Findings and Remediation
Attack Paths
Investigate findings and prioritize remediation efforts based on risk exposure and impact.
Risk Acceptance
Temporarily accept findings as known risks while you work on remediation or wait for data retention to remove the underlying data.
Posture
Track trends over time across Attack Paths, findings, and overall exposure to understand the impact of your remediation efforts.
Explore
Search and Pathfinding
Find objects, analyze relationships, and visualize attack paths in a graph view.
Search with Cypher
Use prebuilt or custom Cypher queries to uncover relationships and insights.
Supported Cypher Syntax
See supported Cypher components and examples of how to use them.
Privilege Zones
Privilege Zones Overview
Learn how Privilege Zones segment your environment by sensitivity and access boundaries.
Zones
Create and manage zones that define privileged boundaries in your environment.
Labels
Apply labels to classify objects and supplement zone assignment logic.
Rules
Build rules that automatically place objects into the right zones.
Default Rules
Review built-in rules used to seed and maintain Privilege Zone structure.
Certification
Certify zone membership and validate that privileged boundaries remain accurate.
History
Audit Privilege Zone changes over time to understand what changed and when.