Updated PowerShell guide

Internal network visibility without guesswork

This manual explains how to use the Scantide Auditor PowerShell script to review your own networks, discover reachable hosts, identify exposed services, inspect web and TLS evidence, compare findings with CMDB data, and export clear reports that administrators can actually act on.

ScantideAuditor.ps1
PS> .\ScantideAuditor.ps1 -Network 10.24.48.0/24

Network: Manual network 10.24.48.0/24
Live hosts found: 42
! Web and TLS evidence collected
! Not in CMDB: 9

Report: NetworkScan_20260506_104830.html
AgentlessNo software on endpoints
EvidencePorts, titles, certs
CMDBFind missing assets

What changed from the old manual

The old ScantideLAN manual was useful, but it used older naming, older graphics, a few encoding-problem characters, and some wording that sounded more like vulnerability assessment than practical inventory and exposure review. This updated version focuses on the current Scantide Auditor direction.

Clearer product language

The wording now describes authorized internal visibility, service evidence, certificates, and CMDB comparison instead of broad or scary security claims.

New Scantide look

The old purple dashboard style has been replaced with the newer dark hero, rounded cards, evidence badges, and cleaner Scantide visual language.

More user-friendly explanations

Every major finding now explains why it matters for a normal administrator, not only for a technical security specialist.

What the PowerShell script does

Scantide Auditor PowerShell is an agentless script for administrators who need a practical view of what is reachable inside their own network. It does not try to exploit systems. It collects observable evidence and turns it into an HTML report.

Host discovery

Finds reachable systems in a subnet or list of networks so you can compare expected assets with what actually responds.

Service checks

Checks common ports such as web, SSH, FTP, SMTP, DNS, RDP, and alternate web ports where supported by your script build.

TLS evidence

Reviews visible certificate details such as subject, SAN names, issuer, and expiration dates on TLS-enabled services.

CMDB comparison

When enabled, compares discoveries against CMDB or ServiceNow-style inventory data to highlight known and unknown assets.

Plain-language purpose: the script helps answer simple but important questions: What is online? What ports are open? Which systems have web pages? Which certificates are expiring? Which hosts are not in the asset inventory?

Why the findings matter

A network scan report is only useful if people understand what to do with it. These explanations are written for administrators, operations teams, and managers who need clear risk context without exaggerated fear.

Unknown hosts

An unknown host may be a legitimate device, a forgotten test system, a printer, a VM, or something that was never added to inventory. It deserves review because unmanaged assets often miss patching, ownership, monitoring, and backup routines.

Open services

An open port is not automatically bad. It means a service is reachable. The important question is whether that service should be reachable on that network and whether the owning team knows about it.

Web titles and headers

Web titles, server headers, redirects, and response clues help identify admin panels, appliances, legacy portals, default pages, and services that may otherwise be hard to recognize from an IP address alone.

Certificates

Expired or soon-expiring certificates can break services, confuse users, and create avoidable incidents. Certificate subjects and SAN names can also reveal what a host was intended to be.

CMDB gaps

If a device is reachable but not in CMDB, it may be outside normal change, patch, ownership, or lifecycle processes. This is often one of the most useful operational findings.

Repeat scans

One scan gives a snapshot. Repeated scans show change: new devices, disappeared hosts, new exposed services, or certificates that are getting close to expiry.

Quick start

Use this flow when you simply want to run a safe authorized inventory scan and produce the first HTML report.

Save the script

Download the script and save it in a dedicated folder, for example C:\ScantideAuditor\. Keep reports in the same folder or in a separate report archive.

Open PowerShell as administrator

Administrator rights are not always required for basic TCP checks, but they reduce friction and help with local policy and network behavior on managed Windows systems.

Allow the script for this session

If Windows blocks unsigned local scripts, use a temporary session-level policy instead of changing the whole machine permanently.

Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass

Run a small network first

Start with a small known subnet before scanning larger ranges. This makes it easier to verify output, timing, firewall noise, and report readability.

cd C:\ScantideAuditor .\ScantideAuditor.ps1 -Network "192.168.1.0/24"

Open the HTML report

The report is normally created with a timestamped filename such as NetworkScan_YYYYMMDD_HHMMSS.html. Review unknown hosts, open services, web evidence, certificates, and CMDB status first.

Best first scan: choose a network you own and understand. Avoid starting with a very large range. A controlled first run is faster, easier to explain, and less likely to trigger avoidable firewall or monitoring alerts.

Common parameters

Exact parameters can vary between builds, but the current Scantide Auditor PowerShell family usually follows this model. Keep the manual aligned with the actual script header before publishing.

Parameter Purpose Example
-Network Scan one CIDR range. -Network "10.24.48.0/24"
-List Read multiple networks or hosts from a text file, one entry per line. -List ".\networks.txt"
-Email Identify the licensed user when API-backed or Pro features are enabled. -Email "admin@example.com"
-ApiKey Enable Scantide-backed enrichment or licensed features where supported. -ApiKey "YOUR_KEY"
CMDB options Some builds include ServiceNow or CMDB connection settings. Use these only with a read-only account where possible. -ServiceNowInstance, -CmdbToken, or build-specific equivalents
Output options Some builds allow custom output paths or report naming. If not, reports are created in the script directory. -OutputPath "C:\Scans" if supported

Single subnet

Best for normal recurring scans, troubleshooting, or checking a VLAN.

.\ScantideAuditor.ps1 -Network "10.24.48.0/24"

Multiple ranges

Best for scheduled scanning across several known networks.

# networks.txt 10.24.48.0/24 10.24.49.0/24 10.24.50.0/24 .\ScantideAuditor.ps1 -List ".\networks.txt"

How a scan works

The script uses a staged flow so the report can explain where each finding came from. The exact phases may vary by version, but the logic is generally the same.

1. Scope is prepared

The script expands the selected network or reads the list file. Large networks should be split into smaller ranges for cleaner output.

2. Hosts are checked

Reachability checks identify likely live hosts. Some networks block ping, so TCP results can still reveal active systems.

3. Ports are tested

Common ports are checked with timeouts. This is evidence of reachable services, not proof that the service is unsafe.

4. Web evidence is collected

Where web services respond, the script can collect titles, server hints, status codes, and redirect clues.

5. TLS is reviewed

For TLS-enabled services, certificate data helps identify ownership, names, expiry, and obvious maintenance issues.

6. Report is generated

The final HTML report is designed for sorting, filtering, review, and sharing with asset owners.

Understanding the HTML report

The report is the main deliverable. It should help you move from a raw scan to an action list: verify unknown hosts, fix inventory gaps, renew certificates, and remove services that should not be reachable.

Known / expected Needs review High priority Evidence only
Report field What it means How to use it
IP address / hostname The discovered endpoint and any resolved DNS name. Use it to identify the owner, location, and expected role.
Open port A network service responded on that port. Confirm whether that service should be reachable from the scanned network.
Web title / server Visible web page title, response clues, or server header where available. Useful for recognizing appliances, portals, default pages, and forgotten admin interfaces.
Certificate subject / SAN Names and identity information presented by a TLS certificate. Use it to spot expired certificates, wrong hostnames, old systems, or ownership clues.
CMDB status Whether the host appears in the connected inventory source. Prioritize hosts marked not found in CMDB for ownership and lifecycle review.
Scan duration / network Summary metadata for when and where the report was created. Important when comparing multiple reports or proving when a finding was observed.
Good report workflow: sort by CMDB status first, then certificate expiry, then open web/admin-style services. This usually finds the most practical cleanup work quickly.

CMDB and ServiceNow-style comparison

CMDB comparison is one of the most valuable parts of the Auditor workflow. It connects network reality with asset governance: what responds on the wire versus what the organization believes exists.

Known assets

Systems that appear in CMDB are easier to route to an owner. The scan evidence can still reveal services or certificates that need maintenance.

Not in CMDB

These are often the most important rows. They may be legitimate but unmanaged, or they may be old lab systems, appliances, shadow IT, or stale infrastructure.

Use read-only access

If the script connects to ServiceNow or another CMDB, use least-privilege read-only credentials and keep secrets outside shared screenshots and reports.

Important: CMDB matching depends on how your organization stores IP addresses, DNS names, device names, and retired assets. Treat mismatches as review items, not automatic proof that something is wrong.
Review context

CVE and jurisdiction checks

Use CVE and jurisdiction information as context for triage. It helps decide what to investigate first, but it does not replace verification by the system owner.

CVE checks from visible evidence

The script can collect clues such as open services, web titles, server headers, TLS certificate names and service banners. If those clues identify a product or version, they can be compared with known CVEs. Always confirm the real installed version and patch state before calling it a vulnerability.

Jurisdiction and ownership context

For public-facing domains, cloud-hosted systems or services that depend on external providers, country, ASN, provider ownership and mail routing can matter. The purpose is to support governance and data-sovereignty review, not to label a provider or country as automatically good or bad.

Safe and appropriate use

Scantide Auditor PowerShell is intended for authorized internal visibility. It should be used on networks you own, administer, or have explicit permission to assess.

Appropriate use cases

  • Internal asset inventory review
  • CMDB quality checks
  • Certificate expiry review
  • Change validation after network cleanup
  • Finding forgotten web portals or appliances

Use with care

  • Notify monitoring teams before large scans
  • Scan in smaller chunks when possible
  • Avoid fragile OT, medical, or production-sensitive networks unless approved
  • Store reports as internal data because they contain useful infrastructure details
  • Review firewall and IDS alerts generated by the scan

Performance and scan sizing

The best scan is not always the biggest scan. Smaller, predictable ranges usually produce cleaner reports and fewer operational surprises.

Start small

Use a /24 or smaller known range for the first run. Confirm that reports, sorting, and CMDB matching look right before expanding.

Split large ranges

Break /16-style scopes into multiple /24 or /22 chunks. This is easier to schedule and easier to troubleshoot if one network behaves differently.

Adjust timeouts carefully

Shorter timeouts are faster but can miss slow services. Longer timeouts are more complete but increase total run time.

# Example: scan several smaller ranges instead of one huge scan .\ScantideAuditor.ps1 -Network "10.24.48.0/24" .\ScantideAuditor.ps1 -Network "10.24.49.0/24" .\ScantideAuditor.ps1 -Network "10.24.50.0/24"

Scheduled scans

Scheduled scans are useful when you want to detect change over time: new hosts, new exposed services, disappearing systems, or certificates getting close to expiry.

Simple scheduled wrapper

Create a small wrapper script and call it from Windows Task Scheduler.

$ScriptPath = "C:\ScantideAuditor\ScantideAuditor.ps1" $Network = "10.24.48.0/24" & $ScriptPath -Network $Network

Suggested cadence

Weekly is often enough for normal internal visibility. Daily can be useful during cleanup projects, migrations, or CMDB remediation work.

  • Daily during active cleanup
  • Weekly for normal governance
  • After major firewall, VLAN, or server changes

Troubleshooting

Most problems fall into a few categories: execution policy, blocked traffic, DNS behavior, permissions, or services that do not speak standard HTTP/TLS even though a port is open.

PowerShell says scripts are disabled

Use a process-scoped execution policy for the current window.

Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass

Very few hosts are found

Ping may be blocked or routed differently. Confirm that the scanner machine can reach the target network and that local firewall rules allow outbound checks.

RDP TLS details are missing

That can be normal. RDP and NLA do not always behave like a standard HTTPS certificate check. Treat the open port as evidence, not a failed certificate scan.

Report does not open automatically

Browse to the script folder and open the newest NetworkScan_*.html file manually. On servers, default browser behavior may be restricted.

Scan is slow

Reduce scope first. If needed, adjust script timeout or parallelism settings only after confirming the network is stable and the target range is correct.

CMDB results look wrong

Check whether CMDB stores IPs, FQDNs, short hostnames, retired records, NAT addresses, or multiple interfaces differently than the scan sees them.

Best practices

These habits make the reports more useful and easier to defend when shared with asset owners or management.

Keep scope documented

Record which networks were scanned, when the scan ran, who requested it, and which machine performed the scan.

Archive reports

Keep timestamped reports so you can compare trends and prove when a host or service first appeared.

Protect output

Reports contain internal infrastructure details. Store them where only authorized teams can access them.

Assign owners

A finding without an owner often stays unresolved. Route unknown hosts and exposed services to the team responsible for the network or system.

Rescan after cleanup

After disabling a service, renewing a certificate, or adding a CMDB record, run the same scope again to verify the result.

Do not overstate results

An open port or missing CMDB record is a review signal. Use the evidence to drive verification, not blame.

FAQ

Short answers for common questions from administrators and stakeholders.

Is Scantide Auditor PowerShell an offensive security tool?

No. It is positioned as an authorized internal visibility and evidence collection tool. It checks reachability, services, web clues, TLS certificates, and inventory gaps. It should only be used on networks where you have permission.

Does an open port mean the host is vulnerable?

No. An open port means a service is reachable. The follow-up question is whether that service is expected, owned, patched, monitored, and appropriate for that network.

Why is CMDB comparison important?

Because unmanaged assets are often the root of operational and security problems. If a device exists on the network but not in inventory, it may not be patched, monitored, backed up, or owned by the right team.

Can I scan very large networks?

Technically, yes, depending on your build and environment. Practically, smaller chunks are better. They create clearer reports, reduce noise, and are easier to schedule safely.

Why does the report show web titles?

Web titles are a simple way to identify what a service is. A title can reveal a printer admin page, firewall interface, old application, test portal, or forgotten default web server.

Should reports be shared publicly?

No. Treat reports as internal operational data. They can contain IP addresses, hostnames, software clues, certificate names, and service exposure details.

Download and next step

Save the script, run a small authorized network first, review the report, then expand into scheduled scans or CMDB comparison once the output is verified.

Reminder: only scan networks you own, administer, or have explicit authorization to assess. Keep reports protected because they contain useful internal infrastructure evidence.
Scantide product map

Which Scantide tool should I use?

Scantide is split into focused tools so the right audience gets the right kind of evidence quickly. Use Observe for live website behavior, Online for public domain checks, Dashboard for monitoring, and Auditor when you need authorized internal network visibility.

Observe browser extension

For Chrome, Edge, Brave and Firefox. Shows trackers, cookies, scripts, security headers, forms, contacted hosts and browser-visible website risk while you browse.

Open Observe guide

Observe Mobile

For Android users who want to share a URL from a browser or app and understand website privacy, scripts, trackers, infrastructure and jurisdiction context on mobile.

Open Observe Mobile

Scantide Online

For quick public-domain checks. Reviews visible TLS, DNS, headers, redirects, services, provider and jurisdiction signals for a website or domain.

Run single scan

Dashboard monitoring

For teams that need recurring certificate and domain visibility, status views, uploaded domain lists, expiry warnings and evidence history.

Open dashboard login

Auditor PowerShell

For Windows admins reviewing authorized internal networks. Finds reachable hosts, visible services, web responses, TLS clues and CMDB gaps in clear HTML reports.

Open PowerShell Auditor

Auditor for Android

For mobile field checks and quick local network visibility. Useful for Wi-Fi review, nearby network context and on-site authorized infrastructure checks.

Open Android Auditor
Need help choosing or setting this up? Use the main manual or contact Scantide.