Skip to main content

Activate Asset Discovery Engagement

Set up and activate an Asset Discovery engagement to map your external attack surface.

Updated over 5 months ago

Overview

An Asset Discovery engagement identifies your organization’s internet-facing IT assets — both hardware and software — that may be exposed to external attackers. This is typically the first engagement you’ll run in Hyver, forming the foundation for future assessments and mitigation planning. 


What is Asset Discovery?

Asset Discovery is a passive scan that catalogs all internet-facing assets tied to your organization. It helps you understand your attack surface and enables Hyver to begin associating those assets with findings and risk.


How to Activate an Asset Discovery Engagement

Step 1: Create the Engagement

  1. Go to the Engagements page from the left navigation.

  2. Click + New Engagement:

  3. Enter the engagement details — name, type (Asset Discovery), and a description.

  4. Define the scope of the assessment by specifying:

    • Top-level domains

    • IP ranges

    • Static IPs

  5. (Optional) Import a list of assets into the scope.

  6. Click Create to save the engagement.

  7. (Optional) Add members to give others access to this engagement.


Step 2: Activate the Engagement

After creation, the engagement will appear in the Waiting for Activation section.
Your CYE account manager typically activates this engagement for you.

Once activated, it will move to the Active section and the scan will begin.


Step 3: Review the Results

When the scan completes, discovered assets will appear in the Assets tab.
Use this view to:

  • Edit asset details

  • Define asset relevance and importance

  • Begin associating findings or mitigation steps


Important notes

  • This is usually the first step in onboarding with Hyver

  • The assessment must be scoped correctly before activation

  • Only CYE can activate this engagement

  • Scans rely on valid, static, organization-owned IPs or domains


Wrap-up / Next Steps

Once Asset Discovery is complete, you’ll have a clear, verified list of internet-facing assets. This sets the stage for perimeter assessments and mitigation planning. From here, you can begin managing findings, editing asset attributes, and strengthening your external defenses.

Did this answer your question?