It can be run using the command:
PingCastle.exe --graph --server mydomain.com
The main page contains an overview of all the accounts and groups checked.
Per categories, objectives are being shown and they have been achieved or not.
If needed, a table below indicates the details computed during the analysis
This section indicates the main findings and the associated graph can be shown when clicking on the group or user account.
A click on detail display the compromission graph
The relation between the group or user account to monitor and the objects which can take control of it are drawn.
The read it, you have to find the root object by following the arrow object by object until you find it.
Then you have to identify the other account and understand why they are linked. The best way is to stand the mouse on a link until a notice is displayed. This notice indicates why the node has been attached.
A real life example: