Skip to content

Exposures

This is the central investigation hub where you can drill into the data behind the dashboard. It’s critically important to understand the different ways this module presents risk, as each serves a distinct purpose.

  • Vulnerability Inventory (The “What” - Your Threat Dictionary): This view is your central library of every unique vulnerability (like a specific CVE or software weakness) found across your entire attack surface. Think of it as a “threat dictionary”; each vulnerability is listed only once, regardless of how many times it was found. It is used for strategic analysis of widespread risks. The inventory is presented in a detailed table, and each entry can be opened for a more detailed view. Key metrics at the top summarize the Total Vulnerabilities, a breakdown by severity, the number of Assets Affected, and the Total Findings related to those vulnerabilities.
  • Findings (The “Where” - Your Remediation To-Do List): This view is the master list of every single security issue we have detected on each specific asset. If one vulnerability exists on ten different servers, you will see ten separate, actionable entries here. This is your granular, chronological log of all issues and serves as your team’s primary to-do list for remediation. The findings are displayed in a table, and each can be opened to see the specific assets affected. Key metrics at the top summarize the Total Detections, a breakdown by severity, and the total number of Assets Processed.
  • Inventory (Your Technology Stack): This section shows all the discovered software, services, and technologies running on your external assets. It provides a comprehensive view of your technology stack, helping you identify outdated software or unauthorized deployments. The inventory is displayed in a table, and each asset can be opened for a detailed view. Key metrics summarize the Total Assets, a breakdown by severity, the number of Findings, and the total number of Technologies discovered.

This section acts as the triage center for managing all new alerts and changes discovered on your attack surface. It provides a chronological feed of events, allowing you to review and act on incoming information as it arrives. From here, you can triage detections by marking them as a false positive, whitelisting them, or escalating them by requesting a takedown if the detection relates to a malicious external asset.