Organization Settings
This section provides advanced control over subdomain asset classification.
All discovered subdomains are listed (e.g.,
apps.example.com,example.com).Subdomain Risk Level Classification
Each discovered subdomain is assigned a risk level classification to help prioritize monitoring and remediation efforts. These levels indicate the potential impact of a compromise on the organization:
Informational
Represents assets that have little to no security impact. Typically includes marketing pages, documentation, or test environments with no sensitive data. They are monitored but do not require urgent attention.
Low
Assets that have minimal exposure or limited functionality. A compromise here would not directly affect critical systems but should still be addressed to prevent exploitation.
Medium
Subdomains with moderate risk they may include login portals, APIs, or secondary applications. A breach could expose data or provide attackers with a foothold into the environment.
High
Assets directly tied to business operations or sensitive processes. If compromised, they could significantly affect services, customer data, or internal systems. These require active monitoring and prioritized remediation.
Critical
The most sensitive and business-impacting assets. Examples include core applications, financial systems, or platforms handling authentication and customer data. Any compromise here poses a severe threat to the organization and must be addressed immediately.
Security teams can manually adjust classifications, ensuring prioritization aligns with business impact.
Changes can be saved with “Save Edits”, allowing continuous fine-tuning of risk levels.
This flexibility makes it easy to differentiate between harmless informational assets and truly critical infrastructure.
Last updated
Was this helpful?