Skip to main content
Most scanning tools offer three scan types that balance speed, thoroughness, and customization.

Light

Light scans are fast, surface-level assessments designed for quick results with minimal impact on the target.
AspectDetails
SpeedFast, typically completes in seconds to minutes
CoverageCommon ports only (typically top 100) for network tools; shallow crawling and fewer checks for web tools
DetectionVersion-based detection, compares service versions against known vulnerability databases
ImpactLow traffic, less likely to trigger IDS/IPS alerts

When to use Light scans

  • Quick reconnaissance of a new target
  • Initial health checks before deeper testing
  • Time-sensitive assessments
  • Testing scan configurations before committing to a full scan
  • Targets where you want to minimize traffic
Light scans rely primarily on service version fingerprinting, which can produce false positives if services report inaccurate versions. We don’t generate critical findings based solely on version detection. Always validate version-based findings.

Deep

Deep scans run full assessments across a broader range of ports, checks, and detection engines.
AspectDetails
SpeedSlower, can take minutes to hours depending on target
CoverageExtended port ranges for network tools; deeper spidering and more tests for web tools
DetectionMultiple engines including version-based, Sniper, Nuclei, active vulnerability checks, and full enumeration
ImpactHigher traffic volume, may be detected by security monitoring

When to use Deep scans

  • Full security audits and assessments
  • Compliance requirements
  • Pre-release security testing
  • Annual security reviews
  • When you need full coverage
Deep scans generate more network traffic and may create noise in target logs. Coordinate with system owners when scanning production environments.

Risks and considerations

Deep scans generate a lot of traffic. Before running one against a production system, consider the following: WAF and IDS/IPS detection. The payload volume will trigger most web application firewalls and intrusion detection systems. Security monitoring tools will alert, and some will block the scanner. Whitelisting the scanner’s source IPs before scanning prevents this. Request volume. The Website Scanner in Deep mode sends 10,000+ HTTP requests. The Network Scanner probes thousands of ports across multiple engines. This traffic shows up in application logs, access logs, and network monitoring. Server load. High request rates increase server load and can slow response times for real users. Schedule deep scans during maintenance windows or low-traffic periods. Rate limiting. Some applications throttle or block IPs that send too many requests. If a deep scan stops mid-way, switch to Custom scan type and reduce the requests-per-second setting.

Custom

Custom scans give you full control over scan parameters, including tests, engines, and detection options.
AspectDetails
SpeedVaries based on configuration
CoverageUser-defined scope (ports for network tools, spidering settings for web tools)
DetectionUser-selected tests and engines
ImpactDepends on configuration choices

When to use Custom scans

  • Targeting specific ports or services
  • Focusing on particular vulnerability types
  • Fine-tuning scan behavior for specific environments
  • Advanced users who understand the trade-offs

Custom options

Depending on the tool, Custom mode may let you configure:
  • Scanning engines: Select which detection engines or tests to run
  • Port selection: Specify exact ports, ranges, or predefined lists (network tools)
  • Protocol: TCP or UDP scanning (network tools)
  • Spidering settings: Configure crawl depth, approach, and time limits (web tools)
  • URL inclusions/exclusions: Control which paths to scan or skip (web tools)
  • Authentication: Configure credentials for protected areas (web tools)
  • Rate limiting: Control requests per second to reduce impact
Custom scan options vary by tool. Check the specific tool’s documentation for available parameters.

Comparison summary

LightDeepCustom
SpeedFastSlowVaries
CoverageBasicFullUser-defined
False positivesMore likelyLess likelyDepends on config
Target impactLowHighUser-controlled
Best forQuick checksFull auditsSpecific needs
Start with a Light scan to get a quick read on the target, then follow up with Deep or Custom scans on areas of concern.

How long do scans take?

Scan duration depends on the tool, mode, and target.

Network and port scans

ModeTypical duration per host
LightA few minutes
Deep20–60 minutes
Custom (with OpenVAS)Up to several hours
Scanning a network range (such as a /24 CIDR block) multiplies per-host times by the number of live hosts discovered.

Web scans

ModeTypical duration
LightA few minutes
Deep20–60 minutes
Some Website Scanner tests run much longer than the totals above. Find Interesting Files and Information Disclosure each test a large number of potential paths and parameters, and either can take several hours on a Deep scan. If you need faster results, use Custom mode and deselect those tests.