Skip to main content

Hyver User Guide

Step-by-step help — from login to daily use.

289 articles
Hyver User GuideUnderstand how to use Hyver to assess, quantify, and mitigate cyber risk across your organization.
Hyver Features OverviewExplore the core features of Hyver that help you assess and reduce cyber risk across your organization.
CYE AI: Instant clarity on your cyber exposureUnderstand what CYE AI is, how it helps you analyze and optimize your security posture, and how it keeps your data private and secure.
What Can I Ask CYE AI?Explore the types of questions CYE AI can answer right now — from findings to mitigation plans.
Hyver — AI Governance OverviewThis document outlines how Hyver’s Cyber Exposure Management platform adheres to core AI principles guiding the development and operation of all AI features
Before You StartKey concepts and requirements to know before using Hyver — including roles, permissions, and platform basics.5 articles
Logging in to HyverAll you need to log in to Hyver — from registration and credentials to signing in with Google or Okta.8 articles
2FA Enforced Hyver LoginHow to set up and manage two-factor authentication in Hyver — including access, resets, and session settings.4 articles
Defining Business AssetsLearn how to define, review, and manage business assets as part of your risk analysis in Hyver.2 articles
Defining EngagementsHow to set up and manage engagements in Hyver — including cloud, internet perimeter, and more.6 articles
Configuring Hyver settingsManage all Hyver settings — including user profiles, access control, SSO, risk modeling, and more.24 articles
Tags in HyverUnderstand and manage tags in Hyver — how to create, use, and organize them effectively.4 articles
Managing Assets

Everything you need to import, edit, search, and manage assets in Hyver — including linking them to findings.


Searching for Specific AssetsSearch by name, version, or attributes to locate relevant assets in Hyver.
Adding a List of Assets to a FindingLink a group of assets to a finding by exporting and importing filtered asset lists.
Viewing Findings Linked to a Specific AssetSee and edit the findings tied to a specific asset in your environment.
Remediating Asset FindingsView and fix findings tied to specific assets to improve your security posture.
Editing Assets to Define RelevanceSet asset relevancy, scope, importance, and tags to reflect your assessment focus.
Deleting AssetsRemove assets you’ve added or imported — with a few key limitations.
Exporting AssetsExport filtered assets from Hyver to an Excel file for offline use.
Importing Assets into HyverUnderstand how asset import works and where imported data appears in Hyver.
Import Assets (CSV)Upload assets into Hyver using a CSV file and custom field mapping.
Manually Adding an AssetCreate a new asset manually and assign it to an engagement.
Adding Technology AssetsManually add security technologies like EDR or SIEM and link them to NIST subcategories.
Adding Process AssetsManually add internal security processes to improve maturity scoring.
Asset InheritanceUnderstand how asset relationships affect visibility, relevancy, and scope.
Viewing Assets in HyverExplore and manage all assets discovered during your engagement.
Understanding Asset Details in the Right PaneView in-depth information for each asset in Hyver’s right-side panel.
Displaying Vulnerable AssetsSee which assets are linked to active findings in your environment.
Displaying Recently Detected AssetsFind newly discovered assets since your last visit or within the past 30 days.
Viewing the Main Assets SummaryUse the top section of the Assets page to filter by domains, IPs, or services.
Working with FindingsFrom adding and editing to exporting and overriding — everything you need to manage findings in Hyver.37 articles
Viewing FindingsLearn how to view, search, filter, and customize findings in Hyver — including DORA-related violations.11 articles
Managing a Finding’s Remediation AssetsHow to add, edit, review, and organize remediation assets linked to findings — including CVEs and risk acceptance.11 articles
Importing Remediation Assets from a CSVLearn how to import, manage, and delete remediation assets using CSV files in Hyver.4 articles
Findings DashboardExplore how to use the Findings Dashboard to track trends, prioritize risks, and analyze vulnerabilities by domain, type, and behavior.8 articles
Finding VersionsLearn how Hyver tracks and displays finding versions — including version details, statuses, and how to check them.4 articles
Finding Exposure QuantificationUnderstand how Hyver quantifies exposure — from calculation methods to prioritizing findings based on risk reduction.3 articles
Exposure Version 2Compare Exposure V1 and V2 to understand what’s new, what’s improved, and how calculations differ.1 article
Mitigation Graph

Explore how to build, interpret, and use the Mitigation Graph in Hyver — from attack routes to risk quantification and remediation planning.


Mitigation Graph OverviewLearn how Hyver's mitigation graph maps attack routes and helps prioritize remediation efforts.
Mitigation Graph ComponentsUnderstand each component of the mitigation graph and how it represents threats, assets, and vulnerabilities.
Attack Routes in the Mitigation GraphUnderstand how attack routes illustrate threats to your business assets and help prioritize remediation.
Findings and Positions in the Mitigation GraphLearn how to view and explore findings and positions directly from the mitigation graph.
Searching in the Mitigation GraphFind specific findings, positions, or assets quickly using the search feature in the mitigation graph.
Working with Positions in the Mitigation GraphLearn how to move, edit, and manage positions in the mitigation graph to organize and analyze attack routes.
Mitigation Graph ToolsExplore the key tools available in the mitigation graph toolbar to search, edit, and plan effectively.
Quantification of Cyber RiskUnderstand how Hyver calculates cyber risk and prioritizes mitigation based on real-world attack routes and business impact.
Graph AuditTrack changes to the mitigation graph using the History tab, visible to users with edit permissions.
Tips for Building Attack RoutesFollow these best practices to build clear, accurate, and high-impact attack routes in the mitigation graph.
Maturity Assessment

Get started with Hyver’s Maturity Assessment — including NIST CSF 1.1 and 2.0 frameworks, scoring, and evaluation elements.