Jump to Content
foreseetiGuides
Guides
v1.0

Guidesforeseeti
v1.0Guides

Welcome

  • Introduction
    • FAQ

AWS

  • Integrating with AWS
  • Supported AWS services and threats

Azure

  • Integrating with Azure
  • Azure Marketplace
  • Creating a model
  • Supported Azure services and threats

On-Prem

  • On-Prem Modeling Overview
  • coreLang Language Reference
    • Application
    • ConnectionRule
    • Credentials
    • Data
    • Group
    • IDPS
    • Identity
    • Information
    • Network
    • PhysicalZone
    • RoutingFirewall
    • SoftwareProduct
    • SoftwareVulnerability
    • System
    • User
    • STRIDE mapping
  • coreLang Modeling Examples
    • Workstation
    • Server
    • VPN

securiCAD Enterprise

  • Introduction of Enterprise
  • Installation Instructions
    • Backend configuration
  • Single Sign-On
  • Get Started
    • Creating a project
    • Creating a model
    • Creating a scenario
    • Starting a scenario
    • First simulation report
  • Setup and Configuration
  • Webhooks
    • Local testing
  • Web Modeler
    • Collaboration
    • Navigation and overview
    • Creating your first model
    • Views
    • Model import and components
  • Simulation Report
  • Labs and Tunings
    • Creating tunings
    • Using tunings in simulations
  • FAQ
  • Release Notes

securiCAD Vanguard

  • Introduction of Vanguard
  • Get Started
    • Generate Model
    • Configure simulation
  • Simulation Report
    • View Model
    • Risk Exposure
    • Critical Paths
    • Chokepoints
    • Threat Summary
    • Suggested Mitigations
  • Save and Load Results
  • Integrate in CI/CD Pipeline
  • Vulnerability data
  • Videos
  • FAQ

securiCAD Professional

  • Introduction of Professional
  • Get started
  • Analysing the ACME example model
    • Attack simulations
    • Simulation Results
    • Selecting High Value Assets
    • Asset Details
    • Report Overview Figures
    • Attack Paths
    • Critical Path
    • Visualization Filters
    • Additional Attack Paths
    • Chokepoints
  • Modeling From Scratch
    • Minimalist architecture
    • The securiCAD user interface
    • Adding objects to the model
    • Connecting objects
    • Selecting type of connection
    • Adding objects instantly using arrows
    • Hiding objects
    • Introducing components
    • Host components
    • Defining a “System”
    • Object content details
    • Object views; objects within objects
    • Adding a Dataflow
    • Connecting the Dataflow
    • Allowing the Dataflow
    • Attacker
    • Simulation
  • Program Features
    • Simulation Options
    • General Views versus Object Views
    • Managing Objects and Connections Without Using the Canvas
    • Locating Objects and Connections
    • Model Structuring
    • Object Handling
    • File Handling
    • Merging Models
  • Components
    • Sharing Components
    • Creating Components
    • Custom Components Directory
    • Singular Object Components
    • Composite Object Components
    • Using Components
  • Attack Vectors
    • Attack Vector Concept
    • Attack Vector Attenuation
    • Attack Vector Descriptions - Additional Gateways
    • Attack Vector Descriptions - Insider/Burglary
    • Attack Vector Descriptions - Air Gap
    • Attack Vector Descriptions - Phishing
    • Attack Vector Descriptions - Internet
  • Behind the Scenes
    • Simulation Logic
    • Deriving Simulation Results
  • Concept - The securiCAD Approach to IT Security Analysis
    • Model your IT environment
    • Simulate an attack
    • Manage and evaluate risk exposure
  • Videos
  • securiLang Reference Manual
    • AccessControl
    • Client
    • Dataflow
    • Datastore
    • Firewall
    • Host
    • IDS
    • IPS
    • Keystore
    • Network
    • PhysicalZone
    • Protocol
    • Router
    • Service
    • SoftwareProduct
    • User
    • UserAccount
    • VulnerabilityScanner
    • WebApplication
    • WebApplicationFirewall
    • ZoneManagement
    • Attacker
  • Download File Hashes

Simulation Results

Suggest Edits

This module will give you an orientation on what different types of results such a report contains.

Updated over 1 year ago


What’s Next
  • Selecting High Value Assets