Scoptera gives you a clear view of your organization's security posture. See what's been found, understand what it means, and track fixes — all in plain language.
scoptera · client security dashboard
1
Getting Started
Your Journey Begins Here
Your security consultant invites you to the platform. You'll set a password and immediately have access to your personalized security dashboard.
Invitation
Receive email link
→
Set Password
Create your account
→
Log In
Access your portal
→
Dashboard
See your security posture
How It Works
Your consultant does the scanning
Security scans run automatically on your domains. Your consultant configures everything — you don't need to install or set up anything.
You see the results
Findings appear in your dashboard with plain-language explanations, severity ratings, and step-by-step remediation guidance.
Your Navigation
Dashboard
Your security overview
Findings
Vulnerabilities found
Assets
Your monitored infrastructure
Reports
Downloadable PDF reports
Settings
Notification preferences
2
Your Dashboard
Security Overview
The first thing you see when you log in. A snapshot of your entire security posture at a glance — your risk score, urgent issues, and what's being monitored.
73
Risk Score
Improving
Urgent Findings
Critical and high-severity issues that need your attention. When there are none, you'll see a green "all clear" banner.
Activity Feed
Recent security events — new findings detected, issues resolved, scans completed. Keeps you informed of changes.
Attack Surface Stats
5
Domains
2
Expiring Certs
14
Open Ports
7
Open Findings
3
Security Findings
What We Found
Findings are security issues discovered during scans. Each one comes with an explanation of what's wrong, why it matters, and how to fix it.
Severity Levels
Critical
Immediate risk, needs urgent attention
High
Significant risk, fix soon
Medium
Moderate risk, plan a fix
Low
Minor issue, fix when possible
Findings List
Browse all findings with filters for severity and status. Each row shows the finding title, how many places it was found, and when it was last seen. Click any row for details.
Finding Detail
Each finding includes three sections:
What is wrong — a clear description,
Why it matters — the business impact,
How to fix — step-by-step remediation instructions.
Consultant notes — Your security consultant may add custom notes to specific findings. These appear alongside the automated remediation guidance, giving you tailored advice for your specific environment.
4
Taking Action
Responding to Findings
When you see a finding, you can update its status to track your remediation progress. Here's what each status means:
flowchart LR
open["Open"] --> progress["In Progress"]
progress --> fixed["Fixed"]
open --> fp["False Positive"]
fixed --> verified["Verified"]
classDef openCls fill:#a1620722,stroke:#a16207,stroke-width:2px
classDef progressCls fill:#0891b222,stroke:#0891b2,stroke-width:2px
classDef fixedCls fill:#04785722,stroke:#047857,stroke-width:2px
classDef fpCls fill:#64748b22,stroke:#64748b,stroke-width:1.5px
classDef verifiedCls fill:#1e3a5f22,stroke:#1e3a5f,stroke-width:2px
class open openCls
class progress progressCls
class fixed fixedCls
class fp fpCls
class verified verifiedCls
What You Can Do
Open
New findings start here. No action taken yet.
In Progress
Mark when your team starts working on a fix.
Fixed
Mark when you've applied the fix. This automatically triggers a verification scan.
False Positive
Mark if you believe this isn't a real vulnerability.
Auto-Verification
Fix Verification
When you mark a finding as "Fixed", Scoptera automatically runs a targeted re-scan to verify the vulnerability has been resolved. You'll see the verification status update once the check completes.
Your consultant handles the rest. They can override severities, add risk-accepted statuses, and adjust findings based on their expert assessment.
5
Your Assets
What We're Monitoring
Your asset inventory shows everything Scoptera has discovered about your internet-facing infrastructure. This is your attack surface — what attackers can see.
Domains
Your root domains
Subdomains
Discovered hosts
IP Addresses
Resolved servers
Web Servers
HTTP services
What You'll See
Each asset shows its type, value (domain name or IP), and when it was last seen. Click to expand and see detected technologies (like Apache, MySQL, WordPress) and open ports with service details.
Why It Matters
Knowing what's exposed is the first step to security. Unexpected subdomains, old servers still running, or services on unusual ports could all be entry points. Your consultant uses this data to focus scans where they matter most.
6
Reports
Security Reports
Download PDF reports summarizing your security posture. Your consultant generates detailed reports, and you can also generate your own executive summaries.
Executive Summary
High-level overview for management. Risk score, key findings, remediation priorities — no technical jargon.
Technical Details
Comprehensive findings report with CVSS scores, affected endpoints, evidence, and detailed remediation steps. Generated by your consultant.
Self-Service Reports
Need a quick update for a meeting? Generate an executive summary yourself — one per week.
How It Works
Click "Generate Report" on the reports page. The system aggregates your latest findings, assets, and scan data into a polished PDF. It takes a few minutes — the status will update from "Generating" to "Ready" when your report is available for download.
Report Status
Pending
→
Generating
→
Ready
Your data is isolated. You can only see your own organization's data — your domains, your findings, your reports. Other clients on the platform cannot see your information, and you cannot see theirs. This is enforced at the database level, not just in the application.
Need help? If you need your password reset or have questions about a finding, contact your security consultant. They can generate a password reset link, add notes to findings, or schedule additional scans of your infrastructure.