Security Headers Scanner
Automated weekly validation of your security headers configuration with zero code implementation required.
Key features
No JWT token required
Works independently of CSP monitoring
Automatic weekly scans
Email notifications for header issues
Step-by-Step Setup
Create Page Monitor
Go to Monitor > Pages in the console
Click "+ New Page Monitor"
Configure the page information:
Name:
Monitor my Checkout PageDescription: Description of your payment page
Base URL:
https://your-site.com/checkout(your payment page)
Enable Scan Headers
Navigate to your page configuration
Enable the toggle "Scan Headers"
Select the security headers you want to monitor (up to 16 available). For more information about our available headers please go to Supported Security Headers
Configure expected values for each header
Configure notifications:
Add email addresses that will receive alerts
The account owner's email is automatically included
Save the configuration
Verify Your Headers
Important: Firstoken Monitor will validate that your server is already sending the configured headers. Ensure your application/server is properly configured to send these security headers.
Scan Scheduling: After saving your configuration, the first security headers scan will be scheduled to run the following day in the morning. Subsequent scans will run automatically on a weekly basis.
Note: Scans are not immediate. Allow 24 hours for your first scan to complete. You will receive an email notification if any header misconfigurations or issues are detected.
Supported Security Headers
Content-Security-Policy (CSP)
Controls script, style, iframe loading policy (XSS, skimming, MITM protection)
Content-Security-Policy-Report-Only
CSP testing mode (sends violation reports without blocking)
Report-To
Defines endpoint for CSP violation reports
Reporting-Endpoints
Latest version for centralizing security reports (CSP, COOP, CORP, etc.)
Cross-Origin-Embedder-Policy (COEP)
Isolates resources and documents to prevent Spectre-like attacks
Cross-Origin-Opener-Policy (COOP)
Restricts cross-origin window communication
Cross-Origin-Resource-Policy (CORP)
Prevents cross-origin resources from being loaded by other domains
Origin-Agent-Cluster
Origin isolation in modern browsers
Strict-Transport-Security (HSTS)
Enforces HTTPS usage and prevents HTTP downgrade
Upgrade-Insecure-Requests
Forces browsers to convert HTTP requests to HTTPS
Permissions-Policy
Restricts browser APIs (e.g., geolocation, camera, microphone)
Referrer-Policy
Controls Referer information exposed in outgoing requests
X-Frame-Options
Prevents site loading in malicious iframes (clickjacking protection)
X-Content-Type-Options
Prevents MIME sniffing attacks
X-XSS-Protection
Configures browser XSS filters
X-Permitted-Cross-Domain-Policies
Restricts Flash/Adobe data access
Configuration Example
During setup, select the header to configure ann assign the expected value:
Comparison with Other Monitor Features
Resources and Script Inventory works alongside other Firstoken Monitor security tools:
CSP Real-Time Monitoring
Detect runtime security violations
JavaScript code + CSP headers
Real-time continuous
Security Headers Scanner
Validate HTTP security headers
None
Weekly automated
Resources Inventory
Manage JavaScript and CSS inventory
None
Weekly automated
Each feature addresses different security and compliance requirements and can be used independently or together for comprehensive protection.
Last updated