π€Finding Details
Last updated
Last updated
To view extended information for a single finding, click "view" next to a monitor result. This will open that finding's details:
If you've integrated P0 with Jira, you can assign findings for resolution. By default the assignee is manually assigned by you. If you've configured P0 for automatic assignment, assignees will be determined by the configured resource owner for the target scope in which the finding was discovered.
The created Jira ticket contains the finding description, finding context, and, if available, the resolution commands.
To ignore a finding, click the "Ignore" button on that finding's details. The finding will no longer appear in your results, unless you select "Ignored" in the results views.
For P0-provided monitors, P0 provides cloud shell commands that will resolve the finding. For example, for the "Unused Privileged Access" finding, P0 will provide commands to replace the vulnerable entitlement with a least-privilege entitlement.
You can add notes, including business justifications, to findings by typing notes on the finding's details page.
Below the finding actions, P0 displays a graphical representation of the findings attack path: How an actor holding the identity can gain risky access to your system.
The remainder of this page shows detailed information for the finding, and explains why this finding matched the monitor's search. For an explanation of this information, see Result Details.
The attack path view has the same capabilities as the in the Access Inventory.