File Upload
Overview
Network Perimeter Scanning in DeepTraq helps identify exposed services, open ports, and potential security risks across your external infrastructure. These scans allow security teams to detect vulnerabilities in publicly accessible systems before they can be exploited.
By performing regular network perimeter scans, organizations can monitor their external attack surface and ensure that exposed services follow security best practices.
This guide explains how to configure and run a network perimeter security scan in DeepTraq.
Prerequisites
Before starting a network perimeter scan, ensure the following:
- Active DeepTraq user account
- Permission to create and run security scans
- Target host IP addresses available for scanning
- Network access configured for vulnerability assessment
Accessing Network Perimeter Scans
To begin a network perimeter scan:
- Navigate to Network Security → Perimeter Scans
- Click Start New Scan
- Configure the scan details
- Add target host information
- Select the scan type
- Start the scan
Creating a Network Perimeter Scan
Start a new scan to identify exposed services and security risks within your network infrastructure.
Steps
- Navigate to Network Security → Perimeter Scans
- Click Start New Scan
- Enter the required scan details:
- Scan Name – Provide a clear name for the scan.
- Description – Add a short description to identify the scan's purpose.
- Environment – Specify the environment you want to assess (e.g., production, staging, development).
- Tags (Optional) – Add tags to organize and categorize your scans.
- Click Next to configure target host details.
Adding Target Hosts
Specify the host IP addresses you want to scan to ensure an accurate network assessment.
Manually Enter IP Addresses
You can manually add host IP addresses directly into the scan configuration.
- Enter one or more IP addresses for the hosts you want to scan.
- Each IP represents a system that will be included in the network perimeter assessment.
Uploading Multiple Host IPs
For scanning multiple hosts simultaneously, you can upload a file containing a list of IP addresses.
File Requirements
- File format must be .txt
- Maximum 1000 IP addresses per file
- IP addresses can be provided:
- One IP per line, or
- Comma-separated list
Steps
- Remove any manually entered host IP addresses.
- Click Upload File
- Select a .txt file containing the IP addresses.
- Confirm the file upload.
Once uploaded, DeepTraq will automatically include all listed IPs in the scan.
Selecting the Scan Type
After adding the target hosts:
- Click Next
- Choose the scan type
- Review the scan configuration
- Start the network perimeter scan
The scan will analyze exposed services, open ports, and potential vulnerabilities across the specified hosts.
Monitoring Scan Results
After initiating the scan:
- Navigate to Network Security → Scan Results
- Monitor the scan progress
- Review identified vulnerabilities and exposed services
- Follow recommended remediation steps
DeepTraq provides actionable insights to help security teams quickly identify and mitigate network security risks.
Best Practices
To maintain a secure network perimeter:
- Regularly scan external-facing systems
- Monitor exposed ports and services
- Restrict unnecessary public access
- Patch identified vulnerabilities promptly
- Review scan findings and remediation recommendations