Jump to main content
Getting started
Welcome to the documentation for HCL AppScan 360°, where you can find information about how to install, maintain, and use this service.
About HCL AppScan 360°
HCL AppScan 360° is unified application security, visibility, and risk management. Versatile, scalable, and deployable anywhere.
What's new in HCL AppScan 360°
Explore new features that have been added to HCL AppScan 360°, and note any features and capabilities that have been deprecated in this release.
Roles and workflows
Learn about different AppScan 360° tasks and workflows for different AppScan 360° users.
Sample apps and scripts
Use these sample applications to practice scanning with AppScan 360°.
Installation
Learn about AppScan 360° architecture and how to install the product.
Installation file locations
Single VM installation of AppScan 360°
Distributed installation of AppScan 360°
Configuring user authentication
Authenticate users for AppScan 360° using either single sign-on (SSO) or LDAP authentication.
Updating the Software Composition Analysis (SCA) vulnerability database
The Software Composition Analysis (SCA) vulnerability database includes the most popular security vulnerability databases (NVD, Github advisory, Microsoft MSRC), and a wide range of lesser-known security advisories and open source project issue trackers. AppScan 360° users can enable automatic updating of the SCA vulneratility database at installation or configure manual updating.
Managing AppScan 360° deployments in My HCLSoftware
AppScan 360° licenses are managed through the My HCL Software (MHS) portal. Create a license deployment in MHS, specify license entitlements, and download a license file from MHS, then upload that file to AppScan 360°.
Opening AppScan 360° for the first time
Upgrading or updating the AppScan 360° platform
Uninstalling AppScan 360°
Troubleshooting
Navigation
This section describes the items on the main AppScan 360° menu bar, with links to more detailed information.
All applications
The Applications page lists all applications in your organization that are within the asset groups to which you are assigned. From the Applications page, you can create new applications and open individual application pages.
Scans and sessions
This view lists all scans and sessions in all your applications.
Open source libraries
Search for, review, and take action on open source libraries associated with applications.
Dashboard
The main dashboard is the fourth item on the main menu bar. It gives you a detailed overview of active issues, MTTR issues, applications, and scans along with graphs and charts that display the overall state of your applications.
Organization
Organization is your go-to hub for managing policies, domains, settings, subscriptions, and audit trails – it's where you control and organize it all.
System status
Monitor availability and status for components and dependencies for AppScan 360°.
Administration
Define users, applications, policies, and configure DevOps integrations.
Users
User management allows you to control access to sensitive applications by assigning them to asset groups and then adding specific users to those groups.
Applications
An application is a collection of scans related to the same project. It can be a web site, a desktop app, a mobile app, a web service, or any component of an app. Applications enable you to asses risk, identify trends, and make sure that your project is compliant with industry and organization policies.
Compliance policies
You can apply the predefined compliance policies, as well as your own custom compliance policies, to show only data for the issues that are relevant for you.
DevOps
Tools for incorporating AppScan 360° in your software development lifecycle.
Personal scans
A personal scan is a way of evaluating the relative security of an application in development without affecting overall application scan data (issues, for example), or compliance.
Scan status
Audit trail
The audit trail (Organization > Audit trail) logs user activity.
Dynamic analysis
HCL AppScan 360° performs security scans for web-applications for production, staging and development environments.
About dynamic analysis (DAST)
An AppScan 360° dynamic (DAST) scan consists of two stages: Explore and Test. Even though most of the scan process is seamless to the user, and no input is required until the scan is complete, understanding how dynamic scanning works can help you to better understand the role of scanning in your development process.
Dynamic scanning (DAST)
AppScan 360° can perform dynamic analysis of an application that runs in a browser or a web API. Use the configuration options available for a web application or web API in AppScan 360°, or upload an AppScan Standard configuration (template file) or a full scan file.
Recording traffic
You can record traffic as Recorded explore data for DAST scans using the AppScan Activity Recorder browser extension (for Chrome or Edge), the HCL AppScan Traffic Recorder proxy server, or AppScan Standard.
HCL AppScan Traffic Recorder
The HCL AppScan Traffic Recorder (DAST proxy) enables you to record traffic to use as Explore data. Traffic Recorder instances can be created on demand to record traffic that will later be used for a DAST scan.
IAST Total
IAST Total (Interactive Application Security Testing), harnesses IAST capabilities to enhance Dynamic Analysis (DAST) scans, improving scan and remediation times while uncovering a broader spectrum of vulnerabilities.
AppScan Standard
Troubleshooting Dynamic Analysis
Interactive monitoring
Using an agent installed on your application, AppScan 360° identifies security vulnerabilities in your application during runtime by monitoring all interactions, both legitimate and malicious. The process is "passive," in the sense that IAST does not send its own tests, and can therefore run indefinitely.
About interactive monitoring (IAST)
AppScan 360° can monitor normal application runtime behavior to detect vulnerabilities.
Starting an IAST session
Install the IAST agent on your application server, and configure the scan.
Deploying IAST
Deploy the IAST agent on the application server so it can monitor communication with the application and report to AppScan 360°.
Deploy on Kubernetes
AppScan supports automatic installation of IAST agent on a Kubernetes cluster. Using a MutatingAdmissionWebhook, the IAST agent is automatically installed on any starting pod.
Deploy on Azure App Service
Use the IAST agent to monitor applications that run on Azure App Service.
OWASP Benchmark with IAST agent
IAST using the REST API
Configure and start an IAST scan, including agent deployment, through the REST API.
IAST configuration file
Configure a JSON file to override the default IAST settings, and report only the vulnerabilities you want to know about.
User settings
Some low-level IAST behavior can be controlled with user parameters.
IAST scan results
An interactive (IAST) scan entry shows results since the last time the scan was started.
IAST troubleshooting
Software Composition Analysis
Use Software Composition Analysis (SCA) to scan for security vulnerabilities in open source and third-party packages used by your code. SCA includes Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).
About Software Composition Analysis
Software Composition Analysis (SCA) identifies and examines open-source packages within your codebase to detect potential security vulnerabilities. SCA can analyze both individual source code files and package manager artifacts, such as configuration files, and lockfiles, to determine the open-source packages your project depends on.
System requirements for SCA
The types of files that can be scanned by AppScan 360° when you perform open source testing.
Scanning libraries and third-party code for security vulnerabilities
To scan open source libraries and third-party code for security vulnerabilities, follow the steps in these topics.
SCA scan results
Features available in SCA scan results.
Static analysis
Use static analysis (SAST) to scan for security vulnerabilities in web and desktop applications. Static analysis includes Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).
System requirements for static analysis
Supported operating systems and the types of files, locations, and projects that can be scanned by AppScan 360° when you perform static analysis.
Scanning for security vulnerabilities
To scan source code for security vulnerabilities, follow the steps in these topics.
Static analysis troubleshooting
If you experience problems with static analysis, you can perform these troubleshooting tasks to determine the corrective action to take.
Results
The Scans and Sessions page lists the scans under the categories DAST, SAST, SCA, and IAST, where you can view your scan results, including scan statistics. To view, rescan, or download reports, select a scan.The Scans and Sessions page lists scans under the categories where you can view your scan results, including scan statistics. To view, rescan, or download reports, select a scan.
Sample Security Reports
Application reports
Scan data
Issues
The Issues page for an application, by default displays non-compliant issues only. You can apply a variety of filters to see the issues you need, and click on any issue to open the detailed issue information pane.
Correlation
AppScan analyzes issues found by IAST, DAST and SAST to identify common weak links in the code (correlations) where multiple vulnerabilities can be resolved with a single or consolidated remediation effort.
Fix groups
Fix groups currently apply only to issues found in static analysis scans.
Reports
Generate reports for issues discovered in an application. Send reports to send to developers, internal auditors, penetration testers, managers, and the CISO. Security information might be extensive, and can be filtered depending on your requirements.
Remediation
After risks are determined and vulnerabilities are prioritized, your security team can start the remediation process.
Rescanning
Following your first scan, as you fix issues you can scan the same application again multiple times and overwrite the previous results; the dashboard always displays the current results. When you scan again (rather than starting a new scan), the rescan overwrites the previous one.
IAST scan results
An interactive (IAST) scan entry shows results since the last time the scan was started.
Reference
Some frequently asked questions, and information about integrating AppScan 360° into the product lifecycle (SDLC).
Contact and support
Useful links to human and online resources.
FAQ
Some frequently asked questions.
Threat Class and CWE
Tables showing threat classes of issues tested for by AppScan 360°, and their related CWE numbers.
CSV format
This section describes how to save response data as in CSV format.
United States government regulation compliance
Compliance with United States government security and information technology regulations help to provides a proof point to prospects worldwide that HCL® is working to make their products the most secure in the industry.
Notices
Licensing