This guide explains the Threat Intelligence module and how to use it.
- What is the Threat Intelligence module?
- How to export a list of breached accounts?
The Threat Intelligence module scans the web, searching for signals and data that may represent a breach of your data security and a threat to your business. The constant vigilance afforded to you by the Threat Intelligence module shortens the time between the potential data breach and defensive response, reducing the opportunity for fraudulent activity.
In the Threat Intelligence module, you can check for data leaks for your previously allowed email domains in the Domain Allowlist menu.
Go to the Threat Intelligence menu from the left menu on the dashboard to review the following functions.
This table contains all breached email accounts. This table includes information such as breached account, the source of the breach, the password type of the email account, and the leak date.
The components of the Breached Accounts page are explained in the table below.
You can take manual actions on breached accounts table. You can click the buttons top of the data table for the appropriate steps you want to perform.
This tutorial explains the Threat Intelligence module and how to use it.
A: No, you can only list, copy to clipboard and download the list of the breached accounts.
A: You can perform almost every operation in the Threat Intelligence module using API. You can refer to our Rest API document to see the details.