Overview
This article explains how to view and interact with assets discovered during your engagement in Hyver. You'll learn how assets are collected, how to explore them in the Assets page, and how to flag high-risk items. This helps ensure full visibility over your environment before starting mitigation planning.
Steps
1. Open the Assets page
Click Assets in the left navigation pane.
This opens a full list of discovered assets within the current engagement — these are all potential access points that could be leveraged in an attack.
2. Understand how assets are collected
Hyver gathers asset data through both:
Passive assessment – intel collected before an attacker breaches your environment
Active assessment – intel gathered after potential access has been achieved
You can also manually upload assets using a CSV file.
3. Explore asset details
Each row in the list represents a unique asset. Clicking any row opens detailed information in the right pane.
4. Customize your view
You can choose which columns to display, depending on what you want to focus on (e.g., open ports, CVEs, asset type).
5. Review and verify asset scope
Use this page to verify that all company assets in scope are included. Make sure no unexpected or unknown assets appear.
6. Identify high-risk assets
Look for assets that:
Have open ports
Are linked to known CVEs
You may want to tag or mark these for easier tracking and mitigation later on.
Important notes
This view reflects only the assets identified during the current engagement.
Asset metadata (such as open ports or CVE flags) helps prioritize what needs attention.
CSV uploads are optional and allow for manual enrichment.
Wrap-up / Next Steps
The Assets page gives you a live view of your environment’s footprint. Take time to explore and mark high-risk entries — it’ll make your mitigation work much smoother down the line.


