Executive Dashboard

Loading...

🚀 Getting Started β€” How to Use GuardiaGraph

Follow these steps to fully configure your company's security intelligence:

Add Assets
Register your servers, workstations, cloud VMs β€” all network endpoints
Import Vulnerabilities
Add CVEs from your scanner (Qualys, Nessus) with CVSS & EPSS scores
Add Identities
Register user accounts, service accounts & managed identities β€” MFA and privilege status
View Risk Scores
AI engine ranks all endpoints by composite risk β€” choke, proximity, exposure
Explore Attack Graph
Visualize attack paths from perimeter to crown jewels β€” drag nodes to explore
Check Heatmap
Color-coded risk matrix by subnet β€” filter by critical/high/medium/low
Run Simulations
What-if analysis: patch, segment, isolate β€” see risk reduction & ROI before acting
Review Alerts
AI-rationalized alerts ranked by crown jewel impact β€” auto-suppress noise
Export Reports
Download CSV, JSON, or PDF reports for stakeholders and compliance

Risk Trend (30 Days)

Risk Distribution

Top 5 Risk-Driving Endpoints

RankHostnameScorePrimary Driver

Remediation Impact

CASE Savings

💡
Risk Scores are AI-computed composite rankings for every endpoint. The score combines node risk (local vulns), choke score (network centrality), local risk (CVE severity), and proximity to crown jewels. Higher = more dangerous.

All Endpoint Risk Scores

RankHostnameCompositeNode RiskChokeLocal RiskProximityTier
💡
Attack Graph shows how an attacker can traverse your network from internet-facing entry points to crown-jewel assets. Drag nodes to rearrange. Edges show adjacency β€” thicker = higher traversal probability. Crown jewels have a 👑 icon.

Attack Path Visualization

Crown Jewel
High Risk
Internet-Facing
Internal
Low Risk

Attack Paths to Crown Jewels

SourceTargetHopsProbabilityPath
💡
Risk Heatmap provides a bird's-eye view of all endpoints as colored tiles. Red = Critical (≥75), Orange = High (≥50), Yellow = Medium (≥25), Green = Low. Filter by tier using the dropdown. Click a cell for details.

Risk Heatmap

💡
Alert Rationalization uses the attack graph to prioritize alerts by crown-jewel impact. Alerts on endpoints that sit on attack paths to critical assets are ranked higher. Low-impact alerts are auto-suppressed β€” reducing noise up to 80%.

Rationalized Alerts

💡
Assets are the network endpoints in your environment. Click "+ Add Asset" to register servers, VMs, containers, or network devices. Include the hostname, IP, OS info, and sensitivity label. The graph engine uses assets to compute attack paths.

Asset Inventory

HostnameIP AddressTypeOSSensitivityEDRPatch %Actions
💡
Vulnerabilities are CVE findings from your scanner tools (Qualys, Nessus, etc.). Click "+ Add Vulnerability" and link each CVE to an asset. Include CVSS base score, EPSS probability, severity, and exploit/patch status. These feed directly into the risk scoring engine.

Vulnerability Findings

CVE IDAssetCVSSEPSSSeverityExploitPatchScanner
💡
Identities are the user accounts, service accounts, and managed identities in your environment. These feed the Identity Surface (IDSurf) score β€” a key factor in attack path probability. Privileged accounts without MFA create high-risk pivot vectors.

Identity Inventory

Principal NameDisplay NameTypePrivilegedMFARisk LevelActions
💡
What-If Simulator lets you test remediation actions before deploying them. Add actions like patch_vulnerability, add_segmentation, isolate_endpoint etc., then hit Run Simulation. Compare before/after risk scores and ROI to prioritize budget.

What-If Remediation Simulator

πŸ“„

CSV Export

Risk scores, paths, choke points

πŸ“‹

JSON Export

Full structured data

πŸ“‘

PDF Report

Executive summary report