Network Topology
Last updated
Last updated
In this section, users will explore the intricate web of connections that form the backbone of their organization's digital infrastructure. Network topology refers to the layout or structure of a network, illustrating how devices and systems are interconnected and communicate with each other.
Understanding the network topology is essential for maintaining a secure and efficient computing environment. It allows users to visualize the relationships between different network components, such as computers, servers, routers, switches, and other devices. By gaining insights into the topology of the organization’s network, users can identify potential bottlenecks, points of failure, and security vulnerabilities.
The "Network Topology" section also represents the number of subnets in the network and how each subnet is connected with the others. Additionally, it shows that each subnet has a number of assets with different types.
In the example provided within the Topology Range section, users are presented with a visual representation of their network infrastructure. This includes a representation of two distinct subnets, each clearly labeled and accompanied by the corresponding IP range at the top. Additionally, users can observe the total number of assets currently residing within each subnet. This intuitive display allows users to easily understand the layout and distribution of network devices and systems, facilitating effective management and analysis of their network topology.
By clicking on an asset, users can view a complete list of properties, including information such as port, service, protocol, and more. This feature enables users to gain deeper insights into the characteristics and configurations of individual network assets. Moreover, the editable nature of these properties provides users with the flexibility to update and customize asset details as needed, ensuring accurate and up-to-date documentation of their network infrastructure.
There is a search function that enables users search by their IP addresses. This feature helps users quickly find and manage specific assets within the network.
The Filter panel in this view allows users to refine their search and view assets based on specific criteria, making it easier to locate and prioritize vulnerable assets within the network. Here’s a breakdown of the filter options available:
Vulnerabilities Severity
Users can filter assets based on the severity of their vulnerabilities. The options include:
All Vulnerable Assets: Displays all assets with vulnerabilities.
Critical: Shows only assets with critical vulnerabilities, which require immediate attention.
High: Displays assets with high-severity vulnerabilities.
Medium: Shows assets with medium-severity vulnerabilities.
Low: Lists assets with low-severity vulnerabilities, considered less urgent.
Each severity level is color-coded (e.g., red for Critical, orange for High) to help users quickly identify and prioritize issues.
Asset Security Posture
This filter allows users to view assets based on their overall security health:
All: Displays all assets, regardless of security posture.
Excellent, Good, Fair, Poor: Users can select specific security postures to focus on assets with lower security ratings, indicating higher risk.
Asset Type
Users can filter assets by their type, allowing for targeted assessments of particular categories of devices:
All: Shows all asset types.
DbServer, PC, WebServer: Users can select specific types of assets, like servers, personal computers, or web servers, to focus on vulnerabilities within these categories.
By clicking on the comment button, administrators can conveniently add comments to specific network assets, allowing them to share observations or instructions with other team members. This cooperative commenting feature facilitates effective communication within the team, enabling administrators to provide context, clarification, or feedback directly within the platform.
Properties Panel
On the right side, the Properties panel provides a detailed view of a selected asset, including options to edit certain properties:
IP Address and MAC Address: Basic identifying information for the selected asset.
Up Time: Indicates the duration for which the asset has been running without interruption.
Add Asset Criticality: Allows users to assign a criticality level to the asset, choosing between Low, Medium, and High to help prioritize its importance in the network.
Security Posture: Shows an assessment of the asset’s security health (e.g., “Good”).
Port, Protocol, Service, and Vulnerability: A breakdown of each open port, its associated protocol, running services, and any detected vulnerabilities on that port.
Operating System(s): Displays the detected operating system, including version and accuracy.
Users are equipped with useful view management tools to tailor their viewing experience to their preferences. These intuitive buttons offer users the ability to maximize their view, providing a detailed and full overview of their network topology.
At the top of the page, users have access to a useful button that enables them to change the page view according to their preferences. This feature offers users the flexibility to switch between different page views, allowing them to customize their experience based on their specific needs and preferences. Whether they prefer a compact view or a detailed view for in-depth analysis.