In Catcher24, a Target is any digital asset (such as a website, web application, server, or IP address) that you want to monitor for security vulnerabilities. Here’s a closer look at what defines a target, how it works in the system, and best practices for target setup.
Understanding Targets
Targets represent the systems, networks, or applications within your organization that require regular cybersecurity assessments. Catcher24 scans these targets to identify potential vulnerabilities, security weaknesses, and compliance gaps.
Examples of Common Targets:
- Websites – Public-facing websites that your customers or users access.
- Web Applications – Applications that handle sensitive data or user interactions, such as customer portals, internal tools, or e-commerce platforms.
- Servers – Database or file servers that store essential company data.
- IP Addresses – Public or private IPs that serve as entry points into your network or system.
How to Add a Target
To add a target, go to the Dashboard and click Add Target. Enter the URL or IP address for the asset you want to monitor, and configure the specific settings for the target. Each plan allows a certain number of targets, so be sure to choose the right plan for your needs. We will check if a hostname corresponds to a valid IP address and if the target is publically accessible.
We also have a guide to get you started: Getting started
Target Configuration Options
When you add a target, you can customize the scan settings to suit your security needs:
- Scan Frequency: Decide how often you want Catcher24 to scan the target (e.g., daily, weekly, monthly).
- Display name: Set up a display name for your target, this is especially useful for IP address or grouping your targets. We like to use it to group our servers locations: AMS1 – APIServer1; AMS1 – APISever2
Best Practices for Setting Up Targets
- Choose Key Assets: Start with your most critical systems and applications to ensure your core digital assets are secure.
- Configure Specific Settings: Adjust scan settings for each target based on its specific security needs.
- Regularly Review and Update Targets: As your organization evolves, periodically review your targets to ensure all critical assets are covered.
By adding and configuring targets effectively, you can ensure continuous monitoring and protection for your most important digital assets.