This manual explains how to use the Scantide Auditor PowerShell script to review your own networks, discover reachable hosts, identify exposed services, inspect web and TLS evidence, compare findings with CMDB data, and export clear reports that administrators can actually act on.
The old ScantideLAN manual was useful, but it used older naming, older graphics, a few encoding-problem characters, and some wording that sounded more like vulnerability assessment than practical inventory and exposure review. This updated version focuses on the current Scantide Auditor direction.
Clearer product language
The wording now describes authorized internal visibility, service evidence, certificates, and CMDB comparison instead of broad or scary security claims.
New Scantide look
The old purple dashboard style has been replaced with the newer dark hero, rounded cards, evidence badges, and cleaner Scantide visual language.
More user-friendly explanations
Every major finding now explains why it matters for a normal administrator, not only for a technical security specialist.
What the PowerShell script does
Scantide Auditor PowerShell is an agentless script for administrators who need a practical view of what is reachable inside their own network. It does not try to exploit systems. It collects observable evidence and turns it into an HTML report.
Host discovery
Finds reachable systems in a subnet or list of networks so you can compare expected assets with what actually responds.
Service checks
Checks common ports such as web, SSH, FTP, SMTP, DNS, RDP, and alternate web ports where supported by your script build.
TLS evidence
Reviews visible certificate details such as subject, SAN names, issuer, and expiration dates on TLS-enabled services.
CMDB comparison
When enabled, compares discoveries against CMDB or ServiceNow-style inventory data to highlight known and unknown assets.
Plain-language purpose: the script helps answer simple but important questions: What is online? What ports are open? Which systems have web pages? Which certificates are expiring? Which hosts are not in the asset inventory?
Why the findings matter
A network scan report is only useful if people understand what to do with it. These explanations are written for administrators, operations teams, and managers who need clear risk context without exaggerated fear.
Unknown hosts
An unknown host may be a legitimate device, a forgotten test system, a printer, a VM, or something that was never added to inventory. It deserves review because unmanaged assets often miss patching, ownership, monitoring, and backup routines.
Open services
An open port is not automatically bad. It means a service is reachable. The important question is whether that service should be reachable on that network and whether the owning team knows about it.
Web titles and headers
Web titles, server headers, redirects, and response clues help identify admin panels, appliances, legacy portals, default pages, and services that may otherwise be hard to recognize from an IP address alone.
Certificates
Expired or soon-expiring certificates can break services, confuse users, and create avoidable incidents. Certificate subjects and SAN names can also reveal what a host was intended to be.
CMDB gaps
If a device is reachable but not in CMDB, it may be outside normal change, patch, ownership, or lifecycle processes. This is often one of the most useful operational findings.
Repeat scans
One scan gives a snapshot. Repeated scans show change: new devices, disappeared hosts, new exposed services, or certificates that are getting close to expiry.
Quick start
Use this flow when you simply want to run a safe authorized inventory scan and produce the first HTML report.
Save the script
Download the script and save it in a dedicated folder, for example C:\ScantideAuditor\. Keep reports in the same folder or in a separate report archive.
Open PowerShell as administrator
Administrator rights are not always required for basic TCP checks, but they reduce friction and help with local policy and network behavior on managed Windows systems.
Allow the script for this session
If Windows blocks unsigned local scripts, use a temporary session-level policy instead of changing the whole machine permanently.
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass
Run a small network first
Start with a small known subnet before scanning larger ranges. This makes it easier to verify output, timing, firewall noise, and report readability.
cd C:\ScantideAuditor
.\ScantideAuditor.ps1 -Network "192.168.1.0/24"
Open the HTML report
The report is normally created with a timestamped filename such as NetworkScan_YYYYMMDD_HHMMSS.html. Review unknown hosts, open services, web evidence, certificates, and CMDB status first.
Best first scan: choose a network you own and understand. Avoid starting with a very large range. A controlled first run is faster, easier to explain, and less likely to trigger avoidable firewall or monitoring alerts.
Common parameters
Exact parameters can vary between builds, but the current Scantide Auditor PowerShell family usually follows this model. Keep the manual aligned with the actual script header before publishing.
Parameter
Purpose
Example
-Network
Scan one CIDR range.
-Network "10.24.48.0/24"
-List
Read multiple networks or hosts from a text file, one entry per line.
-List ".\networks.txt"
-Email
Identify the licensed user when API-backed or Pro features are enabled.
-Email "admin@example.com"
-ApiKey
Enable Scantide-backed enrichment or licensed features where supported.
-ApiKey "YOUR_KEY"
CMDB options
Some builds include ServiceNow or CMDB connection settings. Use these only with a read-only account where possible.
-ServiceNowInstance, -CmdbToken, or build-specific equivalents
Output options
Some builds allow custom output paths or report naming. If not, reports are created in the script directory.
-OutputPath "C:\Scans" if supported
Single subnet
Best for normal recurring scans, troubleshooting, or checking a VLAN.
.\ScantideAuditor.ps1 -Network "10.24.48.0/24"
Multiple ranges
Best for scheduled scanning across several known networks.
The script uses a staged flow so the report can explain where each finding came from. The exact phases may vary by version, but the logic is generally the same.
1. Scope is prepared
The script expands the selected network or reads the list file. Large networks should be split into smaller ranges for cleaner output.
2. Hosts are checked
Reachability checks identify likely live hosts. Some networks block ping, so TCP results can still reveal active systems.
3. Ports are tested
Common ports are checked with timeouts. This is evidence of reachable services, not proof that the service is unsafe.
4. Web evidence is collected
Where web services respond, the script can collect titles, server hints, status codes, and redirect clues.
5. TLS is reviewed
For TLS-enabled services, certificate data helps identify ownership, names, expiry, and obvious maintenance issues.
6. Report is generated
The final HTML report is designed for sorting, filtering, review, and sharing with asset owners.
Understanding the HTML report
The report is the main deliverable. It should help you move from a raw scan to an action list: verify unknown hosts, fix inventory gaps, renew certificates, and remove services that should not be reachable.
Known / expected Needs review High priority Evidence only
Report field
What it means
How to use it
IP address / hostname
The discovered endpoint and any resolved DNS name.
Use it to identify the owner, location, and expected role.
Open port
A network service responded on that port.
Confirm whether that service should be reachable from the scanned network.
Web title / server
Visible web page title, response clues, or server header where available.
Useful for recognizing appliances, portals, default pages, and forgotten admin interfaces.
Certificate subject / SAN
Names and identity information presented by a TLS certificate.
Use it to spot expired certificates, wrong hostnames, old systems, or ownership clues.
CMDB status
Whether the host appears in the connected inventory source.
Prioritize hosts marked not found in CMDB for ownership and lifecycle review.
Scan duration / network
Summary metadata for when and where the report was created.
Important when comparing multiple reports or proving when a finding was observed.
Good report workflow: sort by CMDB status first, then certificate expiry, then open web/admin-style services. This usually finds the most practical cleanup work quickly.
CMDB and ServiceNow-style comparison
CMDB comparison is one of the most valuable parts of the Auditor workflow. It connects network reality with asset governance: what responds on the wire versus what the organization believes exists.
Known assets
Systems that appear in CMDB are easier to route to an owner. The scan evidence can still reveal services or certificates that need maintenance.
Not in CMDB
These are often the most important rows. They may be legitimate but unmanaged, or they may be old lab systems, appliances, shadow IT, or stale infrastructure.
Use read-only access
If the script connects to ServiceNow or another CMDB, use least-privilege read-only credentials and keep secrets outside shared screenshots and reports.
Important: CMDB matching depends on how your organization stores IP addresses, DNS names, device names, and retired assets. Treat mismatches as review items, not automatic proof that something is wrong.
Review context
CVE and jurisdiction checks
Use CVE and jurisdiction information as context for triage. It helps decide what to investigate first, but it does not replace verification by the system owner.
CVE checks from visible evidence
The script can collect clues such as open services, web titles, server headers, TLS certificate names and service banners. If those clues identify a product or version, they can be compared with known CVEs. Always confirm the real installed version and patch state before calling it a vulnerability.
Jurisdiction and ownership context
For public-facing domains, cloud-hosted systems or services that depend on external providers, country, ASN, provider ownership and mail routing can matter. The purpose is to support governance and data-sovereignty review, not to label a provider or country as automatically good or bad.
Safe and appropriate use
Scantide Auditor PowerShell is intended for authorized internal visibility. It should be used on networks you own, administer, or have explicit permission to assess.
Appropriate use cases
Internal asset inventory review
CMDB quality checks
Certificate expiry review
Change validation after network cleanup
Finding forgotten web portals or appliances
Use with care
Notify monitoring teams before large scans
Scan in smaller chunks when possible
Avoid fragile OT, medical, or production-sensitive networks unless approved
Store reports as internal data because they contain useful infrastructure details
Review firewall and IDS alerts generated by the scan
Performance and scan sizing
The best scan is not always the biggest scan. Smaller, predictable ranges usually produce cleaner reports and fewer operational surprises.
Start small
Use a /24 or smaller known range for the first run. Confirm that reports, sorting, and CMDB matching look right before expanding.
Split large ranges
Break /16-style scopes into multiple /24 or /22 chunks. This is easier to schedule and easier to troubleshoot if one network behaves differently.
Adjust timeouts carefully
Shorter timeouts are faster but can miss slow services. Longer timeouts are more complete but increase total run time.
# Example: scan several smaller ranges instead of one huge scan
.\ScantideAuditor.ps1 -Network "10.24.48.0/24"
.\ScantideAuditor.ps1 -Network "10.24.49.0/24"
.\ScantideAuditor.ps1 -Network "10.24.50.0/24"
Scheduled scans
Scheduled scans are useful when you want to detect change over time: new hosts, new exposed services, disappearing systems, or certificates getting close to expiry.
Simple scheduled wrapper
Create a small wrapper script and call it from Windows Task Scheduler.
Weekly is often enough for normal internal visibility. Daily can be useful during cleanup projects, migrations, or CMDB remediation work.
Daily during active cleanup
Weekly for normal governance
After major firewall, VLAN, or server changes
Troubleshooting
Most problems fall into a few categories: execution policy, blocked traffic, DNS behavior, permissions, or services that do not speak standard HTTP/TLS even though a port is open.
PowerShell says scripts are disabled
Use a process-scoped execution policy for the current window.
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass
Very few hosts are found
Ping may be blocked or routed differently. Confirm that the scanner machine can reach the target network and that local firewall rules allow outbound checks.
RDP TLS details are missing
That can be normal. RDP and NLA do not always behave like a standard HTTPS certificate check. Treat the open port as evidence, not a failed certificate scan.
Report does not open automatically
Browse to the script folder and open the newest NetworkScan_*.html file manually. On servers, default browser behavior may be restricted.
Scan is slow
Reduce scope first. If needed, adjust script timeout or parallelism settings only after confirming the network is stable and the target range is correct.
CMDB results look wrong
Check whether CMDB stores IPs, FQDNs, short hostnames, retired records, NAT addresses, or multiple interfaces differently than the scan sees them.
Best practices
These habits make the reports more useful and easier to defend when shared with asset owners or management.
Keep scope documented
Record which networks were scanned, when the scan ran, who requested it, and which machine performed the scan.
Archive reports
Keep timestamped reports so you can compare trends and prove when a host or service first appeared.
Protect output
Reports contain internal infrastructure details. Store them where only authorized teams can access them.
Assign owners
A finding without an owner often stays unresolved. Route unknown hosts and exposed services to the team responsible for the network or system.
Rescan after cleanup
After disabling a service, renewing a certificate, or adding a CMDB record, run the same scope again to verify the result.
Do not overstate results
An open port or missing CMDB record is a review signal. Use the evidence to drive verification, not blame.
FAQ
Short answers for common questions from administrators and stakeholders.
Is Scantide Auditor PowerShell an offensive security tool?
No. It is positioned as an authorized internal visibility and evidence collection tool. It checks reachability, services, web clues, TLS certificates, and inventory gaps. It should only be used on networks where you have permission.
Does an open port mean the host is vulnerable?
No. An open port means a service is reachable. The follow-up question is whether that service is expected, owned, patched, monitored, and appropriate for that network.
Why is CMDB comparison important?
Because unmanaged assets are often the root of operational and security problems. If a device exists on the network but not in inventory, it may not be patched, monitored, backed up, or owned by the right team.
Can I scan very large networks?
Technically, yes, depending on your build and environment. Practically, smaller chunks are better. They create clearer reports, reduce noise, and are easier to schedule safely.
Why does the report show web titles?
Web titles are a simple way to identify what a service is. A title can reveal a printer admin page, firewall interface, old application, test portal, or forgotten default web server.
Should reports be shared publicly?
No. Treat reports as internal operational data. They can contain IP addresses, hostnames, software clues, certificate names, and service exposure details.
Download and next step
Save the script, run a small authorized network first, review the report, then expand into scheduled scans or CMDB comparison once the output is verified.
Reminder: only scan networks you own, administer, or have explicit authorization to assess. Keep reports protected because they contain useful internal infrastructure evidence.
Scantide product map
Which Scantide tool should I use?
Scantide is split into focused tools so the right audience gets the right kind of evidence quickly.
Use Observe for live website behavior, Online for public domain checks, Dashboard for monitoring,
and Auditor when you need authorized internal network visibility.
Observe browser extension
For Chrome, Edge, Brave and Firefox. Shows trackers, cookies, scripts, security headers, forms, contacted hosts and browser-visible website risk while you browse.
For Android users who want to share a URL from a browser or app and understand website privacy, scripts, trackers, infrastructure and jurisdiction context on mobile.
For Windows admins reviewing authorized internal networks. Finds reachable hosts, visible services, web responses, TLS clues and CMDB gaps in clear HTML reports.
For mobile field checks and quick local network visibility. Useful for Wi-Fi review, nearby network context and on-site authorized infrastructure checks.