Skip to main content

Displaying Critical to Block Findings

How to quickly view findings that pose the highest risk to business-critical assets.

Overview

This article shows you how to use the Critical to Block button to view high-risk findings that should be prioritized for remediation.
These findings are calculated by the Cye platform to be especially dangerous — often because they provide direct attack routes to critical business assets.


What Are Critical to Block Findings?

Critical to Block findings are the Cye platform's highest-priority recommendations for mitigation. These findings should be fixed first because they play a key role in cutting off attacker routes to your business-critical assets.


Why They Matter

These findings are not just high severity — they're strategically important within the attack graph. Fixing them disrupts key pathways and weakens the attacker's ability to reach high-value targets.

  • They are identified using the Cye platform's Org. Attack Graph.

  • Each one sits on a route that, if left open, leads to business assets.

  • Addressing them has the most immediate and measurable impact on reducing exposure.


How They Appear in the Graph

When viewing the Org. Attack Graph, you'll see a filter labeled Critical to Block:

  • This filter is enabled by default.

  • It's strongly recommended to leave it turned on.

  • When enabled, Critical to Block findings are shown as turquoise lines.


How to Filter Critical to Block Findings on the Findings Page

  1. Click the Critical to Block button
    At the top of the Findings page, click Critical to Block.

  2. Look for the highlighted filter
    Once active, the Critical to Block button will be highlighted, and a Clear option will appear next to it.

  3. Clear the filter if needed
    Click Clear to remove the filter and return to the full findings list.


Important notes

  • This is a quick filter and will automatically switch the page to the All Findings view.

  • Critical to block findings are calculated based on likelihood and potential business impact.


Wrap-up / Next Steps

Use the Critical to Block view when you want to focus on the vulnerabilities that disrupt attack routes — it's the fastest way to surface the findings that block access to your business-critical assets.

Did this answer your question?