How Scheduled Assessments Work
When a scheduled assessment runs, Neo brings everything it knows about your environment into the session. It references findings from previous runs, focuses on areas that have changed since the last assessment, and deepens testing in areas where it previously identified risk. Each run builds on the last. A weekly assessment in week one might map your full attack surface and identify a set of initial findings. By week four, Neo already knows your architecture, skips redundant discovery, focuses on what’s changed, and tests deeper into areas where it found interesting behavior before. By week ten, you have a continuously updated picture of your security posture that no point-in-time pentest can match.What Happens During a Scheduled Run
Neo loads context from previous runs
Before testing begins, Neo pulls in its accumulated knowledge of your environment: services, architecture, naming conventions, previous findings, and areas flagged for follow-up. This means every scheduled run starts where the last one left off.
Neo identifies what's changed
Neo compares the current state of your attack surface against what it knew from previous assessments. New endpoints, changed configurations, updated dependencies, and recently deployed code are prioritized for testing.
Neo tests and validates
The assessment runs using Neo’s full range of capabilities: terminal access, browser automation, API testing, code analysis, and more. All execution happens inside isolated sandboxes. Every finding is validated with a working exploit before it’s reported.
Neo checks for regressions
Previously fixed vulnerabilities are automatically retested to confirm they remain resolved. If a regression appears — a vulnerability that was fixed but has resurfaced — Neo flags it immediately with updated evidence.
Setting Up a Schedule
Define the scope
Tell Neo what to assess. This can be as broad as your entire staging environment or as focused as a single API or service. You can also provide specific instructions, such as focusing on authentication flows, testing recently changed endpoints, or running a full pentest.Example instructions:
Set the cadence
Choose how often the assessment runs:
| Cadence | Best for |
|---|---|
| Daily | Lightweight reconnaissance, infrastructure monitoring, exposed service detection |
| Weekly | Comprehensive application assessments, full stack pentesting, compliance checks |
| On deploy | Triggered automatically when new code deploys to a connected environment |
| Custom interval | Any cadence you define — every 6 hours during a rollout, biweekly deep assessments, or continuous with a configurable delay between runs |
Configure notifications
Choose where results are delivered:
- Slack — assessment summaries, critical findings, and regression alerts sent to your configured channels
- Linear or Jira — findings created as trackable issues with full evidence attached
- Email — summary reports delivered to your team on completion

