Endpoint Discovery
After you connect your apps, Metlo scans your API traffic to give an overview of all your endpoints, the type of data they contain, whether they are authenticated or not and if they contain sensitive data. You can use endpoint discovery to find every API endpoint in your organization. This can guide your security program and can also surface endpoints that you didn’t even know existed.
Endpoint Overview
The endpoints page shows an overview of your endpoints and hosts. By default they are sorted “riskiest” first, where the endpoints with the most sensitive data are the riskiest endpoints. You can filter this list by:
- Host
- Risk Score
- Sensitive Data Classes
- Authenticated/Unauthenticated
Endpoint Details
Each endpoint has a detail view where you can dig deeper into its characteristics. This page shows you the following details:
- Number of PII Fields
- Usage history
- The last time this endpoint was used
- Authenticated/Unauthenticated
- Risk Score
- Generated Open API Spec
The Detected Fields tab lets you dig deeper into specific parts of the request and response. You can correct any errors in sensitive data classification on this page as well.
Traces
If you’re investigating an issue, Metlo stores traces so you can dig into what traffic your endpoint is receiving. Traces more than an hour old are automatically deleted.