To access scanner settings, go to the Scanner tab in the web-interface and click the Settings button on the left.
This setting enables or disables perimeter collection and search for typical vulnerabilities.
This setting completely disables automatic attack reproduction by the scanner. You can later manually run the attack verification by clicking the Check button.
This setting limits the maximum load on the web application that will be generated by the scanner requests.
The maximum number of requests per second (RPS) can be configured
- to an IP address.
- to a domain.
If multiple domains are associated with the same IP address, then the speed of requests to this IP address will not exceed the limits for the IP address. If multiple IP addresses are associated with one domain, then the total speed of requests to these IP addresses within this domain will not exceed the limits for the domain.
Limits can be overridden for individual IP addresses or domains. This is done within the network perimeter.