Application Onboarding Checklist

Tasks to perform to enable Seeker to test your application for security vulnerabilities.

Tasks Owner Information
1. Ensure network connectivity between the Agent and the Seeker server by configuring the firewall to allow incoming TCP/IP and WebSocket connections to the server (default ports HTTP 8080/HTTPS 8443). IT/Security
2. Create and configure a project to manage your application's testing. Seeker admin Creating Projects
3. Connect an Agent that matches your application's technology and target platform. DevOps Connecting and Upgrading Agents
4. Enable Seeker to sync the version of the project with the automatically detected version of your application. Seeker admin Configure Project Version Management
5. Enable user access to the project. Seeker admin Managing User Access
6. Configure the automatic delivery of vulnerability detections to your bug tracking system. Seeker admin Configure Bug Tracking Integration
7. Perform security compliance checks in CI/CD pipeline by stopping a build if an application doesn't comply with the security policy, for example, upon detection of any critical or high vulnerability. You can do this by defining an additional Jenkins build step or by including an API call /api/{ver}/vulnerabilities as a condition in a build script. DevOps Install and Configure Seeker Jenkins Plugin

Vulnerability Management