1. Introduction
Our guide to application management guide will walk you through the essential processes of creating, deleting, and editing applications on the platform. This guide also explains the different parts of the Applications Management page.
- User must have already setup a scanner (see integrations)
- User should be logged in as a admin
2. Application Page
Similar to the environments section, the Application overview page gives insight into environment risk individually and as a whole. The overview page provides insight into application risk. There are multiple visual tools that give different breakdowns of risk. Since these tools are similar in principle to the Application overview, we will not go over them in detail in this article.

The Application Risk View page is divided into two parts: Overall Summary and Applications List.
The first part is the summary that provides an overview of the risk status of each of the Applications using a combination of speedometer-type dials and pie and doughnut graphs. Each of which are colour-coded with large text captions indicating the vulnerability status to catch your attention more easily.
3. Application List

As with the environments page, you can view the comprehensive list of applications by clicking on the application list button.
Each application can be broken down into components, we will cover this in the Components Management section.
4. Adding an Application
Step 1:

Navigate to the applications page. To add an app click on the add app button after navigating to the applications list.
Fill in the fields when prompted. There are three sections: basic information, asset selection and advanced configuration
Step 2:

To create a new application entry, start by selecting the application type, naming it, and setting risk tolerance and value. Adjust the criticality level and assign accountable and responsible users, then click “Next.”
Step 3:

In the Asset Selection step, enter the component name and choose between automatic or manual asset selection. Use filters to refine the asset list and review the selected assets, ensuring they match your criteria.
Step 4:

Create tags to efficiently search for the asset and link to notifications and issue tracking. This will ensure information on assets can be efficiently accessed and tracked.
Click “Create Application” to finish the process.
5. Export Applications
Export application information easily in CSV format to manage and analyse security data efficiently. This feature can help simplify reporting.

6. Edit and Delete App
Navigate to the applications list and click on the three dots of the relevant application.
From here click on the edit or delete buttons in the dropdown menu that appears.
