Skip to main content

Creating a Network Perimeter Security Scan

Overview

This guide explains how to create a Network Perimeter Risk scan in DeepTraQ. Network perimeter scanning helps security teams identify exposed services, open ports, and vulnerabilities across publicly accessible infrastructure.

DeepTraQ simplifies perimeter security by allowing teams to quickly configure and automate scans against external assets. These scans help organizations detect misconfigurations, exposed services, and vulnerabilities before attackers can exploit them.

With automated scanning and reporting, security teams can:

  • Identify exposed ports and services on public IP addresses
  • Detect known vulnerabilities mapped to CVEs
  • Monitor external attack surfaces continuously
  • Receive automated reports and vulnerability summaries

Supported Platforms

  • Public IP addresses
  • Hostnames resolving to public infrastructure

Prerequisites

  • Target public IP addresses or hostnames available for scanning
  • Permission to create scans in DeepTraQ
  • Network assets accessible from the scanning engine

Limitations

LimitationDescription
Supported ProtocolOnly TCP-based scanning is currently supported
Target ScopeOnly public IP addresses or externally accessible hosts can be scanned
Maximum TargetsUp to 1000 hosts can be scanned in a single scan
Scan DurationScans may stop automatically if execution exceeds configured runtime limits

Steps

  1. Navigate to Scans → Create Scan.

  2. Select Network Perimeter Risk as the scan type.

  3. Enter the scan details:

    • Provide a Scan Name
    • Add a Description
    • Select the Environment (Development, Pre-production, or Production)
    • Add Tags for easier identification and tracking.
  4. Open the Advanced configuration section to configure scanner settings.

  5. Define the scan targets:

    • Enter IP addresses or hostnames manually, or
    • Upload a file containing multiple targets for large environments.
  6. Continue to the Scanner Selection step.

  7. Choose the security scanning tool used to perform the scan.

  8. Select the scan type depending on your requirements. Options may include:

    • Port discovery
    • Network scanning
    • Vulnerability assessment
    • Web threat detection
  9. Configure scan behavior and data retention settings:

    • Enable Top Port Scanning
    • Enable Aggressive Vulnerability Checks
    • Enable Artifact Storage to retain scan evidence.
  10. Proceed to the Scheduling and Notification section.

  11. Choose how the scan should run:

  • Run immediately
  • Schedule a one-time scan
  • Configure a recurring scan schedule
  1. Enable email notifications to receive summarized findings and executive summaries when vulnerabilities are detected.

  2. Review the scan configuration and click Run Scan to activate the network perimeter scan.

Field Reference

FieldDescriptionExample
Scan NameName used to identify the scanExternal Perimeter Scan
DescriptionOptional explanation of the scan purposeWeekly external network scan
EnvironmentEnvironment classification for the scan targetsProduction
TagsLabels used to organize scansExternal Assets
TargetsPublic IP addresses or hostnames included in the scan203.0.113.25
Scanner ToolSecurity scanner used to perform the scanNetwork Scanner
Scan TypeDefines how the scan will analyze the targetsVulnerability Assessment
SchedulingDetermines when the scan runsWeekly
NotificationsEmail alerts sent when vulnerabilities are detectedEnabled