Censys
How can we help?
-
General Information
-
Censys Attack Surface Management
Getting Started
- How to Seed the Censys ASM Platform
- Use Censys to Find Seeds
- Tour the Attack Surface Dashboard
- Workspaces and User Access
- Configure Risks with Censys
- Introduction to the Logbook
Shrinking Your Attack Surface
- Follow the Path, Investigate Your Attack Surface
- How to Exclude Assets to Curate Your Inventory
- Baseline Your Attack Surface
- Prioritize & Triage Risks with Censys
- Identify Stale DNS
- Identify Unsanctioned Cloud Usage
Cloud Connectors
Foundations of ASM: Inventory Introduction
- Build Inventory Queries Using Search Shortcuts
- Asset Inventory Exploration Page
- Asset Inventory Example Queries
- Asset Inventory Search Language
- ASM Asset Schemas
- Web Entities
Security Integrations
-
Censys Search
Getting Started with Censys Search 2.0
- Create a Free Censys Search Account
- Search 2.0 Quick Start Guide
- Search 2.0 API Quick Start
- Search 2.0 Troubleshooting Q&A
- Search 2.0 Example Host Queries
- How to Export Search Results
Upgrading to Censys Certs 2.0
Resources for Learning Before You Search
Advanced Searching
Censys Search Integrations
Censys Account Management
-
Censys Data
-
More Resources