icon-zia.svg
Secure Internet and SaaS Access (ZIA)

About Attack Surface Report

The Attack Surface Report provides you with the details of your organization's exposed applications and servers to a public network, such as the internet, and their possible exploitation.

As part of our efforts to centralize risk management via the Risk360 service, the Attack Surface Report is no longer accessible from the ZIA Admin Portal. However, you can request this report only once by contacting your Zscaler Account team. To analyze and access this report on a regular basis, subscribe to Zscaler's Risk360 service. To learn more, see What Is Risk360? and Zscaler Risk360.

The Attack Surface Report provides the following benefits and enables you to:

  • Access exposed assets to the public network for potential exploitation.
  • Discover unintentional configurations that can result in your organiation's security breach.

This report captures the following vulnerabilities and exposures:

  • This section of the report displays a list of servers exposed to the internet and their existing known vulnerabilities. For each server, you can see the following information:

    • Name
    • IP
    • Product
    • Vulnerabilities
    • Score
    • Severity

    The Vulnerabilities column displays the known common vulnerabilities and exposures (CVE) IDs associated with the servers.

    Close
  • This section of the report displays a list of servers that support older versions of SSL/TLS protocol that are currently at risk. For each server, you can see the following information:

    • Name
    • IP and Port
    • Supported TLS Versions
    Close
  • This section of the report displays a list of servers running within your organization's network, currently exposed to the internet. For each server, you can see the following information:

    • Name
    • IP and Port
    • ASN
    • Product
    Close
  • This section of the report displays a list of server names that might reveal the functionality of the servers or any internal information.

    Close
  • This section of the report displays the public cloud instances managed by your organization, currently exposed to the internet. For each public cloud instance, you can see the following information:

    • Name
    • IP and Port
    • Cloud
    Close

About the Attack Surface Report Page

On the Attack Surface Report page (Analytics > Attack Surface Report), you can do the following:

  1. Notify about the latest available report.
  2. View the domain name.
  3. View a list of all the available reports. For each report, you can see the following:
  • Report Name: The name of the attack surface report.
  • Date: The date and time at which the report was made available. You can sort this column.
  • Action: Displays the downloadable file formats available for the report.
  1. Download the report either in PDF, PPT, or CSV format.

You can download the reports for the last 12 months.

Screenshot of the Attack Surface Report page.

Related Articles
About the Email Security ReportAbout Email Security Report: IncidentsAbout the Gen AI Security ReportAbout the Instance Discovery ReportViewing the Resource Discovery ReportAbout Cybersecurity InsightsAbout Interactive ReportsAbout Industry Peer ComparisonAbout the System Audit ReportAbout the Sandbox Activity ReportScheduling the Sandbox Activity Report Weekly EmailAbout the Sandbox Files Found Malicious ReportScheduling the Sandbox Files Found Malicious Report Weekly EmailCIPA Compliance ReportAbout the Company Risk Score ReportAbout the User Risk ReportCompany Summary Report (CIO Report)Company Summary Report (CSO Report)Security Policy Audit ReportExecutive Insights ReportAbout SaaS Assets Summary ReportViewing Quarterly Business Review ReportsAbout Attack Surface ReportConfiguring the Attack Surface Report NotificationAbout Configuration Risk ReportAbout the Data Discovery ReportViewing Data Discovery DetailsAbout the IoT ReportAbout Discovered DevicesProviding Feedback on IoT Device ClassificationsAbout Scheduled ReportsScheduling ReportsCreating or Copying a ReportExcluding Locations in User-Related ReportsExporting and Importing ReportsPrinting ReportsAbout Endpoint DLP ReportAbout Endpoint DLP Report: Incidents