Run an Unauthenticated Dynamic Analysis

Getting Started with Veracode

The basic steps in this use case perform a simple, unauthenticated Dynamic Analysis of multiple URLs.

Before you start, ensure you:
  • Provide access to the Veracode IP address: to enable Veracode to perform scans, your application must be accessible from the Veracode IP address 34.195.146.191. This access may require creating a staging or test environment to host your application, making configuration changes to your firewall rules, and performing other IT activities. When running a Dynamic Analysis, you see traffic coming from this IP address, therefore, you must add it to your allowlist.
  • Verify connectivity: ensure the target URLs you want to scan are externally accessible and, if your site requires authentication, the login and password for access to the websites are accurate before you start a Dynamic Analysis. After you submit the scan, Veracode performs a connection and login verification if a login is configured.
  • Verify user roles: you must have the Creator, Submitter, or Security Lead role to be able to create, configure, or submit a Dynamic Analysis. Any member of the team associated with the Dynamic Analysis is able to view the analysis and its results.
If you require more detailed documentation, refer to the Dynamic Analysis guide.
  1. From the Veracode Platform, go to Scans & Analysis > Dynamic Analysis.
  2. Click New Dynamic Analysis.
  3. Enter a name for the Dynamic Analysis. Use a name that uniquely identifies the analysis within your organization, for example, by using in the scan name the team or business unit responsible for this application.
  4. Enter the URLs using one of the following methods:
    • Upload a CSV file that contains a list of multiple URLs (250 maximum).
      Download the CSV template, enter all URLs and their respective credentials, save the file, and then upload the saved file.


      Note: If you have a Discovery subscription, you can upload a list of the URLs within your web perimeter.
    • Enter the URLs manually (250 maximum).


    As you enter the URLs, they appear in the URLs to Scan list.
  5. In the Scanning Certification section, you must select the checkbox to confirm that your organization has the right to scan the URLs you have provided.

After you have created the Dynamic Analysis and entered the URLs to scan, you can optionally provide more configuration information for each URL. If your analysis has several URLs, use the search box to find the one you want to configure.

  1. Click Configure at the bottom of the page.
  2. Click the pencil icon at the end of URL row to edit a specific URL configuration.
    There are several options you can change, such as the allowlist, blocklist, and user agent.
  3. In the Blocklist tab of the URL-Specific Blocklist and Allowlist section, click Exclude the following URLs to create a blocklist.

    If you want to ensure that Veracode does not scan specific URLs, you can add them to the analysis blocklist by selecting the option Exclude the following URLs. Enter the filepath or directory path of the URLs you want to exclude from this analysis. If you enter a directory path, everything in that directory and its subdirectories are excluded. You must include the slash at the end of the URL for the analysis to consider it a directory instead of a file.

    Based on the information in the following example, the Dynamic Analysis scan engine excludes the URL https://example.com/purchasing.



  4. Add allowed host URLs in the Allowlist tab to ensure Veracode can scan the entire application.
    By default, the Dynamic Analysis scan engine scans all subdirectories under the top-level domain. Because Veracode does not automatically scan the subdomains, you can include them in the scope of the scan by specifying them in the Allowlist tab. You can also change the scope of the URL scan by excluding the HTTP or HTTPS versions.
    In the following example, by adding https://api.example.com/mydir/v1, the subdirectory /mydir/v1 in the subdomain api is now in scope. If you want to scan all subdirectories under api, omit the subdirectory and just add https://api.example.com. Veracode recommends that you only add the specific subdirectories that you want to scan instead of adding the entire directory.


  5. When you are ready to run it, you can start your Dynamic Analysis immediately or schedule it to run at a date up to 60 days in the future.

    By default, your Dynamic Analysis is not scheduled. If you do not want to schedule your Dynamic Analysis, when you review and submit it a prescan runs that provides feedback in the Prescan Results tab of the Dynamic Analysis summary page.

    To schedule a Dynamic Analysis for a date in the future:
    1. After you create or configure the Dynamic Analysis, click Schedule at the bottom of the screen.
    2. In the Schedule section, select Once.
    3. Click the calendar icon and select the date on which you want the scan to start.
    4. In the Analysis Duration field, enter the maximum number of days you want the Dynamic Analysis to run.
    5. Click Review and Submit to start your Dynamic Analysis.


    From the All Dynamic Analysis Scans list, you can review the schedule of any Dynamic Analysis by clicking the clock icon in the row for that Dynamic Analysis. The respective schedule appears, providing at-a-glance information.

  6. Go to the Dynamic Analysis Scans page, which lists all your scans and their statuses.
  7. From the Actions menu at the end of the row, click View Results.


    You must have the Creator, Reviewer, or Security Lead role to be able to view the results of a Dynamic Analysis, unless the results are linked to an application to which you have permission to view.
    The results open in the Triage Flaws view of the selected Dynamic Analysis, listing all the vulnerabilities found and the details.


  8. You can link results from a Dynamic Analysis to an application profile to evaluate the results against policy, and see the results for all types of scans of the application aggregated in a single report.
    You must have the Security Lead, Creator, or Submitter user role to be able to link results. You can only link the results of one URL configuration to an application.
  9. Go to the Dynamic Analysis Results tab of the analysis summary page, and select Actions > Link to Application.
    The Link to Application window opens.
  10. Select the application you want to link to from the list. You cannot select an application that is already linked to a URL configuration.
  11. Click Save.
In addition, now that you have linked the results, you can access the Links Report for Dynamic Analysis
If you require more detailed documentation, refer to the Dynamic Analysis guide.