You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exposure-management/enterprise-exposure-map.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,19 +37,19 @@ The exposure map gives you visibility into asset connections.
37
37
-**Hovering**: Hover over nodes and edges to get additional information.
38
38
-**Explore assets and their edges**. To explore assets and edge, select the plus sign. Or select the option to explore connected assets from the contextual menu.
39
39
-**Asset details**: To view details, select the asset icon.
40
-
-**Focus on asset**: Provides a way to refocus the graph visualization on the specific node you want to explore, similar to the **Graph** view when selecting an individual [attack path](review-attack-paths.md). The Cloud attack paths focuses on real, externally-driven and exploitable threats rather than broad potential attack path scenarios.
40
+
-**Focus on asset**: Provides a way to refocus the graph visualization on the specific node you want to explore, similar to the **Graph** view when selecting an individual [attack path](review-attack-paths.md). The Cloud attack paths focus on real, externally-driven and exploitable threats rather than broad potential attack path scenarios.
41
41
-**Search**: Helps you to discover items by node type. By selecting **all results**, search the particular type for specific results. You can also filter your search by devices, identity, or cloud assets from the initial screen.
42
42
-**Discovery source**: Use the layer option to show or hide the origin of the data directly on the attack surface map.
43
43
44
-
:::image type="content" source="media/value-data-connectors/attack map data connectors.png" alt-text="Screenshot of the attack surface exposure map." lightbox="media/value-data-connectors/attack map data connectors.png":::
44
+
:::image type="content" source="media/value-data-connectors/attack map data connectors.png" alt-text="Screenshot of the attack surface exposure map." lightbox="media/value-data-connectors/attack map data connectors.png":::
45
45
46
46
1. Open the side panel to view asset details.
47
47
-**General**: View general information about the asset, including **Type**, **IDs**, and **Discovery source**.
48
48
-**All data**: View all data about the asset, including **Categories**, **Node Properties**, **Metadata**, and **IDs**.
49
49
-**Top Vulnerabilities**: View up to the top 100 CVEs (by severity) on the asset.
50
50
-**Findings**: View all the security findings on the asset.
51
51
52
-
:::image type="content" source="media/enterprise-exposure-map/attack-surface-exposure-map-sidepane.png" alt-text="Screenshot of attack surface map side pane" lightbox="media/enterprise-exposure-map/attack-surface-exposure-map-sidepane.png":::
52
+
:::image type="content" source="media/enterprise-exposure-map/attack-surface-exposure-map-sidepane.png" alt-text="Screenshot of attack surface map side pane." lightbox="media/enterprise-exposure-map/attack-surface-exposure-map-sidepane.png":::
0 commit comments