Links

Threat Intelligence

This guide explains the Threat Intelligence module and how to use it.
This includes:
  • What is the Threat Intelligence module?
  • How to export a list of breached accounts?

What is Threat Intelligence?

The Threat Intelligence module scans the web, searching for signals and data that may represent a breach of your data security and a threat to your business. The constant vigilance afforded to you by the Threat Intelligence module shortens the time between the potential data breach and defensive response, reducing the opportunity for fraudulent activity.
In the Threat Intelligence module, you can check for data leaks for your previously allowed email domains in the Domain Allowlist menu.
Please find the documentation for the domain allowlist here.
Go to the Threat Intelligence menu from the left menu on the dashboard to review the following functions.

Breached Accounts

This table contains all breached email accounts. This table includes information such as breached account, the source of the breach, the password type of the email account, and the leak date.
The components of the Breached Accounts page are explained in the table below.
Breached Account
Information about the breached email account is located in this column.
Source
This column shows from which source the account was leaked or under what name it was leaked.
Password Type
Indicates the status of the password information contained in the data leak. eg. Cleartext, hash, MD5, etc.
Leak Date
This column shows the information about the date when the data leak was disclosed.

Table Actions

You can take manual actions on breached accounts table. You can click the buttons top of the data table for the appropriate steps you want to perform.
Download
The list of the breached accounts can be downloaded. You can click the button to download all pages or the current page and download the data in the table in XLSX, CSV and PDF formats.
Refresh
By clicking this button, you can reload the page and view it if new data has been added.
Table Settings
With the table settings button, you can show and hide the columns or freeze the columns.
Sorting
According to which column you want to sort, you can change the order when you click on the relevant column heading.

Video Tutorial

This tutorial explains the Threat Intelligence module and how to use it.

FAQ

Q: Can I delete breached account from the platform?

A: No, you can only list, copy to clipboard and download the list of the breached accounts.

Q: Can I integrate the breached accounts with my SOAR products by obtaining the details using the API?

A: You can perform almost every operation in the Threat Intelligence module using API. You can refer to our Rest API document to see the details.