Skip to main content
Version: Local Β· In Progress

How-To Guides

Welcome to the ThreatWeaver how-to guides. These are practical, step-by-step instructions organized by role so you can quickly find exactly what you need.

Pick your role below and jump straight to the guides that matter most to you.


For Security Analysts​

Day-to-day vulnerability assessment and triage workflows.

GuideWhat you'll learn
Running Your First Vulnerability ScanHow to set up a target, choose a scan type, and review results
Reviewing and Triaging FindingsHow to read evidence, verify findings, and prioritize remediation
Creating Compliance ReportsHow to generate PCI-DSS, SOC 2, ISO 27001, and HIPAA reports
Managing Scan ExceptionsWhen and how to create exceptions for accepted risks

Go to Security Analyst Guides β†’


For Security Engineers​

Configuring scanners, authentication, agents, and advanced scan workflows.

GuideWhat you'll learn
Setting Up Authenticated ScanningHow to create auth profiles so scans test behind login pages
Deploying a Docker Scan AgentHow to scan internal apps behind your firewall
Configuring Scan TemplatesHow to create reusable scan configurations
Setting Up Continuous ScanningHow to schedule recurring scans and CI/CD triggers

Go to Security Engineer Guides β†’


For DevSecOps Engineers​

Automation, CI/CD integration, APIs, and webhooks.

GuideWhat you'll learn
CI/CD Pipeline IntegrationHow to trigger scans from GitHub Actions and GitLab CI
Using the ThreatWeaver APIHow to automate scans, pull findings, and export SARIF
Setting Up WebhooksHow to get notified in Slack or PagerDuty when scans complete
Importing API SpecsHow to upload OpenAPI, Swagger, or GraphQL schemas for deeper coverage

Go to DevSecOps Guides β†’


For Administrators​

User management, SSO, data retention, integrations, and platform health.

GuideWhat you'll learn
Managing Users and RolesHow to add users, assign roles, and manage access
Configuring SSO with Microsoft Entra IDHow to set up SAML single sign-on
Setting Up Data Retention PoliciesHow to manage data lifecycle and compliance
Configuring Tenable API KeysHow to connect ThreatWeaver to Tenable.io
Monitoring Platform HealthHow to check scanner health, database size, and performance

Go to Administrator Guides β†’


For Product Managers​

Reports, dashboards, risk metrics, and remediation tracking.

GuideWhat you'll learn
Generating Executive ReportsHow to create and download PDF reports for stakeholders
Tracking Remediation ProgressHow to use the Fix Planner to monitor SLA compliance
Understanding WeaverScoreHow the composite risk score works and how to use it
Customizing DashboardsHow to build role-specific dashboard views

Go to Product Manager Guides β†’


For Executives​

High-level dashboards, security posture, and board-ready reports.

GuideWhat you'll learn
Reading the Executive DashboardWhat each KPI means and how to spot trends
Understanding Your Security PostureKey indicators and red flags to watch for
Requesting a Penetration Test ReportHow to find and download pentest reports for auditors

Go to Executive Guides β†’


For New Team Members​

First-day orientation and platform walkthrough.

GuideWhat you'll learn
Welcome to ThreatWeaverWhat the platform does, in plain English
Your First 5 MinutesLog in, explore modules, find your way around
Finding Your Role-Specific GuidesWhere to go next based on your job function

Go to New Team Member Guide β†’


Can't find what you need?

Check the FAQ for common questions, the Glossary for term definitions, or reach out to your team lead.