Getting started · 5 min read

Run your first Noxen CVE scan

Add a host, run a scan, read the findings. Five minutes from a fresh Noxen install to a populated dashboard showing real CVE matches against a real Linux box.

Start from the empty Hosts list

A fresh Noxen install lands you on an empty Hosts list. The sidebar is ready for enrolment, the Dashboard tile shows zeroes, and the + menu in the toolbar exposes every onboarding path.

Noxen Hosts sidebar showing an empty state with a 'No hosts yet — add hosts to start scanning for CVEs and exposures' message and the + menu in the toolbar.
The empty-state sidebar. The + menu opens the four onboarding paths: Add host, Import from SSH config, Discover on LAN, and Bulk paste.

Pick the fastest enrolment path

Four ways to add hosts; pick whichever matches your existing setup:

Run the scan

Select your newly-enrolled host in the sidebar. Click Scan now in the toolbar (or press ⌘R). Noxen runs every probe in parallel — port scan, SSH inventory, CVE match, TLS audit, HTTP header audit, exposed admin-surface probe — typically completing in 10–60 seconds per host depending on open-port count. Findings stream into the host detail view as each probe finishes, so you don't wait for the slowest.

For a deep dive into what each probe does, see the scan engine reference.

Read the findings

The Dashboard is the at-a-glance view: severity buckets, top critical/high findings, host health table. The host detail view (click any host name) drills into the per-probe findings list, grouped by category.

Noxen Dashboard view with severity tiles, host count, last-scan timestamp, severity breakdown bar chart, and a Top critical and high findings table.
The Dashboard. Tiles are clickable filters — click Critical to jump straight to the critical findings across every host.

Every finding has four standard properties:

Severity
Critical / High / Medium / Low / Info — distro-tagged labels first, CVSS v3 vector parsed for the rest. Severity reference →
Category
CVE match, missing security header, exposed admin surface, weak TLS, open port. Each category has its own UI tab on the host detail.
Detail
One-paragraph explanation including the package name, vector, and why it matters in your specific context.
Remediation
Distro-specific apt/dnf/zypper command for CVE findings, or configuration guidance for header/admin-surface findings. Remediation reference →

Scan more hosts

Once one host works, enrol the rest of your fleet via SSH config import or LAN discovery, then run Scan all from the toolbar (or ⌘⇧R). Noxen iterates every host sequentially with a live progress banner; cancellation is one keystroke away. See Batch scan for partial-failure handling.

What's next

Set up nightly scheduled scans so findings refresh while you sleep, then wire up Slack/Discord/Teams webhooks if you want critical-only alerts to land in a channel.