Platform Guide
Asset Topology Diagram
The Asset Topology Diagram gives you a unified network view of discovered assets and their correlated security context.
It combines:
- 1Discovered topology relationships
- 2Open-port evidence
- 3Fingerprint summaries
- 4CyfroAI insight highlights
- 5Ranked risk context
Accessing the Topology View
The page loads topology data for the currently selected account group.
If no topology data exists yet, the page shows an empty state with guidance to run discovery/scanning first.
Desktop Experience
On desktop, topology renders as an interactive workspace with:
- 1Toolbar and filters
- 2Interactive graph canvas
- 3Integrated asset detail drawer
Toolbar Summary Chips
The top summary row shows current snapshot counts:
- 1Assets
- 2Subnets
- 3Ports
- 4Fingerprint
- 5CyfroAI Insights
- 6Critical
It also shows the snapshot generation timestamp and a Refresh action.
Filters
The filter toolbar supports:
- 1Search (IP, hostname, service, CVE, vendor, AI text)
- 2Subnet selector
- 3Risk only toggle
- 4Time window selector (7d, 14d, 30d, 90d)
Graph Controls
The canvas includes:
- 1Fit (fit graph to viewport)
- 2Reflow (re-run layout)
- 3Zoom controls
- 4Fullscreen toggle
Asset Detail Panel
Selecting an asset opens a detail panel with structured sections:
- 1Asset metadata
- 2Port Evidence
- 3Fingerprint Summary
- 4AI Insights
- 5Top Risks
- 6Correlation Notes
Port Evidence
Shows correlated service observations such as:
- 1Port/protocol
- 2Service or product hints
- 3State and severity context
Fingerprint Summary
Shows fingerprint correlation details including:
- 1Target identity
- 2Highest severity
- 3Vulnerability count
- 4Misconfiguration/secret counts
AI Insights
Shows asset-linked AI summaries with:
- 1Source type
- 2Timestamp
- 3Highest risk badge
- 4Short summary lines
The panel includes a direct link to the full AI page for deeper review.
Top Risks
Lists prioritized risks with:
- 1Title
- 2Vulnerability/package/target context
- 3Effective risk level
- 4AI-provided reasoning
Correlation Behavior
CyfroSec uses conservative correlation rules. Evidence is attached to an asset only when identity mapping is reliable.
If a finding cannot be safely matched, it is kept separate from direct asset attribution to avoid false linkage.
Examples that commonly require additional context:
- 1Generic or filesystem fingerprint targets
- 2Scan artifacts without host identity metadata
- 3Ambiguous multi-host correlation paths
