# Analysing scan results

### Understanding Statistics

Each module has a Statistics view with severity and vulnerability breakdowns.

1. Go to **Modules** → **\[External/Internal]** → **Statistics**
2. View:
   * Severity distribution
   * Vulnerability types
   * Counts by category
   * Trends over time

{% content-ref url="/pages/TJuUXyT5cbg1xFPAH61r" %}
[Statistics](/enterprise/modules/statistics.md)
{% endcontent-ref %}

### Reading Attack Paths

Attack Paths show how vulnerabilities chain together to reach a target.

1. Go to **Modules** → **\[External/Internal]** → **Attack Paths**
2. Use filters:
   * Severity
   * Vulnerability type
   * Subnet (internal)
   * Certainty
3. Click a path to see the full chain
4. View vulnerability details, exploit chain, and metadata

{% content-ref url="/pages/Qq4eYhCnXnWRSOdpI5cq" %}
[Attack Paths](/enterprise/modules/attack-paths.md)
{% endcontent-ref %}

### Generating and Downloading Reports

1. Go to **Reports** (`/app/reports`)
2. Select the assessment scope (domain, entity, time range)
3. Click **Generate Report**
4. Wait for generation to complete (check status if needed)
5. **Download** the report (PDF or configured format)

#### Report Contents

Reports typically include:

* Executive summary
* Discovered assets
* Findings and risk summary
* Key vulnerabilities
* Attack paths
* Test coverage analysis (vulnerability testing coverage)
* Remediation recommendations

{% content-ref url="/pages/5R9A4WOfbwrPI78VKDKg" %}
[Reports](/enterprise/reports.md)
{% endcontent-ref %}

### Understanding the Exploit Graph

The Exploit Graph visualizes how vulnerabilities connect and how an attacker could move through your environment.

1. Go to **Attack Dashboard** → **Exploit Graph**
2. The graph shows:
   * **Nodes**: Assets (domains, hosts, URLs) and vulnerabilities
   * **Edges**: Relationships and attack paths
3. **Expand nodes** to drill down
4. Use **FTS** (Full-Text Search) to find specific nodes
5. View **memories** and **paths** for context

{% content-ref url="/pages/SVOgW3WWDsCNP6N3NZ7R" %}
[Exploit Graph](/enterprise/exploit-graph.md)
{% endcontent-ref %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://copilot-docs.bugbase.ai/enterprise/analysing-scan-results.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
