Viewing Network Perimeter Scan Results
Overview
This guide explains how to view and analyze Cloud Workload scan results in DeepTraQ. Once a scan is completed, DeepTraQ consolidates all findings into a unified dashboard that helps security teams quickly understand the security posture of their cloud-hosted workloads.
The results interface allows teams to:
- Review all Cloud Workload scans from a centralized dashboard
- Identify vulnerable workloads, services, and exposed configurations
- Analyze vulnerabilities mapped to CVE identifiers
- Inspect detailed technical evidence behind findings
- Filter and prioritize vulnerabilities based on severity and risk score
- Track vulnerability trends across historical workload scans
This centralized view enables faster investigation and prioritization of risks affecting cloud infrastructure and hosted applications.
Prerequisites
- A completed Cloud Workload scan
- Access to the DeepTraQ scanning dashboard
- Permissions to view scan results and vulnerability data
Limitations
| Limitation | Description |
|---|---|
| Supported Workloads | Results are generated only for configured cloud workloads and instances included in the scan scope |
| Data Scope | Findings are based on reachable services and detected vulnerabilities within the scanned workloads |
Steps
-
Navigate to Scans Dashboard to view all configured Cloud Workload scans.
-
Review the scan list, where each scan displays:
- Scan status
- Total vulnerabilities discovered
- Severity distribution
- Scan execution health
-
Select a completed scan to open its detailed results.
-
Review the discovered workloads and services, including detected instances, services, and exposed ports.
-
Open the Vulnerabilities section to view all detected issues across scanned workloads.
-
Each vulnerability entry includes:
- Severity level
- Affected workload or instance
- Associated service or port
- CVE identifiers
-
Select a vulnerability to view detailed technical information, including:
- Vulnerability description
- Impact analysis
- Mitigation guidance
- Reference links
- Security scoring
-
Review the Raw Output section to examine the evidence captured during the scan, such as service responses, configurations, and detected algorithms.
-
Navigate to the Asset View to inspect the complete security profile of a specific workload or cloud instance.
-
Open the Host Summary to view all vulnerabilities, exposed services, and configuration findings associated with that workload.
-
Use filters to narrow down findings based on:
- Severity
- Workload or instance
- CVE score
- Scan history
- Issue status
- Accepted risk
-
Open Advanced Filters to focus on high-risk vulnerabilities.
-
Select the severity threshold, such as Critical, to isolate vulnerabilities requiring urgent remediation.
-
Apply the filters to generate a focused list of actionable security issues.
-
Review the Summary view to obtain a high-level snapshot of the scan results, including:
- Total findings
- Exposed services across workloads
- Number of affected instances
- CVE distribution
-
Select a specific workload or instance to drill down into vulnerabilities affecting that asset.
-
Navigate to the Scan History tab to review previous scan executions.
-
Compare historical scans to identify newly introduced vulnerabilities and measure remediation progress over time.
Field Reference
| Field | Description | Example |
|---|---|---|
| Scan Status | Indicates the state of the scan | Completed |
| Findings | Total number of vulnerabilities detected | 32 |
| Severity | Risk level assigned to the vulnerability | Critical |
| Workload | Cloud workload or instance affected by the vulnerability | web-server-01 |
| Service | Service or port where the vulnerability was detected | HTTPS (443) |
| CVE | Identifier for known vulnerabilities | CVE-2023-12345 |
| Raw Output | Technical evidence collected during scanning | Service response details |
| Host Summary | Overview of vulnerabilities and services detected on a workload | Workload security profile |
| Scan History | Historical list of previous scans for comparison | Weekly workload scan history |