Creating Scans
Learn how to set up and configure security scans in DeepTraq to identify vulnerabilities across your infrastructure.
DeepTraq's scanning capabilities allow you to perform comprehensive security assessments across different areas of your infrastructure. You can create scans from any vulnerability management module including Device Risks, Network Perimeter Risks, Cloud Workload Risks, Code Vulnerabilities, and more.
Accessing the Scan Creation Interface
Navigation Path
- Navigate to Vulnerability Management in the sidebar
- Select any vulnerability assessment type (e.g., Network Perimeter Risks, Device Risks, etc.)
- Click on the Scans tab in the dashboard
- Click the Create Scan button in the top-right corner
The Vulnerability Dashboard displays all your existing scans with:
- Project names and associated tags
- Number of scans performed
- Total findings count
- Current status indicators
- Severity breakdown (Critical, High, Medium, Low)
Creating a New Scan
Basic Configuration
Scan Name
Provide a descriptive name for your scan to easily identify it later.
Description
Add detailed context about the scan purpose, scope, or any special considerations for your team members.
Hosts
- Enter the target hosts or IP addresses for scanning
- Press Enter after each host to add it to the list
- Standard License: Up to 250 hosts per scan
- Upgraded License: Up to 1000 hosts per scan
- For larger environments, create multiple scans or upgrade your license
Tags
- Add up to 10 tags to organize and categorize your scans
- Type a tag name and press Enter to add it
- Tags help filter and search for scans later
Security Scan Types
Choose one or more scan types based on your security assessment needs:
Port Scan & Discovery Scan
Identifies open, closed, or filtered ports on target devices to expose potential entry points for attackers. This scan examines network services like HTTP, SSH, FTP, and other protocols to map your network attack surface.
Advanced Network Scan
Maps your network infrastructure to identify exposed services and devices. Detects unpatched services and network misconfigurations across TCP/UDP ports, providing deep visibility into your network security posture.
Complete Vulnerability Assessments
Performs comprehensive security checks on devices with security agents installed. Compares against vulnerability databases like CVE (Common Vulnerabilities and Exposures) to ensure patch compliance and identify known security weaknesses.
OWASP Top 10 Check
Targets web applications and APIs to identify vulnerabilities from the OWASP Top 10 list, including:
- SQL Injection
- Cross-Site Scripting (XSS)
- Broken Authentication
- Security Misconfigurations
- And other critical web application vulnerabilities
Rapid Web Threat, Misconfig & CVE Scanner
Quick assessment for web applications focusing on common threats, configuration issues, and known CVE vulnerabilities. Ideal for fast security checks during development or deployment cycles.
Scan Settings
Configure when and how your scan should run:
Immediate Execution
Run the scan immediately
- Scan starts as soon as you click Save
- Ideal for on-demand security assessments
- Results available in real-time
Scheduled Scan
Schedule Scan at given time and run only once
- Set a specific date and time for the scan
- Useful for scheduling scans during maintenance windows
- Runs once at the specified time
Periodic Scanning
Perform periodic scanning for new vulnerabilities
Configure recurring scans with the following options:
- Frequency of scan: Choose from Daily, Weekly, or Monthly intervals
- Start day: Select which day to begin the scan (e.g., Sunday, Monday, etc.)
- Start time: Set the specific time for the scan to run
- Immediate launch: Option to run a device scan immediately and follow the schedule for subsequent scans
Email Notifications
Trigger Email When Scan is done with Summary findings
- Enable email notifications upon scan completion
- Send to default logged-in user
- Add up to 5 additional email addresses for notifications
- Receive summary of findings directly in your inbox
Scan Options
Fine-tune your scan behavior with advanced options:
Network Scanning Options
- Scan Top TCP Ports: Scan the top 1000 TCP ports or IANA assigned ports for comprehensive coverage
- Run vulnerability scripts aggressively: Execute all vulnerability detection scripts with aggressive settings during Advanced Network Scan for thorough testing
- Aggressively scan website for OWASP top 10: Perform intensive testing for OWASP vulnerabilities with comprehensive attack vectors
Data Collection
- Save vulnerabilities with information/log level: Store detailed logs and information-level findings for comprehensive analysis
- Save all scan artifacts for later reference: Preserve complete scan data including raw outputs and technical details
Performance Tuning
- Set The Spider Time (Crawl URLs): Configure web crawler timing (default: 1 Minute)
- Adjust based on website size and complexity
- Longer times = more thorough web application scanning
AI Assistant Options
Leverage AI-powered reporting for automated insights and analysis:
Enable Automatic AI Report Generation
When enabled, DeepTraq's AI Assistant automatically generates comprehensive reports after each scan completes. Choose from the following report types:
Executive Summary for Management
- High-level overview of security posture
- Business impact assessment
- Risk prioritization for decision-makers
- Non-technical language suitable for executives
Remediation Report
- Step-by-step fix instructions
- Prioritized action items
- Resource requirements and timelines
- Implementation guidance
Summary of Vulnerabilities
- Consolidated list of all findings
- Severity-based categorization
- Affected assets and services
- Quick reference for security teams
Asset Exposure Analysis
- Internet-facing assets inventory
- Attack surface evaluation
- Exposed services and ports
- Risk analysis by asset type
Technical Report of Vulnerabilities
- Detailed technical findings
- CVE references and CVSS scores
- Proof of concept details
- Advanced remediation techniques
Saving and Running Your Scan
- Review all configuration settings
- Click the Save button to create the scan
- The scan will execute based on your scheduling settings
- Monitor progress from the Vulnerability Dashboard
Creating Scans in Other Modules
The same scan creation process applies to all vulnerability management modules:
- Device Risks: Scan endpoints, servers, and IoT devices
- Cloud Workload Risks: Assess cloud infrastructure and virtual machines
- Code Vulnerabilities: Scan source code repositories and dependencies
- Container Scanning: Check container images and registries
- Web Applications: Test web apps and APIs
- Cloud Misconfigurations: Audit cloud resource configurations
Each module follows the same workflow but may offer module-specific scan types and options relevant to that security domain.
y