{"id":63082,"date":"2026-04-25T09:50:16","date_gmt":"2026-04-25T16:50:16","guid":{"rendered":"https:\/\/sn1persecurity.com\/wordpress\/documentation\/usage\/"},"modified":"2026-04-25T09:50:16","modified_gmt":"2026-04-25T16:50:16","slug":"usage","status":"publish","type":"page","link":"https:\/\/sn1persecurity.com\/wordpress\/documentation\/usage\/","title":{"rendered":"Usage"},"content":{"rendered":"<div class=\"sn-breadcrumb\"><a href=\"\/wordpress\/documentation\/\">Documentation<\/a><span class=\"sep\">\/<\/span><span>Usage<\/span><\/div>\n<p>Sn1per Professional 2026 exposes three interfaces: a web UI (primary), a CLI (<code>sniper<\/code> command), and a JSON API.<\/p>\n<h2 id=\"web-ui\">Web UI<\/h2>\n<p>The web UI is served on HTTPS port 1337. Log in as <code>admin<\/code> with the password from <code>\/usr\/share\/sniper\/pro\/data\/.admin-password<\/code>.<\/p>\n<h3 id=\"workspace-navigator\">Workspace Navigator<\/h3>\n<p>The landing page after login. One row per workspace (target). Each row shows:<\/p>\n<ul>\n<li>Target hostname or IP<\/li>\n<li>Host count and scan mode<\/li>\n<li>Finding counts by severity (Critical \/ High \/ Medium \/ Low \/ Info)<\/li>\n<li>Last scan timestamp<\/li>\n<li>Quick links to the workspace report and individual host reports<\/li>\n<\/ul>\n<p>Actions:<\/p>\n<ul>\n<li><strong>New Workspace<\/strong> \u2014 create an empty workspace for a target<\/li>\n<li><strong>Delete Workspace<\/strong> \u2014 remove a workspace and its loot<\/li>\n<li><strong>Import<\/strong> \u2014 import findings from a JSON\/CSV report<\/li>\n<li><strong>Config Editor<\/strong> \u2014 open the scan-config editor drawer (top-right gear icon)<\/li>\n<\/ul>\n<h3 id=\"workspace-report\">Workspace Report<\/h3>\n<p>Per-workspace summary dashboard. Sections:<\/p>\n<ul>\n<li>Severity gauges with risk score<\/li>\n<li>Host list (click to drill into host report)<\/li>\n<li>Findings table (DataTables: sort, filter, export)<\/li>\n<li>Scan history with status (running \/ completed \/ failed)<\/li>\n<li>Screenshots gallery<\/li>\n<li>Subdomains \/ ports \/ technologies<\/li>\n<li>Notes (editable in the Notes drawer \u2014 see below)<\/li>\n<\/ul>\n<h3 id=\"host-report\">Host Report<\/h3>\n<p>Per-host detail page. Shows:<\/p>\n<ul>\n<li>Open ports with service version detection<\/li>\n<li>Vulnerability findings parsed from sc0pe output<\/li>\n<li>Technology fingerprints<\/li>\n<li>Screenshots<\/li>\n<li>OSINT and threat-intel data<\/li>\n<li>Subdomain takeovers (if present)<\/li>\n<li>DNS records<\/li>\n<\/ul>\n<h3 id=\"top-bar-drawer\">Top-bar drawer<\/h3>\n<p>A universal slide-over drawer replaces older modal flows. It&#8217;s used for:<\/p>\n<ul>\n<li><strong>Notes editor<\/strong> \u2014 per-workspace free-form notes (Markdown-flavored). Edit with a live Save\/Delete control.<\/li>\n<li><strong>Scheduled tasks<\/strong> \u2014 view daily\/weekly\/monthly schedules; click <strong>Edit<\/strong> on a schedule row to open the text editor inside the same drawer, so the workspace context is preserved.<\/li>\n<li><strong>Config editor<\/strong> \u2014 edit <code>sniper.conf<\/code> or any template under <code>\/usr\/share\/sniper\/conf\/<\/code>. Save \/ Delete buttons persist changes.<\/li>\n<li><strong>Scan tasks<\/strong> \u2014 running and historical tasks for the current workspace, with a &#8220;Kill&#8221; action per running task.<\/li>\n<\/ul>\n<p>All drawer-based editors save via AJAX to the same backend used by the full-page editors; saves are atomic and CSRF-protected.<\/p>\n<h3 id=\"quick-commands-sidebar\">Quick Commands sidebar<\/h3>\n<p>Offcanvas sidebar (right edge of workspace pages) with one-click access to:<\/p>\n<ul>\n<li><strong>Scan commands<\/strong> \u2014 start new scans in any of the 27 modes<\/li>\n<li><strong>Bruteforce<\/strong> \u2014 credential-test launcher (FTP, SSH, HTTP, SMB, MySQL, PostgreSQL, RDP, VNC)<\/li>\n<li><strong>Fuzzer<\/strong> \u2014 URL \/ parameter \/ payload fuzzing<\/li>\n<li><strong>MassPwn<\/strong> \u2014 exploit-module picker for multi-target exploitation<\/li>\n<li><strong>OSINT<\/strong> \u2014 passive collection modules<\/li>\n<li><strong>Credentials<\/strong> \u2014 stored credentials browser<\/li>\n<li><strong>Notifications<\/strong> \u2014 Slack \/ SMTP alert configuration<\/li>\n<li><strong>Refresh<\/strong> \u2014 re-read loot from disk without rescanning<\/li>\n<\/ul>\n<h3 id=\"dark-light-theme\">Dark \/ light theme<\/h3>\n<p>A moon icon in the navbar toggles themes. The choice persists per-browser in localStorage.<\/p>\n<h2 id=\"cli\">CLI<\/h2>\n<p>The <code>sniper<\/code> command is on <code>$PATH<\/code> after install. Run as root (or via <code>sudo<\/code>) for raw-socket scan features.<\/p>\n<h3 id=\"scan-a-single-target\">Scan a single target<\/h3>\n<pre><code class=\"language-bash\">sudo sniper -t target.com -m normal\nsudo sniper -t 10.0.0.5  -m stealth\nsudo sniper -t https:\/\/app.target.com -m web\n<\/code><\/pre>\n<h3 id=\"scan-a-list\">Scan a list<\/h3>\n<pre><code class=\"language-bash\">sudo sniper -f targets.txt -m airstrike\n<\/code><\/pre>\n<h3 id=\"27-scan-modes\">27 scan modes<\/h3>\n<table>\n<thead>\n<tr>\n<th>Mode<\/th>\n<th>Purpose<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><code>normal<\/code><\/td>\n<td>Full recon + vulnerability scan (default)<\/td>\n<\/tr>\n<tr>\n<td><code>stealth<\/code><\/td>\n<td>Passive, low-noise scan<\/td>\n<\/tr>\n<tr>\n<td><code>airstrike<\/code><\/td>\n<td>Mass scan from <code>-f targets.txt<\/code><\/td>\n<\/tr>\n<tr>\n<td><code>nuke<\/code><\/td>\n<td>Aggressive vuln + exploit (authorized targets only)<\/td>\n<\/tr>\n<tr>\n<td><code>discover<\/code><\/td>\n<td>Subnet discovery<\/td>\n<\/tr>\n<tr>\n<td><code>port<\/code> \/ <code>fullportonly<\/code><\/td>\n<td>TCP port scan (top ports \/ full 1-65535)<\/td>\n<\/tr>\n<tr>\n<td><code>osscan<\/code><\/td>\n<td>OS fingerprinting<\/td>\n<\/tr>\n<tr>\n<td><code>recon<\/code><\/td>\n<td>Recon + OSINT, no active vuln scanning<\/td>\n<\/tr>\n<tr>\n<td><code>web<\/code> \/ <code>webporthttp<\/code> \/ <code>webporthttps<\/code> \/ <code>webscan<\/code><\/td>\n<td>Web-focused variants<\/td>\n<\/tr>\n<tr>\n<td><code>bruteforce<\/code><\/td>\n<td>Credential testing<\/td>\n<\/tr>\n<tr>\n<td><code>massportscan<\/code> \/ <code>massweb<\/code> \/ <code>masswebscan<\/code> \/ <code>massvulnscan<\/code><\/td>\n<td>Mass variants<\/td>\n<\/tr>\n<tr>\n<td><code>vulnscan<\/code><\/td>\n<td>Vulnerability scanning only<\/td>\n<\/tr>\n<tr>\n<td><code>fly<\/code><\/td>\n<td>Flyover (quick triage across many hosts)<\/td>\n<\/tr>\n<tr>\n<td><code>import<\/code> \/ <code>importurls<\/code> \/ <code>importdomains<\/code><\/td>\n<td>Import external target lists<\/td>\n<\/tr>\n<tr>\n<td><code>urlscan<\/code> \/ <code>massurlscan<\/code><\/td>\n<td>URL-level scanning<\/td>\n<\/tr>\n<tr>\n<td><code>corsscan<\/code><\/td>\n<td>CORS misconfiguration scan<\/td>\n<\/tr>\n<tr>\n<td><code>masspwn<\/code><\/td>\n<td>Mass exploitation<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Run <code>sniper -h<\/code> for the full flag reference. Common flags:<\/p>\n<table>\n<thead>\n<tr>\n<th>Flag<\/th>\n<th>Purpose<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><code>-t TARGET<\/code><\/td>\n<td>Single target<\/td>\n<\/tr>\n<tr>\n<td><code>-f FILE<\/code><\/td>\n<td>Target list file<\/td>\n<\/tr>\n<tr>\n<td><code>-m MODE<\/code><\/td>\n<td>Scan mode<\/td>\n<\/tr>\n<tr>\n<td><code>-w WORKSPACE<\/code><\/td>\n<td>Named workspace (defaults to target)<\/td>\n<\/tr>\n<tr>\n<td><code>-c CONFIG<\/code><\/td>\n<td>Override <code>sniper.conf<\/code><\/td>\n<\/tr>\n<tr>\n<td><code>-o<\/code><\/td>\n<td>Out-of-scope override<\/td>\n<\/tr>\n<tr>\n<td><code>-s SLACK<\/code><\/td>\n<td>Slack channel<\/td>\n<\/tr>\n<tr>\n<td><code>--export DIR<\/code><\/td>\n<td>Export results to a directory<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3 id=\"inside-a-docker-container\">Inside a Docker container<\/h3>\n<pre><code class=\"language-bash\">docker exec sn1per-pro sniper -t target.com -m normal\ndocker exec -it sn1per-pro bash      # interactive shell\n<\/code><\/pre>\n<h2 id=\"json-api\">JSON API<\/h2>\n<p>Sn1per Pro ships a JSON API at <code>\/pro\/api.php<\/code> for programmatic access. Authentication is either HTTP Digest (same as web UI) or an <code>X-API-Key<\/code> header.<\/p>\n<p>Example: list workspaces<\/p>\n<pre><code class=\"language-bash\">curl -k --digest -u admin:PASSWORD \n  https:\/\/127.0.0.1:1337\/pro\/api.php?action=workspaces\n<\/code><\/pre>\n<p>Example: query vulnerabilities for a workspace<\/p>\n<pre><code class=\"language-bash\">curl -k -H 'X-API-Key: YOUR_KEY' \n  &quot;https:\/\/127.0.0.1:1337\/pro\/api.php?action=vulns&amp;workspace=target.com&quot;\n<\/code><\/pre>\n<p>Supported actions include <code>workspaces<\/code>, <code>hosts<\/code>, <code>vulns<\/code>, <code>scan-status<\/code>, and cache management. See <code>pro\/api.php<\/code> for the full action catalog.<\/p>\n<h2 id=\"scheduled-tasks\">Scheduled Tasks<\/h2>\n<p>Recurring scans are backed by plain bash scripts under <code>\/usr\/share\/sniper\/loot\/workspace\/&lt;target&gt;\/scans\/scheduled\/<\/code>:<\/p>\n<ul>\n<li><code>daily.sh<\/code><\/li>\n<li><code>weekly.sh<\/code><\/li>\n<li><code>monthly.sh<\/code><\/li>\n<\/ul>\n<p>Edit them from the web UI (Scheduled Tasks drawer \u2192 <strong>Edit<\/strong> per schedule) or directly with any text editor. The installer does not configure a cron entry on your behalf \u2014 wire these scripts into cron or systemd timers yourself:<\/p>\n<pre><code class=\"language-cron\"># Example: run daily.sh for target.com every day at 03:00\n0 3 * * * \/usr\/share\/sniper\/loot\/workspace\/target.com\/scans\/scheduled\/daily.sh\n<\/code><\/pre>\n<h2 id=\"reporting-export\">Reporting &amp; Export<\/h2>\n<h3 id=\"from-the-web-ui\">From the web UI<\/h3>\n<p>Each workspace has an <strong>Export<\/strong> dropdown (top-right of the workspace report). Formats:<\/p>\n<ul>\n<li>CSV (findings table)<\/li>\n<li>Excel (.xlsx)<\/li>\n<li>PDF<\/li>\n<li>HTML advisory report<\/li>\n<li>JSON<\/li>\n<\/ul>\n<h3 id=\"from-the-cli\">From the CLI<\/h3>\n<pre><code class=\"language-bash\">sudo sniper --export \/tmp\/target-export target.com\n<\/code><\/pre>\n<h3 id=\"import-findings-into-another-workspace\">Import findings into another workspace<\/h3>\n<pre><code class=\"language-bash\">sudo sniper -t target.com -m import -f \/tmp\/target-export\/findings.json\n<\/code><\/pre>\n<h2 id=\"updating\">Updating<\/h2>\n<p>To pull the latest scan engine within your license term:<\/p>\n<pre><code class=\"language-bash\">sudo sniper --update\n<\/code><\/pre>\n<p>The update function contacts the Sn1per update server, verifies your license, and downloads the latest scan engine bundle. Pro web UI updates are pulled separately and bundled with your next installation refresh.<\/p>\n<h2 id=\"stopping-starting-apache\">Stopping \/ Starting Apache<\/h2>\n<pre><code class=\"language-bash\">sudo systemctl stop apache2     # stop the web UI\nsudo systemctl start apache2    # start it again\nsudo systemctl restart apache2  # full restart\nsudo systemctl reload apache2   # config-only reload (after editing sniper.conf \/ settings.php)\n<\/code><\/pre>\n<p>Inside a Docker container, Apache is PID 1 (or started by the activation script). <code>docker stop sn1per-pro<\/code> \/ <code>docker start sn1per-pro<\/code> is the equivalent.<\/p>\n<h2 id=\"see-also\">See Also<\/h2>\n<ul>\n<li><a href=\"\/wordpress\/documentation\/docker\/\">Docker<\/a> \u2014 container workflow, compose, volumes<\/li>\n<li><a href=\"\/wordpress\/documentation\/configuration\/\">Configuration<\/a> \u2014 all <code>sniper.conf<\/code> \/ <code>settings.php<\/code> options<\/li>\n<li><a href=\"\/wordpress\/documentation\/architecture\/\">Architecture<\/a> \u2014 how the scan engine and web UI fit together<\/li>\n<li><a href=\"\/wordpress\/documentation\/installation\/\">Installation<\/a> \u2014 license management, deregistration<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Documentation\/Usage Sn1per Professional 2026 exposes three interfaces: a web UI (primary), a CLI (sniper command), and a JSON API. Web UI The web UI is served on HTTPS port 1337.\u2026<\/p>\n","protected":false},"author":0,"featured_media":0,"parent":2284,"menu_order":40,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-doc-page.php","meta":{"om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-63082","page","type-page","status-publish","hentry"],"aioseo_notices":[],"jetpack_shortlink":"https:\/\/wp.me\/PdnW96-gps","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":63083,"url":"https:\/\/sn1persecurity.com\/wordpress\/documentation\/architecture\/","url_meta":{"origin":63082,"position":0},"title":"Architecture","author":"","date":"April 25, 2026","format":false,"excerpt":"Documentation\/Architecture Sn1per Professional 2026 pairs a bash-based scan engine with a modernized PHP web UI on Apache, and optionally integrates with an AI \/ RAG stack for augmented analysis. This doc describes how the components fit together. High-level stack Browser (HTTPS :1337) | v Apache 2.4 --- Digest Auth ---\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":63079,"url":"https:\/\/sn1persecurity.com\/wordpress\/documentation\/getting-started\/","url_meta":{"origin":63082,"position":1},"title":"Getting Started","author":"","date":"April 25, 2026","format":false,"excerpt":"Documentation\/Getting Started This guide gets you from a fresh system to a running Sn1per Pro instance in under 20 minutes. For deeper coverage, see Installation and Configuration. Prerequisites A 64-bit Linux host (Kali Rolling recommended; Ubuntu 22.04+, Debian 12+, and Parrot OS also supported) Root or passwordless sudo access 4\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":15174,"url":"https:\/\/sn1persecurity.com\/wordpress\/command-execution-add-on-v2-0-documentation\/","url_meta":{"origin":63082,"position":2},"title":"Command Execution Add-on v2.0 Documentation","author":"xer0dayz","date":"March 2, 2021","format":false,"excerpt":"The Command Execution Add-on v2.0 lets you easily manage your Sn1per Professional instance from a web interface without ever touching the command line. Help Topics Single Target Scan Multi-Target Scan Subnet Scan Custom Target Scan Mass URL Scan Importing URL's Single Target Scan To scan a single target from scratch\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/Sn1per-Professional-v9.0-single-target-scan3.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/Sn1per-Professional-v9.0-single-target-scan3.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/Sn1per-Professional-v9.0-single-target-scan3.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/Sn1per-Professional-v9.0-single-target-scan3.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/Sn1per-Professional-v9.0-single-target-scan3.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/Sn1per-Professional-v9.0-single-target-scan3.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":15264,"url":"https:\/\/sn1persecurity.com\/wordpress\/fuzzer-add-on-v1-0-documentation\/","url_meta":{"origin":63082,"position":3},"title":"Fuzzer Add-on v1.0 Documentation","author":"xer0dayz","date":"March 12, 2021","format":false,"excerpt":"Automatically fuzz for OWASP TOP 10 vulnerabilities and discover hidden content easily with the new Sn1per Professional Fuzzer Add-on! Features Automatically fuzz dynamic URL\u2019s for OWASP TOP 10 vulnerabilities. Discover hidden content in a target environment. Spider all URL\u2019s within a target environment. Single & built-in multi target selections. Customized\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-fuzzer4b.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-fuzzer4b.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-fuzzer4b.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-fuzzer4b.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-fuzzer4b.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-fuzzer4b.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":15439,"url":"https:\/\/sn1persecurity.com\/wordpress\/workspace-report-documentation\/","url_meta":{"origin":63082,"position":4},"title":"Workspace Report Documentation","author":"xer0dayz","date":"February 9, 2022","format":false,"excerpt":"About The Workspace Report provides high level stats on each workspace and allows easy sorting, filtering and viewing of all assets within a workspace. To view the Workspace Report for a specific workspace, click on the workspace name that you would like to view from the Workspace Navigator. Top Menu\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"sn1per-professional-v9.0-attack-surface-discovery2","src":"https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery2.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery2.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery2.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery2.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery2.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery2.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":15425,"url":"https:\/\/sn1persecurity.com\/wordpress\/workspace-navigator-documentation\/","url_meta":{"origin":63082,"position":5},"title":"Workspace Navigator Documentation","author":"xer0dayz","date":"April 14, 2021","format":false,"excerpt":"About The Workspace Navigator is the initial screen displayed when accessing the Sn1per Professional web UI (ie. https:\/\/127.0.0.1:1337) which lists all workspaces within Sn1per. This provides high level stats on each workspace and allows easy sorting, filtering and viewing of each workspace. To view the Workspace Report for a specific\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/Sn1per-Professional-v9.0-workspace-navigator-split-view1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/Sn1per-Professional-v9.0-workspace-navigator-split-view1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/Sn1per-Professional-v9.0-workspace-navigator-split-view1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/Sn1per-Professional-v9.0-workspace-navigator-split-view1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/Sn1per-Professional-v9.0-workspace-navigator-split-view1.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/Sn1per-Professional-v9.0-workspace-navigator-split-view1.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/pages\/63082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/types\/page"}],"replies":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/comments?post=63082"}],"version-history":[{"count":0,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/pages\/63082\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/pages\/2284"}],"wp:attachment":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/media?parent=63082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}