Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Investigating Elements in your Network Infrastructure

SUMMARY You can use the search feature to filter your topology view, and zone in on network paths, hosts, subnets, and other network elements. You can refine your search down to the port or protocol level, for example you can search for potential attack paths on allowed protocols or ports.

  1. Click the Risks tab, and then click Topology on the navigation menu.
  2. Click Actions.
  3. Enter your search criteria in the Search Criteria pane.
    The following table describes examples of search options that you can use:
    Search option Description
    Hosts If you search for a host, all devices that communicate with that host are displayed. If the host does not match an interface on a device, but is included in the subnet, that subnet and all connected devices are displayed.
    Networks Search for a single CIDR, for example, 10.3.51.200/24.

    If you're searching for multiple CIDRs, ensure that the CIDRs are valid and are separated by a comma, for example, 10.51.0.0/24,10.51.01/24.

    Paths A path search displays the traffic direction, fully or partially allowed protocols, and device rules. If you select any path search criteria other than the mandatory source and destination IP addresses, a path summary is displayed.

    Refine your path search by searching for applications, vulnerabilities, and users or user groups.

  4. To search events, right-click the device or subnet that you want to investigate.
  5. To search flows, right-click any subnets that you want to investigate.