Skip to main content

Viewing Network Perimeter Scan Results

Overview

This guide explains how to view and analyze Network Perimeter Risk scan results in DeepTraQ. Once a scan is completed, DeepTraQ consolidates all findings into a unified dashboard that helps security teams quickly understand their external security posture.

The results interface allows teams to:

  • Review all perimeter scans from a centralized dashboard
  • Identify exposed services, ports, and vulnerable hosts
  • Analyze vulnerabilities mapped to CVEs
  • Inspect detailed technical evidence behind findings
  • Filter and prioritize vulnerabilities based on severity
  • Track vulnerability trends across historical scans

This centralized view enables faster investigation and prioritization of risks affecting public-facing infrastructure.


Prerequisites

  • A completed Network Perimeter Risk scan
  • Access to the DeepTraQ scanning dashboard
  • Permissions to view scan results and vulnerability data

Limitations

LimitationDescription
Supported ProtocolOnly TCP-based findings are currently displayed
Target ScopeResults are generated only for public IP addresses or externally reachable hosts

Steps

  1. Navigate to Scans Dashboard to view all configured network perimeter scans.

  2. Review the scan list, where each scan displays:

    • Scan status
    • Total vulnerabilities discovered
    • Severity distribution
    • Scan execution health
  3. Select a completed scan to open its detailed results.

  4. Review the discovered assets and services, including detected hosts and open ports.

  5. Open the Vulnerabilities section to view all detected issues across scanned assets.

  6. Each vulnerability entry includes:

    • Severity level
    • Affected asset or IP address
    • Associated port or service
    • CVE identifiers
  7. Select a vulnerability to view detailed technical information, including:

    • Vulnerability description
    • Impact analysis
    • Mitigation guidance
    • Reference links
    • Security scoring
  8. Review the Raw Output section to examine the evidence captured during the scan, such as service responses, configurations, and detected algorithms.

  9. Navigate to the Asset View to inspect the complete security profile of a specific host.

  10. Open the Host Summary to view all vulnerabilities, open ports, and configurations associated with that asset.

  11. Use filters to narrow down findings based on:

  • Severity
  • Target asset
  • CVE score
  • Scan history
  • Issue status
  • Accepted risk
  1. Open Advanced Filters to focus on high-risk vulnerabilities.

  2. Select the severity threshold such as Critical to isolate vulnerabilities requiring urgent remediation.

  3. Apply the filters to generate a focused list of actionable security issues.

  4. Review the Summary view to obtain a high-level snapshot of the scan results, including:

  • Total findings
  • Open ports across hosts
  • Number of affected systems
  • CVE distribution
  1. Select a specific IP address to drill down into vulnerabilities affecting that host.

  2. Navigate to the Scan History tab to review previous scan executions.

  3. Compare historical scans to identify newly introduced vulnerabilities and measure remediation progress over time.

Field Reference

FieldDescriptionExample
Scan StatusIndicates the state of the scanCompleted
FindingsTotal number of vulnerabilities detected32
SeverityRisk level assigned to the vulnerabilityCritical
AssetPublic IP or host affected by the vulnerability203.0.113.10
PortNetwork port where the service was detected443
CVEIdentifier for known vulnerabilitiesCVE-2023-12345
Raw OutputTechnical evidence collected during scanningService response details
Host SummaryOverview of vulnerabilities and services detected on a hostHost security profile
Scan HistoryHistorical list of previous scans for comparisonWeekly perimeter scan history