Skip to main content

Findings and Remediation

Attack Paths

Investigate findings and prioritize remediation efforts based on risk exposure and impact.

Risk Acceptance

Temporarily accept findings as known risks while you work on remediation or wait for data retention to remove the underlying data.

Posture

Track trends over time across Attack Paths, findings, and overall exposure to understand the impact of your remediation efforts.

Explore

Search and Pathfinding

Find objects, analyze relationships, and visualize attack paths in a graph view.

Search with Cypher

Use prebuilt or custom Cypher queries to uncover relationships and insights.

Supported Cypher Syntax

See supported Cypher components and examples of how to use them.

Privilege Zones

Privilege Zones Overview

Learn how Privilege Zones segment your environment by sensitivity and access boundaries.

Zones

Create and manage zones that define privileged boundaries in your environment.

Labels

Apply labels to classify objects and supplement zone assignment logic.

Rules

Build rules that automatically place objects into the right zones.

Default Rules

Review built-in rules used to seed and maintain Privilege Zone structure.

Certification

Certify zone membership and validate that privileged boundaries remain accurate.

History

Audit Privilege Zone changes over time to understand what changed and when.