Censys Help Center home page
Submit a request Sign in
  1. Censys
  2. Censys Attack Surface Management

Menu

Censys Attack Surface Management

Getting Started
  • How to Seed the Censys ASM Platform
  • Use Censys to Find Seeds
  • Tour the Attack Surface Dashboard
  • Workspaces and User Access
  • Configure Risks with Censys
  • Introduction to the Logbook
See all 7 articles

Shrinking Your Attack Surface
  • Follow the Path, Investigate Your Attack Surface
  • How to Exclude Assets to Curate Your Inventory
  • Baseline Your Attack Surface
  • Prioritize & Triage Risks with Censys
  • Identify Stale DNS
  • Identify Unsanctioned Cloud Usage
See all 7 articles

Cloud Connectors
  • Legacy Cloud Connectors
  • Introduction to Censys Cloud Connectors
  • Censys Unified Cloud Connector Install Guide [PDF]

Foundations of ASM: Inventory Introduction
  • Asset Inventory Exploration Page
  • Asset Inventory Example Queries
  • Asset Inventory Search Language
  • ASM Asset Schemas
  • Web Entities
  • Certificates
See all 11 articles

Security Integrations
  • Splunk
  • Censys ASM Integration Proxy Setup
  • Censys ASM JIRA Integration
  • Censys ASM Qualys Integration
  • Censys ASM XSOAR Integration

Copyright © . Censys. All Rights Reserved.