First Scan¶
Ready to scan your network? Follow this guide to run your first scan and understand the results.
Quick Start Checklist¶
- Argus installed and running
-
config.yamlconfigured with your subnet - Create admin account
- Run first scan
- Review discovered devices
- Organize devices (labels, zones, trusted)
Running a Scan¶
- Open
http://localhost:8080 - Create admin account on first visit
- Click Run Scan in the top-right
- Select scan profile
- Monitor progress in real-time
First Time?
Start with a Quick scan to verify everything works, then run Normal for full results.
Scan Profiles¶
| Profile | What it Does | Time (50 hosts) | Best For |
|---|---|---|---|
| Quick | Ping sweep only | ~30 seconds | Device presence check |
| Normal | Ports 1-1000 + services | 3-5 minutes | Regular security audits |
| Intensive | All ports + scripts | 15-30 minutes | Deep analysis |
Recommended Approach
- Run Quick first to verify connectivity
- Run Normal to establish a security baseline
- Use Intensive sparingly for detailed analysis
Understanding Results¶
Risk Levels¶
| Level | Color | Meaning | Example |
|---|---|---|---|
| Critical | Red | Immediate action needed | Telnet exposed |
| High | Orange | Significant risk | SMB, RDP open |
| Medium | Yellow | Moderate concern | Uncommon services |
| Low | Blue | Minor issue | Info disclosure |
| None | Green | No detected issues | Clean device |
Risky Ports¶
Critical Risk Ports
These services should almost never be exposed on a home network:
| Port | Service | Risk |
|---|---|---|
| 23 | Telnet | Cleartext credentials |
| 21 | FTP | Cleartext authentication |
| 445 | SMB | Common ransomware target |
| 3389 | RDP | Brute force attacks |
| 5900 | VNC | Often weak authentication |
Other Ports of Interest
| Port | Service | Notes |
|---|---|---|
| 22 | SSH | OK if properly secured |
| 80/443 | HTTP/HTTPS | Check what's being served |
| 8080 | Alt HTTP | Often admin interfaces |
| 1883 | MQTT | IoT protocol, often unsecured |
| 5353 | mDNS | Service discovery |
Device Organization¶
Organize your devices for easier management and cleaner dashboards.
Zones¶
Group devices by function:
| Zone | Purpose | Examples |
|---|---|---|
| Servers | Infrastructure | NAS, Docker hosts, VMs |
| Network | Network gear | Routers, switches, APs |
| Workstations | User devices | Desktops, laptops |
| IoT | Smart devices | Cameras, thermostats |
| DMZ | Exposed services | Web servers |
Labels¶
Add descriptive names for quick identification:
Trusted Devices¶
Reduce Noise
Mark known devices as trusted to filter them from security alerts. Trusted devices still appear in scans but won't trigger new device alerts.
Scheduled Scans¶
Automate regular scanning to catch changes.
Intensive Scans
Don't schedule intensive scans frequently. They generate significant network traffic and can take 30+ minutes on larger networks.
What's Next?¶
-
Dashboard
Learn to navigate the dashboard and understand metrics
-
API Reference
Automate Argus with the REST API
-
Integrations
Connect UniFi, Pi-hole, AdGuard, and more