ZAP Security Scanning: A Step-by-Step Setup Guide
When securing your application, OWASP ZAP (Zed Attack Proxy) is an essential tool for identifying vulnerabilities and potential security risks. This guide walks you through the process of setting up and configuring ZAP for effective security scanning, including proxy configuration, certificate installation, and performing scans.

Downloading and Installing ZAP
To begin securing your application, download and install ZAP 2.7.0 from the official OWASP ZAP Download page. After installation, you can start the setup process and secure your web applications.
Setting Up ZAP Proxy and Browser Configuration
To monitor web traffic for security threats, you’ll need to configure ZAP as a proxy between the browser and the application. This allows you to inspect web requests and identify vulnerabilities. Here’s how you can set it up:
- Install ZAP’s Root Certificate
Open ZAP and navigate toTools > Options > Dynamic SSL Certificate. Click on Generate to create the certificate, then save and import it into your browser to enable secure communication with ZAP. - Configure Proxy in ZAP
Go toTools > Options > Local Proxyin ZAP and set the proxy port (commonly8081). - Update Browser Proxy Settings
In your browser, set the proxy to manual configuration and use the same port number configured in ZAP.
Capturing Application Flow for Security Scanning
Once the proxy is configured, you can begin browsing the application while ZAP captures the traffic. This allows ZAP to focus on the specific areas of your app that need security testing.
- As you browse, ZAP will list the URLs in a tree structure under the Sites menu.
- If the app uses multiple domains (internal or external), ZAP will separate them, allowing you to remove irrelevant ones.
Configuring ZAP for Active Security Scanning
With application flows captured, you can configure ZAP for in-depth vulnerability scanning.
- Set Default Context
Right-click the domain or URL you want to scan and select Include in Context to mark it for scanning. - Enable Protected Mode
Select Protected Mode from the File Menu to limit scans to the URLs in the context, ensuring targeted and secure tests.
Configuring the Spider for Deeper Crawling
To run a comprehensive scan, first set up the Spider to crawl the website and gather all relevant data.
- Right-click on the part of the application you want to test and choose Attack > Spider.
- Set the maximum depth for the crawl (recommended depth: 9).
- After the spider crawl, you’ll have all the necessary pages for the scan.
Performing the Active Scan
After the spider crawl, you can proceed with the Active Scan to identify security issues in your application.
- Initiate Active Scan
Right-click the URL or domain under the Sites menu and select Attack > Active Scan. - Customize Scan Settings
In the Active Scan Pane, select which vulnerabilities to focus on, such as Injection and Cross-Site Scripting (XSS), by checking the relevant options. - Complete the Scan
Once the scan is finished, ZAP will show detected vulnerabilities and risks in the Alert Section.
Final Thoughts: Secure Your Application with ZAP
By following these steps, you can configure ZAP to run comprehensive security scans on your application. From proxy configuration to active scanning, ZAP helps you identify vulnerabilities and protect your web applications effectively.
If you need expert guidance or support, ZippyOPS offers consulting, implementation, and managed services for enhancing your DevSecOps practices, automating operations, and securing cloud infrastructures. Learn more about our DevOps consulting services and cloud security solutions.
To discuss your security needs, contact us at sales@zippyops.com.



