Submit a request
Sign in
Censys
Censys Attack Surface Management
Menu
Censys Attack Surface Management
Getting Started
How to Seed the Censys ASM Platform
Use Censys to Find Seeds
Tour the Attack Surface Dashboard
Workspaces and User Access
Configure Risks with Censys
Introduction to the Logbook
See all 7 articles
Shrinking Your Attack Surface
Follow the Path, Investigate Your Attack Surface
How to Exclude Assets to Curate Your Inventory
Baseline Your Attack Surface
Prioritize & Triage Risks with Censys
Identify Stale DNS
Identify Unsanctioned Cloud Usage
See all 7 articles
Cloud Connectors
Legacy Cloud Connectors
Introduction to Censys Cloud Connectors
Censys Unified Cloud Connector Install Guide [PDF]
Foundations of ASM: Inventory Introduction
Asset Inventory Exploration Page
Asset Inventory Example Queries
Asset Inventory Search Language
ASM Asset Schemas
Web Entities
Certificates
See all 11 articles
Security Integrations
Splunk
Censys ASM Integration Proxy Setup
Censys ASM JIRA Integration
Censys ASM Qualys Integration
Censys ASM XSOAR Integration