that were discovered for the first time within the chosen interval. For example, if you chose an interval of one week, the chart will show how many new vulnerabilities were found for each complete week, for the entire chosen duration.

Reopened Vulnerabilities

This chart provides you with insight into “reopened” vulnerabilities, meaning those vulnerabilities that were previously remediated, but re-discovered within the chosen interval. In general, “reopened” vulnerabilities should be rare.

Fixed Vulnerabilities

This chart provides you with insight into those vulnerabilities that have been remediated within the chosen interval. Most organizations find this insightful and will correlate these numbers to their most recent development or IT efforts.

Ignored Vulnerabilities

This chart provides you with insight about the “ignored” vulnerabilities for the chosen interval. Vulnerabilities may be manually ignored by users, or the application may “auto-ignore” any vulnerability that is associated with a Web App that was not reachable (scannable) in the past 30 days. You may choose to ignore a vulnerability if it is associated with an application that you know is about to be taken out of service, and therefore you do not want to clutter the dashboard with vulnerabilities that do not need to be explicitly addressed.

Current Vulnerabilities

Current Vulnerabilities (which is a collapsible section) provides you with charts that show the current vulnerability counts in the following categories:

  1. By Severity – allows you to quickly focus on the most severe vulnerabilities.
  2. By Status – to easily discern the current vulnerabilities statuses.
  3. Groups by QID – a grouping chart that shows your vulnerabilities in groups, to easily understand the types of vulnerabilities that are most common and that by addressing their underlying root cause can, enable you to address multiple vulnerabilities at a time.

By default, these counts are represented as bar charts. If you prefer to see the counts expressed as percentages and in a pie chart format, click the action icon to the right of the Current Vulnerabilities heading, as shown below.

The grouping chart, Top 10 Groups by QID provides a powerful additional functionality.

By clicking the action icon in the upper-right corner of that chart, you can view a pop-up (shown below) that lists all groups (not just the Top 10) and provides additional information, as well as the ability to apply bulk functions, such as ignoring all the vulnerabilities in that group. The action icon allows you to see each vulnerability in the group, whereas allows multiple vulnerabilities (with the same QID) to be ignored more conveniently with a single request.

Vulnerability Metrics – Severity

Vulnerability Metrics (which is a collapsible section and is collapsed by default) provides insights into how long your open vulnerabilities have been open, and how long it took to close your remediated vulnerabilities. Often organizations have Service Level Agreements (SLAs) that commit them to addressing vulnerabilities within a given timeframe, this information helps you understand how well you are adhering to your SLAs.

The Vulnerability Metrics are presented in one of two formats, that can be toggled by clicking the action icon on the upper-right hand portion of this section. By default, the Severity-based format is shown, which contains the following two bar charts.

Days (Average Time Open)

This bar chart shows the total number of open vulnerabilities (upper right notation) and the average number of days (upper left notation) that each severity of vulnerabilities has been open. Hovering over the chart will also show how many vulnerabilities were considered for the metric calculations.

Days (Average Time to Closure)

This bar chart shows the number of vulnerabilities closed in the specified time frame (upper right notation) and the average number of days (upper left notation) the vulnerability was open before being closed.

Clicking on the action icon to the far right of the Vulnerability Metrics, the header displays a “Timeband” label, and breaks down the number of vulnerabilities by ranges of days, for example, those open less than three days, or between three and seven days. This data is presented in pie chart format.

Notice that the icon used to toggle between Severity-based and Timeband-based formats changes.

Web Apps List

This sub-section of the dashboard allows you to tailor the vulnerability metrics being shown by including or excluding specific Web Apps. To better understand the operational details, let’s breakdown the key features this sub-section offers.

The upper left corner of the Web Apps List contains a blue box with the number of assets meeting your selection criteria, as shown below.

Filtering Options, Action Icons, and Insights Bar

To the right of the asset count, the Web Apps List offers a dropdown search and filter control and three action icons.

Filtering Options

Clicking on the dropdown search filter allows you to select which Web App assets to display based on the following attributes.

Action Icons Function
Update selection icon

Clicking this icon restricts the dashboard to showing only the Web Apps selected. This is helpful if you know that a Web App is being retired (i.e., taken out of service) in the near future and you do not want the dashboard cluttered by that Web App’s vulnerabilities.

Reset dashboard icon

Clicking this icon resets the dashboard to its default state.

The reset icon includes an annotation (Reset annotation icon) that indicates how many rows have been selected and will be reset, providing clearer context before the action is performed.

Export icon

Clicking this icon downloads (in CSV format) all details for all or selected Web Apps.

Filtering Options

The upper right corner of the Web App List contains two filter bars. These allow you to select which Web Apps to display based on the following attributes.

Filter Type Definition
WEB APP STATUS

This filter allows you to select Web Apps based on their status. If a Web App is inaccessible and hasn’t been scanned for 30 consecutive days, SP360 will automatically “age-out” (i.e., inactivate/deactivate) that Web App and its associated vulnerabilities.

Using this drop-down filter, you can view Web Apps based on the following four options:

  • All: All of the existing Web Apps, regardless of asset status.
  • Active: The default view which shows all active Web Apps. This view includes all assets, including those that are in the aging process but haven’t been aged-out (or deleted). Assets that have 20 or less days left before they age out are shown in amber, and those with 10 or less days are shown in red.
  • Inactive: Displays all Web Apps that are inactive either due to aging out, or by being manually deactivated.
  • Deleted (Aged-Out or Manual): Displays all deleted Web Apps. Typically, historical information for Web Apps is needed during security audits, so they are not immediately deleted when they are aged-out (i.e., inactivated/deactivated). After 15 months in an inactive state, the Web App will be deleted.

Aging Status filter options

Note: Any deactivated Web Apps can be reactivated from the Web App Details page.

SCAN RESULT STATUS

This filter allows you to select Web Apps based on their result of the most recent scan. Available options are:

  • All: Displays all Web Apps, regardless of the outcome of their most recent scan.
  • No Web Service: Indicates that the Web App URL could not be reached and, therefore, the Web App could not be scanned.
  • Processing: Indicates that the scan is currently in progress and results are not yet available.
  • Successful: Indicates that the scan completed successfully.
  • Time Limit Reached: Indicates that the scan was terminated because it exceeded the allowed execution time.
  • Service Error: Indicates that the scan ended due to an internal service error.

This filter helps you quickly identify Web Apps that may require follow-up due to scan failures, connectivity issues, or incomplete scan results.

Web Apps search bar example

SCAN STATUS

This filter allows you to view Web Apps based on the current state of their most recent scan. Use this drop-down to focus on scans that have completed, are in progress, or were cancelled. Available options include:

  • All: Displays all Web Apps, regardless of scan status.
  • Finished: Includes Web Apps for which the scan has been completed (successfully or otherwise).
  • Cancelled: Shows Web Apps where the scan was manually or system-cancelled before completion.
  • Running: Displays Web Apps that are currently being scanned.

This filter helps you monitor scanning activity in real time or audit recently completed or interrupted scans.

Web Apps search bar example

AUTH STATUS

This filter allows you to view Web Apps based on the authentication outcome from the most recent scan. This is helpful when analysing issues related to login success or credential usage. Available options include:

  • All: Displays Web Apps with all authentication outcomes.
  • Successful: Shows Web Apps where authentication was successfully completed.
  • Not Used: Includes Web Apps where authentication was not attempted.
  • Failed: Lists Web Apps where authentication was attempted but failed.
  • None: Displays Web Apps that are not configured for authentication.

Use this filter to quickly isolate scans with login issues or verify credential coverage.

Web Apps search bar example

FILTER BY DATE

Web Apps can be filtered based on key lifecycle events and timestamps. Available options include:

  • Last Scanned Date: The most recent date the Web App was scanned by SP360.
  • Last Deactivated Date: The date the Web App was most recently marked inactive, either manually or due to aging out.
  • Last Reactivated Date: The date the Web App was last reactivated after previously being deactivated.
  • Created Date: The date the Web App was first added or discovered within SP360.
  • Updated Date: The last time a change (such as configuration or status update) was applied to the Web App.

These date filters allow you to isolate activity and manage Web Apps based on operational timelines.

Web Apps search bar example

Action Icons (Bulk Operations)

Action Icons Function

Clicking this icon restricts the dashboard to showing only the Web Apps selected.

This is helpful if you know that a Web App is being retired (i.e., taken out of service) in the near future and you do not want the dashboard cluttered by that Web App’s vulnerabilities.

Reset dashboard icon

Clicking this icon resets the dashboard to its default state.

The reset icon includes an annotation (Reset annotation icon) indicating how many rows have been selected and will be reset, providing clearer context before the action is performed.

Export icon

Clicking this icon downloads (in CSV format) all details for all or selected Web Apps.

Note:

  • You can select the checkboxes on the far left to filter the data to display only assets you are interested in. As the boxes are checked, a “Selected” counter appears and is updated, and the graph icon becomes active. The dashboard will not reflect the changes until the graph icon is clicked.
  • Selections are retained across page scrolls, ensuring that any assets you select remain checked as you navigate through the list. To return to the default state, click the Reset dashboard icon icon.

Web Apps Insights Bar

The Web Apps Insights Bar provides a quick summary of vulnerability severity and scanning activity across all visible web applications. It offers a real-time overview of current risk exposure and operational coverage.

This includes a visual indicator (Severity Bar) followed by several numerical summary tiles, all explained below.

  • SEVERITY Bar: This segmented bar displays the number of vulnerabilities by severity level:
    • Urgent – Indicates the highest-risk web application vulnerabilities.
    • Critical – Reflects vulnerabilities with significant security consequences.
    • Serious – Moderate-level issues requiring attention.
    • Medium – Lower-severity findings that may still pose risk.
    • Minimal – Informational-level vulnerabilities.

    Each segment is color-coded and labelled with the corresponding count of vulnerabilities, enabling users to quickly triage and prioritize based on risk level.

  • Summary Tiles: To the right of the Severity Bar are key numeric indicators that provide contextual scope:
    • ACTIVE – Total number of active web applications that will be scanned.
    • VULNERABILITIES – Combined count of all detected vulnerabilities across all web apps.

    These summary counts update dynamically as filters are applied, providing a real-time overview of the vulnerability landscape tailored to the user's focus area.

The Web App grid includes the following fields by default, however, users can customize the grid to add, remove, or re-arrange fields to meet their needs by clicking the action icon, explained here.

Column Headers Definition
Name The assigned name to the Web App.
URL The URL used to navigate to the Web App.
VULN COUNT The total number of vulnerabilities associated with that Web App.
Created At The date on which the Web App was first detected (scanned).
Last Scanned The date on which the Web App was last scanned.
Scan Result

Displays the result of the most recent scan for the given Web App.

Actions Row-level action icons, explained below.
Qualys ID The unique ID assigned to the Web App in Qualys.

To learn more about the optional fields that can be added, removed, or re-arranged in the Web App grid, click here.

Each Web App has four available icons on the right side of each line.

Icons Definition
Manual scan icon

This action icon is used to deactivate scanning of the Web App.

Manual scan icon

This action icon is used to invoke a manual scan of the Web App. A confirmation page is displayed to confirm the request.

To cancel a manual scan, click the revolving “scan in progress” Cancel manual scan icon icon. A confirmation page is displayed to confirm the cancellation request.

View vulnerabilities icon

Clicking this icon displays all vulnerabilities associated with that Web App. For more information about the Vulnerabilities page, click here.

View details icon

Clicking this icon displays detailed information about that Web App, as partially shown below. The Web App details are organized into the following four categories:

  • Asset Detail displays basic information for a Web App including, but not limited to, Qualys ID, Name, Asset URL, and related details.
  • The Authentication tab shows an Authentication Record if an authentication method has been defined. Otherwise, it displays “No Data.”
  • The Last Scan tab includes information such as the Start Date, Duration, Status, and other scan-related details.
  • Miscellaneous displays additional information about the Web App including, but not limited to, a screenshot of the landing page (if available), whitelist and blacklist status, and last scanned date.