Skip to main content

Viewing Scan Results

Access comprehensive vulnerability findings and detailed analysis after your scans complete. The scan results interface provides multiple views to help you understand, prioritize, and remediate security issues.

Accessing Scan Results

  1. Navigate to Vulnerability Management in the sidebar
  2. Select your vulnerability assessment type (e.g., Network Perimeter Risks)
  3. Click on the Scans tab
  4. Click on any completed scan project to view its results

Alternatively, click "Go to Scans / [scan-name]" link from dashboard views or navigate through breadcrumbs: Home > Vulnerability > [Assessment Type]


Results Dashboard Overview

The Vulnerability Dashboard displays all findings from your selected scan with multiple tabs for different analysis views:

Available Tabs

  • Summary: High-level overview with key metrics and statistics
  • Vulnerabilities: Detailed list of all security findings
  • AI Reports: AI-generated analysis and recommendations
  • Port Scan: Open ports and service detection results
  • Triage: Vulnerability management and workflow
  • Network Topology: Visual network map of scanned infrastructure
  • Attack Surface: External exposure and risk analysis
  • Compare Scans: Historical comparison between scan runs
  • Patch Fix: Remediation tracking and patch management
  • History: Complete timeline of scan activities

Summary Tab

Provides a quick overview of scan results with key metrics and visualizations.

Key Metrics Cards

Total Findings: Shows the total number of vulnerabilities discovered across all severity levels.

Critical Findings: Displays count of critical severity vulnerabilities requiring immediate attention.

Open Ports: Number of open network ports discovered, representing potential entry points.

Total Ports: Total number of ports scanned, showing overall scan coverage.

CVE List Section

Displays all Common Vulnerabilities and Exposures (CVE) identifiers found in the scan. Use these standardized references to cross-reference with public vulnerability databases and track remediation across systems.

Findings Count Visualization

Semi-circular gauge chart showing vulnerability distribution across severity levels (Critical, High, Medium, Low). Provides quick visual assessment of risk severity distribution to help prioritize remediation efforts.


Vulnerabilities Tab

Comprehensive, filterable list of all security findings discovered during the scan.

Search more Targets: Filter vulnerabilities by specific hosts or targets.

Search Previous Scans: View findings from historical scans and track remediation progress.

Severity Filter: Checkboxes to filter by severity levels (Critical, High, Medium, Low, Informational).

Vulnerability Cards

Each vulnerability displays:

  • Title and Description: Clear name and technical details
  • Time Discovered: When the vulnerability was found
  • Affected Host: IP address or hostname
  • Version Information: Affected software version
  • CVE IDs: Associated CVE identifiers with links
  • Severity Badge: Color-coded severity indicator
  • Action Buttons:
    • Details: View comprehensive vulnerability information
    • Output: Access technical scan output and raw findings
    • Icons: Close/dismiss, flag for review, add comments, additional options

Port Scan Tab

Detailed information about all ports and services discovered during network scanning.

Port Scan Table

Displays comprehensive table with the following columns:

IP Address: Clickable IP addresses to view all findings for specific hosts.

Port: Port numbers showing standard and high ports.

State: Current port status (open, closed, filtered).

Protocol: Network protocol in use (tcp, udp, https-alt).

Service: Service name running on the port (ssh, http, postgresql, etc.).

Product: Specific software product and version information.

Version: Detailed software version numbers including OS details.

CPE: Common Platform Enumeration standardized identifiers for matching vulnerabilities.

Table Features

  • Sorting: Click column headers to sort data
  • Pagination: Adjustable rows per page with navigation controls
  • Search: Find specific ports, services, or products

Network Topology Tab

Visual representation of scanned infrastructure showing relationships between hosts, services, and network segments.

Visualization Features

  • Interactive Network Map: Color-coded nodes representing different services and protocols
  • Zoom Controls: Plus (+), minus (-), and reset view buttons
  • Pan/Drag: Click and drag to navigate the map
  • Node Labels: Service names, port numbers, and IP addresses
  • Connection Lines: Show relationships between services and hosts with port labels

Use Cases

  • Identify network architecture and service distribution
  • Visualize attack paths and dependencies
  • Document network configurations
  • Plan security improvements and network segmentation

Attack Surface Tab

Visualizes external exposure by mapping the relationship between scanner and target hosts.

Visualization

Simple two-node diagram showing:

  • Scanner Server: Represents the scanning system
  • Target Host: Shows the scanned IP address
  • Connection Line: Displays scanning relationship

Controls

  • Full screen toggle
  • Zoom in/out
  • Reset view

Purpose

Shows external exposure, potential attack paths, and helps identify internet-facing systems for perimeter security assessment.


Compare Scans Tab

Analyze changes in security posture by comparing results from different scan executions.

Scan Selection

  • Compare Scan: Select recent scan date/time
  • Previous Scan: Select earlier scan to compare against
  • Display Options: Toggle summary and detailed vulnerability views

Comparison Metrics

Summary Cards: Show changes in Total Findings, Critical, Open Ports, and Total Ports with percentage change indicators.

Visualizations:

  • Commonly Found Open Ports: Donut chart comparing current vs. previous scan
  • Finding Count by Severity: Bar chart showing side-by-side comparison across severity levels

Detailed Tables:

  • Previous and current scan port listings
  • Removed vulnerabilities table showing successfully remediated issues

Patch Fix Tab

Manage and track remediation efforts for discovered vulnerabilities.

Patch Fix Table

Displays remediation tracking with the following columns:

Patch Fix Name: Descriptive name for the fix (expandable for details).

Created On: Date and time the patch fix was created.

Status: Current remediation status with color-coded badges (Pending, In Progress, Complete, Blocked).

Tags: Colored tag pills for categorization and organization.

Actions: Play button to execute patch, delete button, and additional options menu.

Features

  • Add Button: Create new patch fix entries
  • Search: Find specific patches
  • Refresh: Update patch fix statuses
  • Pagination: Navigate through multiple entries

Workflow

Create patch fixes, track progress through status updates, document remediation activities, and mark as complete when resolved.


Additional Tabs

AI Reports: AI-generated analysis, executive summaries, and remediation recommendations.

Triage: Manage vulnerability workflow, assign findings, set priorities, and track progress.

History: Complete timeline of scan activities, changes, and audit logs.