Hyver User Guide
Step-by-step help — from login to daily use.
Your first steps with Hyver — from account setup and access control to configuring threat sources and settings.
Explore how Hyver calculates Cost of Breach — what it means, how it works, and why it matters.
Learn how to navigate the Risk Dashboard — track exposure, prioritize assets, and monitor mitigation and maturity trends.
Everything you need to import, edit, search, and manage assets in Hyver — including linking them to findings.
Learn how to view, prioritize, and manage findings in Hyver — including remediation assets, exposure, and ticketing.
Create, review, and manage engagements in Hyver — including assessments, limitations, and troubleshooting runs.
Explore how to build, interpret, and use the Mitigation Graph in Hyver — from attack routes to risk quantification and remediation planning.
Understand how to build and manage mitigation plans in Hyver — from plan creation to execution strategy.
Get started with Hyver’s Maturity Assessment — including NIST CSF 1.1 and 2.0 frameworks, scoring, and evaluation elements.
Learn how to create, customize, and schedule reports in Hyver — including templates, widgets, and automation.
Manage and monitor multiple organizations in Hyver — including metrics, user roles, and parent company settings.
