Asset context panel
Reveal module — Core sections are available to all clients. Hygiene, vulnerabilities, security controls, points of interest, and attack path visualization require the Reveal add-on module.
The asset context panel is the analyst’s command window for understanding an asset’s full context — its identity, posture, vulnerabilities, and recent behavior — directly within your investigation workflow.
It appears as a slide-out panel accessible from any alert, event, or case where an asset is mentioned, or via the asset listing table.
Instead of switching between inventory pages, a configuration management database (CMDB), vulnerability management (VM), or endpoint detection and response (EDR) tools, analysts can instantly see who or what the asset is, how it’s behaving — now and historically — and how well it’s protected in one place.
Availability
- All clients: core sections — overview, asset details, recent activity, related alerts/cases/events, timeline.
- (Reveal specific capability): extended sections — hygiene, vulnerabilities, security controls, points of interest (PoIs), applications (coming soon).
Note
To learn how assets are configured and discovered, see Collect → Assets.
Accessing the asset context panel
The panel is designed for contextual investigation, letting you open it from where you work:
- From alerts: click the affected host, user, or IP asset.
→ Instantly view posture, vulnerabilities, and related alerts.
Typical usage: during triage, verify whether the asset is critical or recently compromised. - From events: click any field linked to an asset (e.g., hostname, username, IP).
→ See who or what generated the event and whether it is part of a larger pattern. - From cases: click any listed Affected asset.
→ Correlate incidents affecting the same asset. - From asset listing (Configure → Assets): click the asset context panel icon on the right side of the listed asset.
→ Instantly view all contextual information known about that asset, including identifiers, posture, vulnerabilities, and recent activity.
Why it matters
During an active investigation, analysts need to pivot fast. Every external click — to a CMDB, EDR console, or VM dashboard — adds friction and increases the risk of misattribution.
The asset context panel eliminates this by bringing context, coverage, and posture directly into the investigation view — helping analysts move from alert to understanding in a single step.
Overview tab
The overview tab summarizes the asset’s identity, business relevance, and current review status, helping analysts assess how critical it is to the organization before acting and navigate known details.
Header card
Displayed fields
- Asset risk score (ARS) — coming soon
- Name & type: host, account, or network
- Criticality: configured asset criticality (0–100)
- Verified by: user who verified the asset
- Status: reviewed or unreviewed
- Communities: communities the asset is part of
- First seen: when the asset was first seen by a discovery source
- Last seen: when the asset was last seen by a discovery source
- Note: fields differ by asset type and discovery source.
Why it matters during investigations
- Prioritization: analysts must respond faster to alerts on high-impact systems (e.g., domain controllers or production databases).
- Attribution: identifies the business unit or owner to contact for containment, access suspension, or post-incident communication.
Ransomware triage scenario
A ransomware alert targets FIN-SRV01. The header card shows it is a finance system tagged as critical and owned by the CFO's department. This routes containment to the right team immediately, reducing dwell time.
Details card
The details section provides the technical identifiers used to recognize and correlate this asset across multiple data sources.
Displayed fields
- All asset types: description, tags, identified by
- Hosts: hostname, IP addresses, Sekoia agent, operating system, domain/FQDN
- Users: username, full name, role, email, department, account state, last password change, key privileges
- Networks(Coming soon): IP/CIDR ranges, VLAN/segment
Additional options
- View more details: Open the full list of known details for the asset. You can mark any field as a favorite from this view.
- Your favorite details: Shows all fields you have marked as Favorites. Favorites are personal and persist on a per–asset-type basis.
Why it matters during investigations
- Correlation: analysts can pivot across EDR, identity, network, and vulnerability logs using consistent identifiers.
Lateral movement identification
A host appears in a lateral-movement alert with IP 10.10.2.45. The details card shows the same IP belongs to HR-LAPTOP07, last seen by CrowdStrike and identified as Windows 11. Identity and scope are confirmed in seconds.
Health check card (Reveal specific capability)
Availability: host assets
The health check card provides a high-level overview of known vulnerabilities and misconfigurations on the viewed asset.
It helps analysts quickly assess overall security posture and determine whether an asset is well protected or needs remediation.
Purpose
- Offer a snapshot of asset health by summarizing active vulnerabilities and hygiene issues.
- Display the security controls currently in place to protect the asset.
- Help analysts identify pivot and remediation opportunities during investigations.
Security controls
Lists the active asset connectors and intakes contributing telemetry or protection for the asset, indicating:
- Which defensive technologies are in place (e.g., EDR, vulnerability scanner, CMDB).
- What contextual or remediation actions are available (e.g., isolate host, trigger patch scan).
Open vulnerabilities
Shows the number of open vulnerabilities affecting the asset. Items can be set to:
- Accepted risk — justified exception
- False positive — invalid/irrelevant
- Remediated — no longer present on the asset
Misconfigurations
Displays the number of configuration or posture issues identified (e.g., disabled firewall, missing encryption).
Why it matters
- At-a-glance posture: aggregates multiple data sources into a single, interpretable summary.
- Faster triage: prioritize assets with both critical vulnerabilities and poor hygiene.
- Context for action: seeing which connectors protect an asset clarifies available playbooks and containment paths.
- Visibility gaps: absence of certain controls (e.g., no VM data) highlights where additional integration may be required.
Seen in (last 30 days) card
The seen in (last 30 days) card shows how frequently the asset has appeared in recent security activity, aggregating counts across alerts, cases, PoIs, and events related to the asset.
What it shows
- Alerts: number of detections that referenced this asset
- Cases: number of investigations involving this asset
- PoIs: number of behavioral anomalies observed for this asset
- Events: total raw telemetry events linked to this asset
Each counter links to its respective view (filtered to the asset and time range) for rapid drill-down.
Last 5 severe alerts and cases (last 30 days) card
A compact card listing the five most severe items (by severity, then recency) involving the asset over the last 30 days. Use it to spot high-impact activity at a glance and jump straight into the most urgent investigations.
Displayed fields
- alert or case name, severity, and age
Why it matters
- Campaign correlation: several alerts on the same host (failed logins, unusual tools, privilege escalation) often indicate an active compromise chain.
- Case enrichment: attach new findings to an existing incident instead of opening a duplicate case.
Lateral movement correlation
ADMIN-LAPTOP01 triggered a suspicious PsExec alert and a credential dumping case. Linking both identifies lateral movement tied to a stolen admin account.
Timeline tab (all clients; enriched with Reveal specific capability)
The timeline provides a unified, chronological record of relevant activity for a specific asset, bringing together alerts, points of interest (PoIs), vulnerabilities, and case associations into a single stream.
Displayed items
- Alerts (rule/analytics detections)
- Case associations (when the asset is seen in a case)
- PoIs (UEBA anomalies and notable activities) (coming soon)
- Hygiene (Changes to asset hygiene posture) (coming soon)
- Vulnerabilities (identified exposures related to the asset) (coming soon)
Each entry represents a significant observation tied to the asset.
Entries are automatically timestamped and iconized by category (alert, case, PoI, vulnerability) and color-coded by severity.
Clicking an item triggers available pivots (e.g., clicking an alert opens the alert details view).
Reveal enrichment
With the Reveal add-on module, the timeline includes PoI signals, vulnerability enrichments, and hygiene changes.
Using Point of Interest (PoIs) in the timeline
PoIs capture anomalies and behavioral deviations that may precede or follow alerts — filling gaps between rule-based detections.
PoIs
- anomalous login time (user or host)
- rare login location (user or host)
- anomalous login failure ratio (user or host)
Why PoIs matter
1) Connect subtle signals into a coherent narrative.
2) Correlate with detections before/after alerts (e.g., failed logons → successful RDP → SYSTEM process creation).
Related events tab
The related events tab provides an investigative view of all events associated with the asset. It enables analysts to visualize activity volume and drill into telemetry without leaving asset context, bridging summarized context (overview, timeline) and underlying evidence.
Top of the view
- Event histogram: distribution over time to spot patterns
- Filter bar: adjust time range, connectors, or field filtering
- Totals: event count and number linked to alerts
Event list
Each row in the event list includes:
- Timestamp
- Event type and action
- Short description (process execution, logon, network connection, etc.)
- Linked asset(s)
- Quick actions (expand raw event, assign to case)
Why it matters
- Efficient triage: spot abnormal activity windows quickly
- Evidence-driven analysis: access exact telemetry
- Forensic traceability: assigned events become case evidence
- Cross-source correlation: endpoint, identity, and network in one place
Hygiene tab (Reveal specific capability)
The hygiene tab provides visibility into the asset’s security posture and configuration health based on the Sekoia endpoint agent and connected integrations.
It highlights disabled encryption or disabled firewall and other missing protections that increase exposure and impact.
Summary cards
- Firewall: enabled/disabled
- Disk encryption: global state and per-volume details
Why it matters
- Root-cause validation: hygiene exposes weaknesses that enabled compromise.
- Containment prioritization: poor posture on high-value assets warrants immediate action.
- Post-incident remediation: validate protections were restored.
Vulnerabilities tab (Reveal specific capability)
The vulnerabilities tab lists known CVE exposures affecting the asset, aggregated from vulnerability scanners and cloud/IaaS APIs.
Use it to understand exposure, validate exploit alignment, and prioritize remediation.
List columns
- Status:
Open,Closed: Accepted risk,Closed: False positive,Closed: Remediated - CVE ID: linked to Sekoia cyber threat intelligence (CTI)
- Severity: CVSS (v3/v4 when available)
- CWE: weakness category
- Unified risk score (1–100): normalized across vendor-specific scoring systems (see Normalization below)
- Software / Version: affected product and version
Expanded row
- Description (source/CTI)
- Identified by (scanner/connector/job)
- Closed by (user/process, if available)
- First seen / Last seen
Normalization (unified risk score)
Different sources score severity/risk differently. The unified risk score (1–100) translates each source into a comparable “risk level”. It is not the same as CVSS: it reflects contextual risk, aligning disparate vendor scales.
Method
1) Normalize any vendor range (e.g., 0–10, 0–5) to a 0–100 percentage.
2) Adjust direction: if a score means higher = safer, invert so 100 = highest risk.
3) Clamp & round: keep within 1–100; missing/invalid → N/A.
Why it matters
- Threat alignment: if an alert technique exploits a listed CVE, prioritize containment/patching.
- Attack-surface clarity: explains plausible entry points and lateral paths.
- Operational prioritization: escalate high-risk items to vulnerability ops; link to the active case.
Exploit alignment during a web server incident
A remote file inclusion alert (ATT&CK T1190) targets a web server. The vulnerabilities tab shows CVE-2023-28432 on the same application version with a high unified risk score. The recommended action is to isolate the host, patch urgently, and document exploit alignment in the case.
Software tab (coming soon)
Security controls tab (Reveal specific capability)
The security controls tab visualizes which detection and protection technologies are actively securing the asset — a clear view of telemetry posture (how the asset was discovered and which controls observe/protect it).
Asset connectors
Connectors that discovered or enriched the asset (e.g., EDR such as CrowdStrike/HarfangLab; VM such as Tenable). Use this to identify which technologies provide visibility/protection, where to pivot, and whether gaps exist (e.g., only logs, no active monitoring).
Seen by
Intakes and technologies that have observed the asset recently (e.g., proxy, endpoint agent, identity provider). Presence indicates data visibility from that source.
Why it matters
- Coverage validation: quickly spot endpoint/identity/network blind spots.
- Response planning: confirm protective agents/integrations before containment.
- SOC maturity: continuously improve visibility and control coverage.
Detecting a visibility gap on a domain controller
A high-value domain controller appears in network telemetry and vulnerability management scans but not in endpoint or identity logs. This explains why credential-access activity was not detected. The recommended action is to deploy endpoint monitoring on the asset.
Attack path visualization (Reveal specific capability)
The Attack path visualization displays a graph of connected hosts and users that may form a potential attack path from the current asset, helping analysts assess lateral movement risk and blast radius without leaving the asset context.
What it shows
- Hosts, users, and accounts connected to the current asset through observed authentication relationships
- Node color reflecting configured asset criticality
- Satellite indicators summarizing active alerts, cases, vulnerabilities, and hygiene issues per node
Why it matters
A single exposure is not always critical on its own. Its impact depends on what it can lead to. The attack path visualization tab lets analysts immediately assess whether a compromised or exposed asset provides a path to a more sensitive target, and where remediation would have the greatest effect.
For a full explanation of the graph, node types, navigation controls, and remediation workflow, see Attack path visualization.
Related links
- Attack path visualization — How to open and interpret the attack path graph from the asset context panel, including node types, satellite nodes, and remediation prioritization.
- Points of interest — How Reveal surfaces behavioral anomalies on assets, including UEBA rules and how to interpret PoI signals during triage.
- Asset connector health status and logs — How to monitor asset connector error states and investigate synchronization issues using connector logs.
- Collect — Assets — How assets are configured, discovered, and managed in Sekoia.