# Use Cases

This document includes these sections:

[**Overview**](https://docs.reveald.com/technical-documentation/use-cases/overview)

[**6 Essential Cybersecurity Questions**](https://docs.reveald.com/technical-documentation/use-cases/6-essential-cybersecurity-questions)

[**Validate and Manage Assets and Devices in Your Environment**](https://docs.reveald.com/technical-documentation/use-cases/validate-and-manage-assets-and-devices-in-your-environment)

* Scenario 1: Identify Systems With Specific Characteristics
  * Solution: Epiphany’s Combined Asset Inventory
* Scenario 2a: Locate Systems Where Agents Need to be Installed, Fixed, or Reconfigured
* Scenario 2b: Discover Devices and Agents That Were Thought to be Decommissioned but\
  are Still in Use
  * Solution: Epiphany’s Rogue System Detection
    * Query via Set Logic in Rogue
* Scenario 3: Quickly Locate Information About Devices, IP Addresses, Users and More
  * Solution: Epiphany’s “Explorer” Style Search Across Data Sets

&#x20;[**Deep Inspection and Audit of Identity Services**](https://docs.reveald.com/technical-documentation/use-cases/deep-inspection-and-audit-of-identity-services)

* Scenario 1: Consistently Audit Domain Administrators and Groups With Admin Rights
  * Solution: Use Epiphany’s Active Directory to do deep inspection of accounts and groups
* Scenario 2: Manage Account Policy&#x20;
  * Solution: Epiphany’s Active Directory Shows Stale Users and Users with Credentials that are Easily Exploitable
    * Effective Local Admin Rights Detail

[**Manage Exploitability**](https://docs.reveald.com/technical-documentation/use-cases/manage-exploitability)

* Scenario: A Scan Shows Massive Number of Vulnerabilities That Must be Addressed
  * Solution: Epiphany’s Vulnerability Overview and Detail
    * Vulnerability Breakdown by Risk to the Organization
    * Vulnerability Detail

[**Manage Business Impact**](https://docs.reveald.com/technical-documentation/use-cases/manage-business-impact)

* Scenario: Your Organization Needs to Know How an Adversary Can Impact Assets in a Specific Part of the Business
  * Solution: Epiphany’s Business Impact Matrix
    * Addition of Assets Into an Impact Matrix

[**Effectively Manage Attack Paths to Enable Better Risk Decisions**](https://docs.reveald.com/technical-documentation/use-cases/effectively-manage-attack-paths-to-enable-better-risk-decisions)

* Scenario: Changes to User Permissions, Hardware, and Networking Parameters Introduce Risk and Blue Teams Work to Uncover Issues&#x20;
  * Solution: Epiphany Provides Detailed Information about Attack Paths&#x20;
    * Top Attack Paths Dashboard Widget&#x20;
    * Attack Paths Prioritized by Criticality, or Optionally by Business Impact Matrix Group&#x20;
    * Detailed Attack Path With Remediation Guidance at One Traversal Point&#x20;
    * Recommendations Engine in Attack Path Detail
