Skip to main content

Managing a Network Perimeter Security Scan

Overview

This guide explains how to manage Network Perimeter Risk scans in DeepTraQ. The scan dashboard provides a centralized location where security teams can monitor, control, and manage all perimeter scans across their infrastructure.

From the dashboard, teams can:

  • Monitor scan status and execution health
  • Review vulnerability findings and severity distribution
  • Update scan configurations
  • Re-run or stop scans when required
  • Download security reports for different audiences

This management interface allows security teams to quickly track their network security posture and take action when new risks are discovered.


Prerequisites

  • At least one configured Network Perimeter Risk scan
  • Access to the DeepTraQ scanning dashboard
  • Permissions to manage scans and download reports

Steps

View Scan Dashboard

  1. Navigate to the Scans Dashboard to view all configured network perimeter scans
  2. Review the scan list, where each scan displays key information including:
    • Scan status
    • Total findings
    • Severity distribution
    • Execution details

Review Scan Details

  1. Select a scan to open the scan details page
  2. Review the scan summary, which includes:
    • Scan ID
    • Job status
    • Scan start time
    • Scan duration
    • Scan age

Refresh Scan Status

  1. Use the Refresh option to retrieve the latest scan status and updates
  2. Review updated scan information on the dashboard

Run a Scan Again

  1. If required, run the scan again to perform a new security assessment on the same targets
  2. The scan will execute using the previously configured parameters

Stop a Running Scan

  1. If a scan is currently running, it can be stopped manually from the dashboard
  2. Select the stop option to halt the scan execution

Update Scan Configuration

  1. Update the scan configuration when changes are required
  2. Modify settings such as targets or scan parameters
  3. Save the updated configuration

Delete a Scan

  1. Remove scans that are no longer required to maintain a clean scan inventory
  2. Confirm deletion from the dashboard

Download Reports

  1. Download scan reports for reporting or compliance purposes
  2. Select the appropriate report format depending on the audience:
    • Executive summary reports for leadership
    • Technical reports for security engineers
    • Remediation-focused reports for operational teams

Review Vulnerabilities

  1. Open the Vulnerabilities section to review detected issues sorted by severity
  2. Prioritize remediation by focusing on critical and high severity vulnerabilities

Field Reference

FieldDescriptionExample
Scan IDUnique identifier assigned to a scanSCAN-2048
StatusIndicates the current state of the scanRunning, Completed, Failed
FindingsTotal vulnerabilities detected during the scan18
Severity DistributionBreakdown of vulnerabilities by severity levelCritical: 2, High: 5
Start TimeTimestamp when the scan started2026-03-05 11:15 UTC
DurationTotal time taken for scan execution35 minutes
AgeTime elapsed since the scan completed1 day