Managing a Network Perimeter Security Scan
Overview
This guide explains how to manage Network Perimeter Risk scans in DeepTraQ. The scan dashboard provides a centralized location where security teams can monitor, control, and manage all perimeter scans across their infrastructure.
From the dashboard, teams can:
- Monitor scan status and execution health
- Review vulnerability findings and severity distribution
- Update scan configurations
- Re-run or stop scans when required
- Download security reports for different audiences
This management interface allows security teams to quickly track their network security posture and take action when new risks are discovered.
Prerequisites
- At least one configured Network Perimeter Risk scan
- Access to the DeepTraQ scanning dashboard
- Permissions to manage scans and download reports
Steps
View Scan Dashboard
- Navigate to the Scans Dashboard to view all configured network perimeter scans
- Review the scan list, where each scan displays key information including:
- Scan status
- Total findings
- Severity distribution
- Execution details
Review Scan Details
- Select a scan to open the scan details page
- Review the scan summary, which includes:
- Scan ID
- Job status
- Scan start time
- Scan duration
- Scan age
Refresh Scan Status
- Use the Refresh option to retrieve the latest scan status and updates
- Review updated scan information on the dashboard
Run a Scan Again
- If required, run the scan again to perform a new security assessment on the same targets
- The scan will execute using the previously configured parameters
Stop a Running Scan
- If a scan is currently running, it can be stopped manually from the dashboard
- Select the stop option to halt the scan execution
Update Scan Configuration
- Update the scan configuration when changes are required
- Modify settings such as targets or scan parameters
- Save the updated configuration
Delete a Scan
- Remove scans that are no longer required to maintain a clean scan inventory
- Confirm deletion from the dashboard
Download Reports
- Download scan reports for reporting or compliance purposes
- Select the appropriate report format depending on the audience:
- Executive summary reports for leadership
- Technical reports for security engineers
- Remediation-focused reports for operational teams
Review Vulnerabilities
- Open the Vulnerabilities section to review detected issues sorted by severity
- Prioritize remediation by focusing on critical and high severity vulnerabilities
Field Reference
| Field | Description | Example |
|---|---|---|
| Scan ID | Unique identifier assigned to a scan | SCAN-2048 |
| Status | Indicates the current state of the scan | Running, Completed, Failed |
| Findings | Total vulnerabilities detected during the scan | 18 |
| Severity Distribution | Breakdown of vulnerabilities by severity level | Critical: 2, High: 5 |
| Start Time | Timestamp when the scan started | 2026-03-05 11:15 UTC |
| Duration | Total time taken for scan execution | 35 minutes |
| Age | Time elapsed since the scan completed | 1 day |