Run Locally Login โ†’
Autoplay CTA

Play complete onboarding screenshots automatically

Ordered sequence from Step 01 to Step 35 with a larger preview area for clearer viewing.

User Guide

Set up your first SecureOne scan in guided steps

Follow this click-through guide from left navigation to complete setup, execute your first scan, and understand how to review and act on findings.

Use this page as a practical onboarding checklist for first-time setup, first scan, and initial triage.
Overview screenshot 1
Step 01 screenshot
Overview screenshot 2
Step 02 screenshot
Overview screenshot 3
Step 03 screenshot

2) Prerequisites

  • SecureOne panel is running and you can sign in as admin.
  • At least one repository or CI/CD pipeline is available to scan.
  • Scan agent host has Docker installed (if using agent-based scans).
  • Tokens/credentials for Git provider and agent registration are ready.
Prerequisites screenshot 4
Step 04 screenshot
Prerequisites screenshot 5
Step 05 screenshot
Prerequisites screenshot 6
Step 06 screenshot

3) Create Workspace

  1. Sign in to SecureOne and open the dashboard.
  2. Create (or select) your organization/workspace.
  3. Set environment details (project name, deployment mode).
  4. Confirm workspace appears in your left navigation/project switcher.
Workspace screenshot 7
Step 07 screenshot
Workspace screenshot 8
Step 08 screenshot
Workspace screenshot 9
Step 09 screenshot
Workspace screenshot 10
Step 10 screenshot

4) Connect Integrations

  1. Go to Settings โ†’ Integrations.
  2. Connect GitHub/Git provider app or token.
  3. Verify repository access and choose target repositories.
  4. Optionally connect CI/CD (for Jenkins or pipeline-triggered scans).
Integrations screenshot 11
Step 11 screenshot
Integrations screenshot 12
Step 12 screenshot
Integrations screenshot 13
Step 13 screenshot
Integrations screenshot 14
Step 14 screenshot

5) Register Scan Agent

  1. Open Agents and generate registration/upload/heartbeat tokens.
  2. Start the agent with your config and tokens.
  3. Confirm agent status changes to Online.
  4. Validate tool image settings (SAST/SCA/Secrets/DAST) if required.
Tip: Start with one agent for onboarding, then scale per team/workspace.
Agent screenshot 15
Step 15 screenshot
Agent screenshot 16
Step 16 screenshot
Agent screenshot 17
Step 17 screenshot
Agent screenshot 18
Step 18 screenshot

6) Configure Scan

  1. Open Scans โ†’ New Scan.
  2. Select repository, branch, and scan types (SAST/SCA/Secrets/DAST).
  3. Choose policy thresholds (e.g., fail on critical findings).
  4. Save as a reusable template if your team runs similar scans.
Scan Config screenshot 19
Step 19 screenshot
Scan Config screenshot 20
Step 20 screenshot
Scan Config screenshot 21
Step 21 screenshot
Scan Config screenshot 22
Step 22 screenshot
Scan Config screenshot 23
Step 23 screenshot

7) Run First Scan

  1. Trigger a manual scan from UI (or via pipeline if integrated).
  2. Monitor queue, agent assignment, and execution status.
  3. Wait until scan status shows Completed.
Run Scan screenshot 24
Step 24 screenshot
Run Scan screenshot 25
Step 25 screenshot
Run Scan screenshot 26
Step 26 screenshot
Run Scan screenshot 27
Step 27 screenshot

8) Review Findings

  1. Open scan results summary (critical/high/medium/low counts).
  2. Filter by severity, tool, file, and category.
  3. Open individual findings to inspect evidence and remediation guidance.
Review Results screenshot 28
Step 28 screenshot
Review Results screenshot 29
Step 29 screenshot
Review Results screenshot 30
Step 30 screenshot
Review Results screenshot 31
Step 31 screenshot

9) Triage & Actions

  1. Mark false positives where appropriate.
  2. Create tickets/tasks for true positives.
  3. Re-run scans after fixes and confirm issue closure.
  4. Enable policy gates in CI/CD to prevent regressions.
Actions screenshot 32
Step 32 screenshot
Actions screenshot 33
Step 33 screenshot
Actions screenshot 34
Step 34 screenshot

10) Next Steps

  • Add additional repositories and environments.
  • Configure scheduled scans and notifications.
  • Roll out role-based access for security and engineering teams.
  • Track security posture trends in dashboard reports.
Next Steps screenshot 35
Step 35 screenshot