Skip to main content

Viewing Network Perimeter Scan Results

Overview

This guide explains how to view and analyze Cloud Workload scan results in DeepTraQ. Once a scan is completed, DeepTraQ consolidates all findings into a unified dashboard that helps security teams quickly understand the security posture of their cloud-hosted workloads.

The results interface allows teams to:

  • Review all Cloud Workload scans from a centralized dashboard
  • Identify vulnerable workloads, services, and exposed configurations
  • Analyze vulnerabilities mapped to CVE identifiers
  • Inspect detailed technical evidence behind findings
  • Filter and prioritize vulnerabilities based on severity and risk score
  • Track vulnerability trends across historical workload scans

This centralized view enables faster investigation and prioritization of risks affecting cloud infrastructure and hosted applications.


Prerequisites

  • A completed Cloud Workload scan
  • Access to the DeepTraQ scanning dashboard
  • Permissions to view scan results and vulnerability data

Limitations

LimitationDescription
Supported WorkloadsResults are generated only for configured cloud workloads and instances included in the scan scope
Data ScopeFindings are based on reachable services and detected vulnerabilities within the scanned workloads

Steps

  1. Navigate to Scans Dashboard to view all configured Cloud Workload scans.

  2. Review the scan list, where each scan displays:

    • Scan status
    • Total vulnerabilities discovered
    • Severity distribution
    • Scan execution health
  3. Select a completed scan to open its detailed results.

  4. Review the discovered workloads and services, including detected instances, services, and exposed ports.

  5. Open the Vulnerabilities section to view all detected issues across scanned workloads.

  6. Each vulnerability entry includes:

    • Severity level
    • Affected workload or instance
    • Associated service or port
    • CVE identifiers
  7. Select a vulnerability to view detailed technical information, including:

    • Vulnerability description
    • Impact analysis
    • Mitigation guidance
    • Reference links
    • Security scoring
  8. Review the Raw Output section to examine the evidence captured during the scan, such as service responses, configurations, and detected algorithms.

  9. Navigate to the Asset View to inspect the complete security profile of a specific workload or cloud instance.

  10. Open the Host Summary to view all vulnerabilities, exposed services, and configuration findings associated with that workload.

  11. Use filters to narrow down findings based on:

  • Severity
  • Workload or instance
  • CVE score
  • Scan history
  • Issue status
  • Accepted risk
  1. Open Advanced Filters to focus on high-risk vulnerabilities.

  2. Select the severity threshold, such as Critical, to isolate vulnerabilities requiring urgent remediation.

  3. Apply the filters to generate a focused list of actionable security issues.

  4. Review the Summary view to obtain a high-level snapshot of the scan results, including:

  • Total findings
  • Exposed services across workloads
  • Number of affected instances
  • CVE distribution
  1. Select a specific workload or instance to drill down into vulnerabilities affecting that asset.

  2. Navigate to the Scan History tab to review previous scan executions.

  3. Compare historical scans to identify newly introduced vulnerabilities and measure remediation progress over time.


Field Reference

FieldDescriptionExample
Scan StatusIndicates the state of the scanCompleted
FindingsTotal number of vulnerabilities detected32
SeverityRisk level assigned to the vulnerabilityCritical
WorkloadCloud workload or instance affected by the vulnerabilityweb-server-01
ServiceService or port where the vulnerability was detectedHTTPS (443)
CVEIdentifier for known vulnerabilitiesCVE-2023-12345
Raw OutputTechnical evidence collected during scanningService response details
Host SummaryOverview of vulnerabilities and services detected on a workloadWorkload security profile
Scan HistoryHistorical list of previous scans for comparisonWeekly workload scan history