Vulnerability Scan in Progress
The Vulnerability Scan in Progress page provides real-time insights into ongoing vulnerability scans. This view allows administrators to monitor scan progress, analyze partial results, and manage actions such as pausing or canceling scans to accommodate system maintenance needs. Below is an overview of the functionality and information available in this section
- User Manual
- Agents
- The Cyber Risk Assessment Process
- API Documents
- General Questions and Troubleshooting
- The Cyber Risk Assessment Process (Video Tutorials)
- Sales and Prospecting Articles
- CYRISMA Partner Portal Access
- Glossary
- CYRISMA Change Log
- Support Ticket SLA
- Onboarding Framework
- PSA Integrations
- Billing Questions
- Self Onboarding Guide
Table of Contents
Real-Time Scan Monitoring
The Vulnerability Scan in Progress table displays all active scans with live updates. Each row in the table represents an individual scan, showing key details such as:
- Scan Name: Unique identifier for the scan, set at creation.
- Issued By: The user who initiated the scan.
- Completed Targets: Number of targets that have been fully scanned so far.
- Current Targets: Any grouped scans or specific targets being assessed.
- Severity Counts: Real-time count of vulnerabilities found, categorized into Total, Low, Medium, High, and Critical.
- Progress: A visual progress bar indicating the scan completion percentage.
- Elapsed Time: Tracks how long the scan has been running.

Viewing More Results: By default, only a few entries are displayed. You can adjust the number of visible scans using the drop-down list or locate specific scans via the search bar.
Scan Actions
Administrators have the following actions available directly from the scan table:
- Pause: Temporarily halts the scan, which is useful for maintenance or prioritizing other tasks. The scan can be resumed later.
- Cancel: Stops the scan entirely. This action is permanent and cannot be undone.

These actions offer flexibility, allowing scans to be managed in alignment with operational demands or system constraints.
Viewing Detailed Scan Progress
Expanding a scan in the table provides a more detailed view of its current state. This includes:
- Scan Progress Summary: Provides an overview of the scan’s status (e.g., in progress, completed).
- Agent Information: Shows the specific agent group conducting the scan.
- Vulnerability Split: Displays a graphical breakdown of vulnerabilities by severity. This visualization may initially show “No data to display” until vulnerabilities are detected.
- Vulnerability Breakdown: A bar chart detailing vulnerabilities per target, highlighting which systems are most impacted.

These visual components allow for a quick assessment of the security posture of each target in real time.
Key Scan Details
Below the graphical displays, additional scan details include:
- Number of Vulnerabilities Found: Running total of detected vulnerabilities, updated as the scan progresses.
- Scan Risk Grade: Preliminary risk grade based on current findings and the vulnerability scan profile in use.
- Vulnerability Scan Profile Used: Indicates the scan profile (e.g., “MS Windows 11”) applied for this assessment, which determines what vulnerabilities the scan seeks to identify.
This summary information is essential for quickly understanding the scope and severity of issues uncovered so far.
Refresh and Auto-Update
The page auto-updates periodically to provide the latest scan data. However, administrators can manually refresh the page using the Refresh button at the top to retrieve the most current information instantly. This is especially useful for monitoring high-priority scans.
Deeper Dive into Vulnerabilities
For a detailed examination of each detected vulnerability:
- Expand the row of a specific target within the Vulnerability Breakdown.
- View additional information for each vulnerability, such as:
- Description: Explanation of the vulnerability and its potential impact.
- Reference Link: URL for further details, allowing administrators to research mitigation steps.
This granular view aids in understanding individual vulnerabilities and prioritizing actions based on severity.
The Vulnerability Scan in Progress page is an essential tool for tracking scan activity, assessing initial findings, and managing scan execution in real time, giving administrators full control over the security scanning process.