Your First Scan
Panguard Scan analyzes your system in approximately 60 seconds, identifies security weaknesses, and provides actionable remediation guidance. Quick scans are free; full scans require the Solo tier or above.Prerequisites
Before running your first scan, ensure Panguard is installed:Run Your First Scan
Run a Quick Scan
Start with a quick scan to get an immediate overview (free, no login required):This completes in approximately 30 seconds and covers OS detection, network interfaces, open ports, running services, password policy, firewall status, and security tool detection.
Quick Scan vs. Full Scan
| Feature | Quick Mode (--quick) | Full Mode (default) |
|---|---|---|
| Duration | ~30 seconds | ~60 seconds |
| Tier required | Free | Solo |
| OS detection | Yes | Yes |
| Network interfaces | Yes | Yes |
| Open ports | Yes | Yes |
| Running services | Yes | Yes |
| Password policy | Yes | Yes |
| Firewall status | Yes | Yes |
| Security tools | Yes | Yes |
| SSL certificate validation | No | Yes |
| Scheduled task audit | No | Yes |
| Shared folder security | No | Yes |
| Risk score | Yes | Yes |
Severity Levels
| Severity | Meaning | Recommended Action |
|---|---|---|
| CRITICAL | Immediate risk of compromise | Fix immediately |
| HIGH | Significant security risk | Fix within 24 hours |
| MEDIUM | Moderate risk, improvement recommended | Fix within one week |
| LOW | Low risk, best practice suggestion | Fix when convenient |
| INFO | Informational finding | No action required |
Generate a PDF Report
Export your scan results as a professional PDF report:- Cover page — Organization name, scan date, branding
- Executive summary — Risk score, grade, finding statistics
- Findings detail — Each finding with severity, description, and location
- Remediation guidance — Specific fix steps for each finding
- Compliance mapping — Findings mapped to ISO 27001 / SOC 2 / Taiwan Cyber Security Act
What Comes After Your First Scan
Enable Real-Time Protection
Start Guard to continuously monitor and protect your system.
Set Up Notifications
Configure Telegram, Slack, or email alerts for security events.
Generate Compliance Reports
Use scan findings to generate ISO 27001, SOC 2, or TCSA reports.
Deploy Honeypots
Set up decoy services to detect and profile attackers.