Creating a Network Perimeter Security Scan
Overview
This guide explains how to create a Network Perimeter Risk scan in DeepTraQ. Network perimeter scanning helps security teams identify exposed services, open ports, and vulnerabilities across publicly accessible infrastructure.
DeepTraQ simplifies perimeter security by allowing teams to quickly configure and automate scans against external assets. These scans help organizations detect misconfigurations, exposed services, and vulnerabilities before attackers can exploit them.
With automated scanning and reporting, security teams can:
- Identify exposed ports and services on public IP addresses
- Detect known vulnerabilities mapped to CVEs
- Monitor external attack surfaces continuously
- Receive automated reports and vulnerability summaries
Supported Platforms
- Public IP addresses
- Hostnames resolving to public infrastructure
Prerequisites
- Target public IP addresses or hostnames available for scanning
- Permission to create scans in DeepTraQ
- Network assets accessible from the scanning engine
Limitations
| Limitation | Description |
|---|---|
| Supported Protocol | Only TCP-based scanning is currently supported |
| Target Scope | Only public IP addresses or externally accessible hosts can be scanned |
| Maximum Targets | Up to 1000 hosts can be scanned in a single scan |
| Scan Duration | Scans may stop automatically if execution exceeds configured runtime limits |
Steps
-
Navigate to Scans → Create Scan.
-
Select Network Perimeter Risk as the scan type.
-
Enter the scan details:
- Provide a Scan Name
- Add a Description
- Select the Environment (Development, Pre-production, or Production)
- Add Tags for easier identification and tracking.
-
Open the Advanced configuration section to configure scanner settings.
-
Define the scan targets:
- Enter IP addresses or hostnames manually, or
- Upload a file containing multiple targets for large environments.
-
Continue to the Scanner Selection step.
-
Choose the security scanning tool used to perform the scan.
-
Select the scan type depending on your requirements. Options may include:
- Port discovery
- Network scanning
- Vulnerability assessment
- Web threat detection
-
Configure scan behavior and data retention settings:
- Enable Top Port Scanning
- Enable Aggressive Vulnerability Checks
- Enable Artifact Storage to retain scan evidence.
-
Proceed to the Scheduling and Notification section.
-
Choose how the scan should run:
- Run immediately
- Schedule a one-time scan
- Configure a recurring scan schedule
-
Enable email notifications to receive summarized findings and executive summaries when vulnerabilities are detected.
-
Review the scan configuration and click Run Scan to activate the network perimeter scan.
Field Reference
| Field | Description | Example |
|---|---|---|
| Scan Name | Name used to identify the scan | External Perimeter Scan |
| Description | Optional explanation of the scan purpose | Weekly external network scan |
| Environment | Environment classification for the scan targets | Production |
| Tags | Labels used to organize scans | External Assets |
| Targets | Public IP addresses or hostnames included in the scan | 203.0.113.25 |
| Scanner Tool | Security scanner used to perform the scan | Network Scanner |
| Scan Type | Defines how the scan will analyze the targets | Vulnerability Assessment |
| Scheduling | Determines when the scan runs | Weekly |
| Notifications | Email alerts sent when vulnerabilities are detected | Enabled |