Interact with Attack Path Query Data

After running an Attack Path Query, Tenable Exposure Management displays the results associated with your query. From here, you can drill-down and interact with the data to gain further insights into the attack path, the nodes techniques involved, and how these could affect your overall security.

To view and interact with attack path query data:

  1. Create one of the following query types:

    • Use the Query Builder to generate a custom query.

      • Generate an Asset Exposure query to visualize attack paths from multiple assets down to one asset.

      • Generate a Blast Radius query to visualize attack paths from one asset to multiple other assets.

    • Use a Built-in Query in the Query Library to generate a pre-configured query.

    The Query Result page appears.

  1. On the Query Result page, you can:

    Note: Because the options and data in this section depend on the type of query you run, some items listed below may not be available for your query.

    • View a list of attack paths that match your query. This table includes the following attack path information:

      Column Description
      View Graph Click the button to view the attack path in a graphical format. For more information, see View the Attack Path Graph.
      Name The attack path name.
      Path Priority Rating

      A prioritization metric for attack paths based on the exposure of the source, criticality of the target and the number of steps of the attack path. Higher PPR indicates higher risk.

      Nodes

      The asset nodes associated with the attack path. If there are multiple nodes within the attack path, Tenable Exposure Management inserts directional arrows to show the direction of the path to and from each node.

      Tip: Hover your mouse cursor over the icon in this column to view the full name of the node type.
      Actions

      Click the button to view available actions.

      A menu appears:

      • Click View Attack Techniques to navigate directly to the Top Attack Techniques page filtered by the selected attack path.
      • Click Export as CSV to export the attack path information as a .csv file.

    • (Not available in FedRAMP environments) Click the button to expand an AI generated summary of the attack path.