Overview
The Internet Perimeter Engagement helps you understand how your organization appears from the outside — just like an attacker would see it. This assessment identifies high-risk vulnerabilities across your internet-facing assets and provides a prioritized list of remediation steps. It typically follows the Asset Discovery engagement and is activated by the CYE services team.
What This Engagement Does
This assessment:
Analyzes the security level of your external-facing infrastructure
Identifies vulnerable entry points
Recommends initial mitigation actions
Helps prioritize risks based on CYE’s proprietary risk rating methodology
How to Set Up the Engagement
Step 1: Create the Engagement
Go to the Engagements page from the left navigation.
Click + New Engagement.
In the General Details tab, choose Internet Perimeter as the engagement type:
Complete the required fields.
Step 2: Define the Assessment Scope
Go to the Assessment Scope tab.
Add at least one top-level domain to be scanned.
This is required to begin the perimeter scan.
You can refine the scope by selecting specific assets on the Assets page.
Note: You can also import assets to define the scope more efficiently.
Step 3: Select Relevant Assets
Go to the Assets page via the left navigation.
Filter the list by your top-level domain:
Review the results and select the assets you want to include.
Click the Edit icon, mark the selected assets as Relevant, and save.
If you mark a domain as Not Relevant, its sub-entities will also be marked that way.
Marking an asset as Not Relevant will delete it from your system.
Step 4: Add Assets to the Engagement Scope
In the Engagements area, navigate to Scope > Change Scope within Engagements.
Use the search box to locate your Internet Perimeter engagement.
Select the relevant assets.
Ensure In Scope is selected, then click Update:
These assets will be added to the scope, but the selection won't be visible in the Assessment Scope tab.
Step 5: Finalize
Click Create to finish setting up the engagement
Add members if you'd like others to collaborate
A CYE services team member will activate the engagement
After Activation
Once active, the assessment will run and produce:
A prioritized list of security findings
Recommended remediation steps, rated using CYE’s risk model
New insights into your organization’s external vulnerabilities
Important notes
This is an active assessment — it simulates real-world external attacker behavior
Must follow a completed Asset Discovery engagement
Only CYE can activate this engagement
The scope must include at least one valid top-level domain
Wrap-up / Next Steps
This engagement gives you a clear view of how attackers see your organization — and where you're most exposed. Once complete, use the findings to begin mitigation planning and strengthen your external perimeter.





