You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exposure-management/enterprise-exposure-map.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ The exposure map gives you visibility into asset connections.
37
37
-**Hovering**: Hover over nodes and edges to get additional information.
38
38
-**Explore assets and their edges**. To explore assets and edge, select the plus sign. Or select the option to explore connected assets from the contextual menu.
39
39
-**Asset details**: To view details, select the asset icon.
40
-
-**Focus on asset**: Provides a way to refocus the graph visualization on the specific node you want to explore, similar to the **Graph** view when selecting an individual [attack path](review-attack-paths.md). The Cloud attack paths focuses on real, externally-driven and exploitable threats rather than broad potential attack path scenarios.
40
+
-**Focus on asset**: Provides a way to refocus the graph visualization on the specific node you want to explore, similar to the **Graph** view when selecting an individual [attack path](review-attack-paths.md). The Cloud attack paths focus on real, externally-driven and exploitable threats rather than broad potential attack path scenarios.
41
41
-**Search**: Helps you to discover items by node type. By selecting **all results**, search the particular type for specific results. You can also filter your search by devices, identity, or cloud assets from the initial screen.
42
42
-**Discovery source**: Use the layer option to show or hide the origin of the data directly on the attack surface map.
0 commit comments