Knowledge base

Run Verification Scans

Last updated: 2026-03-03



Purpose

This document describe how to start a verification scan. 

Introduction

In Outpost24, Run Verification Scans lets you confirm whether previously identified vulnerabilities still exist on a target after remediation efforts. When a finding is flagged during a regular scan, a verification scan can be triggered to reassess that specific issue against the asset. The scan updates the status of the finding to show if the vulnerability is still present, has been resolved, or could not be verified, providing security teams with more reliable evidence of remediation success and reducing uncertainty in ongoing vulnerability management workflows.

Verify scans are a best endeavor to see if a vulnerability still exists. There may be some elements of the verify scan which do not work under certain conditions and we cannot guarantee against false positives or false negatives. if you require more accuracy, please re-run a vulnerability scan against the target.

How to Verify a Scanned Target

Prerequisites

Before you start make sure that the Verified column is activated to show the status of the findings.

Verify the Target

To activate the column:

  1. Click on the down pointing arrow in any column heading.

  2. Select Columns > Verified in the displayed menu.

    verified01.png


Scanning

To verify a scanned target:

  1. Click on Main Menu > Netsec > Reporting Tools.

  2. Select a group in Target Group.

  3. In the Findings tab, right click on the finding that should be scanned and select Verify.

  4. The Verify Findings window is displayed.

    Verify Findings



  5. To scan directly select Scan Now in the Scan Scheduling menu, or set up a later scan using the Scan Later function.

Option

Description

Scan Now

Starts a scan immediately.

Scan Later

Activates the date and time settings to set up a scan at a later time.

Cancel Scans

Removes a preprogrammed scan.

  1. Click Save and the scan starts automatically.


Result

After running the verification scan the Verified column status changes reflecting the result of the scan.

Result

Description

Not verified

The finding has a vulnerability that has not been verified

No Longer Present

The vulnerability has been solved and verified

Still present

The vulnerability has not been solved, and the vulnerability is still present