Go to Intruder
All Collections
Cloud targets
Cloud targets
How to add and manage your cloud targets in Intruder
11 articles in this collection
Written by
Daniel Andrew,
Patrick Craston,
and
Naomi Purvis
How to integrate with your cloud accounts
AWS integration
Connect Intruder to AWS to synchronise your targets
Written by
Patrick Craston
Updated over a week ago
Microsoft Azure integration
Connect Intruder to Microsoft Azure to synchronise your targets
Written by
Patrick Craston
Updated over a week ago
GCP (Google Cloud Platform) integration
Connect Intruder to Google Cloud Platform to synchronise your targets
Written by
Patrick Craston
Updated over a week ago
Managing your connected cloud accounts
Managing your connected AWS account
Everything you need to know about Intruder and your AWS account
Written by
Naomi Purvis
Updated over a week ago
Managing your connected Azure account
Everything you need to know about Intruder and your Azure account
Written by
Naomi Purvis
Updated over a week ago
Managing your connected GCP account
Everything you need to know about Intruder and your GCP account
Written by
Naomi Purvis
Updated over a week ago
Automation
What is CloudBot and how do I use it? 🤖
CloudBot automatically adds any new external IP addresses or hostnames in cloud accounts as Intruder targets
Written by
Patrick Craston
Updated over a week ago
Cloud account sync
Create rules so that you can choose exactly what gets pulled into Intruder from your cloud account
Written by
Naomi Purvis
Updated over a week ago
Permissions
My systems are hosted on AWS. Do I need permission before I start the scan?
Amazon Web Services (AWS) does not require permission before adding your systems as targets to the Intruder platform.
Written by
Daniel Andrew
Updated over a week ago
My systems are hosted with Microsoft Azure. Do I need permission before I start the scan?
Written by
Daniel Andrew
Updated over a week ago
My systems are hosted on Google Cloud. Do I need permission before I start the scan?
Google Cloud does not require permission before adding your systems as targets to the Intruder platform
Written by
Patrick Craston
Updated over a week ago