Navigating the Platform
Guard is built around four core workflows that take you from discovery to remediation. This guide maps out where everything lives and how the pieces connect.
Core Workflows
1. Discovery Workflow
The discovery workflow is how Guard maps your attack surface. It follows a linear progression:
Seeds (your starting points) → Preseeds (review and approve discovered candidates) → Assets (confirmed inventory) → Scanning (automated assessment) → Risks (findings) → Remediation (resolution)
You provide seeds — domains, IPs, CIDR ranges — and Guard expands outward, discovering everything connected to your organization. Preseeds let you review what Guard found before promoting items to full assets. Once promoted, assets are scanned automatically.
2. Scanning Workflow
Control how Guard scans your environment:
Configure rate limits — Go to Settings > Scan Settings to set simultaneous hosts and request rates
Enable capabilities — Choose which scanning modules run against your assets
Monitor jobs — Track scan progress and completion
Review findings — Examine risks as they come in, prioritized by severity
3. AI Workflow
Guard includes three tiers of AI assistance, each building on the last:
AI Inference (Query Mode) — Ask natural language questions about your data. "Show me all critical risks on public-facing assets."
AI Automation (Background Agents) — Enable agents that continuously analyze your environment and surface insights.
Agent Mode (Aurelius + Specialist Agents) — Full autonomous operation where Aurelius coordinates specialist agents to investigate, correlate, and recommend actions.
4. Integration Workflow
Connect your existing security tools and let Guard normalize the data:
Connect external tools — Link scanners, cloud providers, EDR, and SIEM platforms
Guard normalizes data — All findings are mapped to a unified schema
Unified view — See results from every scanner in a single, consistent interface
Quick Reference — "Where Do I Find...?"
Understanding Asset Types
Guard discovers and categorizes assets across your entire attack surface:
Understanding Risk Severity
Guard assigns severity to every risk using multiple intelligence sources:
CVSS-based scoring — Industry-standard base scores enriched with exploit intelligence. Guard adjusts severity when real-world exploit data changes the risk profile.
CISA KEV status — Risks flagged in the CISA Known Exploited Vulnerabilities catalog are elevated because they are confirmed to be actively exploited in the wild.
EPSS score — The Exploit Prediction Scoring System estimates the probability a vulnerability will be exploited in the next 30 days, helping you prioritize what to fix first.
These three signals combine to give you a severity rating that reflects actual risk to your organization, not just theoretical impact.
Getting Help
AI Chat — Click the chat icon in the bottom right to ask natural language questions about your environment, findings, or platform features.
Your Praetorian team — Contact your assigned Praetorian team for expert guidance on findings, remediation strategies, or platform configuration.
Help center — Browse documentation at docs.praetorian.com.
Onboarding Journey Complete!
You've completed the onboarding journey! From here, explore Platform Modules to understand what Guard does at each layer, or dive into the Features Reference for detailed documentation on every capability.