Viewing Network Perimeter Scan Results
Overview
This guide explains how to view and analyze Network Perimeter Risk scan results in DeepTraQ. Once a scan is completed, DeepTraQ consolidates all findings into a unified dashboard that helps security teams quickly understand their external security posture.
The results interface allows teams to:
- Review all perimeter scans from a centralized dashboard
- Identify exposed services, ports, and vulnerable hosts
- Analyze vulnerabilities mapped to CVEs
- Inspect detailed technical evidence behind findings
- Filter and prioritize vulnerabilities based on severity
- Track vulnerability trends across historical scans
This centralized view enables faster investigation and prioritization of risks affecting public-facing infrastructure.
Prerequisites
- A completed Network Perimeter Risk scan
- Access to the DeepTraQ scanning dashboard
- Permissions to view scan results and vulnerability data
Limitations
| Limitation | Description |
|---|---|
| Supported Protocol | Only TCP-based findings are currently displayed |
| Target Scope | Results are generated only for public IP addresses or externally reachable hosts |
Steps
-
Navigate to Scans Dashboard to view all configured network perimeter scans.
-
Review the scan list, where each scan displays:
- Scan status
- Total vulnerabilities discovered
- Severity distribution
- Scan execution health
-
Select a completed scan to open its detailed results.
-
Review the discovered assets and services, including detected hosts and open ports.
-
Open the Vulnerabilities section to view all detected issues across scanned assets.
-
Each vulnerability entry includes:
- Severity level
- Affected asset or IP address
- Associated port or service
- CVE identifiers
-
Select a vulnerability to view detailed technical information, including:
- Vulnerability description
- Impact analysis
- Mitigation guidance
- Reference links
- Security scoring
-
Review the Raw Output section to examine the evidence captured during the scan, such as service responses, configurations, and detected algorithms.
-
Navigate to the Asset View to inspect the complete security profile of a specific host.
-
Open the Host Summary to view all vulnerabilities, open ports, and configurations associated with that asset.
-
Use filters to narrow down findings based on:
- Severity
- Target asset
- CVE score
- Scan history
- Issue status
- Accepted risk
-
Open Advanced Filters to focus on high-risk vulnerabilities.
-
Select the severity threshold such as Critical to isolate vulnerabilities requiring urgent remediation.
-
Apply the filters to generate a focused list of actionable security issues.
-
Review the Summary view to obtain a high-level snapshot of the scan results, including:
- Total findings
- Open ports across hosts
- Number of affected systems
- CVE distribution
-
Select a specific IP address to drill down into vulnerabilities affecting that host.
-
Navigate to the Scan History tab to review previous scan executions.
-
Compare historical scans to identify newly introduced vulnerabilities and measure remediation progress over time.
Field Reference
| Field | Description | Example |
|---|---|---|
| Scan Status | Indicates the state of the scan | Completed |
| Findings | Total number of vulnerabilities detected | 32 |
| Severity | Risk level assigned to the vulnerability | Critical |
| Asset | Public IP or host affected by the vulnerability | 203.0.113.10 |
| Port | Network port where the service was detected | 443 |
| CVE | Identifier for known vulnerabilities | CVE-2023-12345 |
| Raw Output | Technical evidence collected during scanning | Service response details |
| Host Summary | Overview of vulnerabilities and services detected on a host | Host security profile |
| Scan History | Historical list of previous scans for comparison | Weekly perimeter scan history |