All Collections
UpGuard BreachSight
Learn how to use UpGuard BreachSight with tutorials, onboarding tips, and team use cases
What is UpGuard BreachSight?UpGuard BreachSight identifies the cyber-related risks that your company is directly exposed to.
How to add your Security Rating badge to your websitePromote your UpGuard Security Rating with this embeddable badge.
How to investigate and verify a risk finding?
What are Known Exploited Vulnerabilities?UpGuard annotates vulnerabilities that are being actively exploited by attackers.
Identity breaches from ransomware leak blogsEmail addresses found in ransomware leaks are surfaced through Identity Breaches with a disclaimer that they are unverified.
How to use Public Risk Waivers in BreachSightHow to use public risk waives to share information about compensating controls for detected risks
How to generate a BreachSight subsidiaries reportUpGuard can help you generate an in-depth report designed to outline the security posture of your organization and its subsidiaries
What is Detected Products?
How to generate a risk report on your organizationUpGuard can help you generate an in-depth report designed to outline the security posture of your organization.
How to add and remove competitors from your executive summaryLearn how to add and remove competitors from your executive summary report + troubleshooting tips.
What is in the UpGuard BreachSight Executive Summary?Learn about the UpGuard BreachSight Executive Summary and how it can help you manage your external security posture.
How to view changes in your attack surface over timeLearn how you can use UpGuard to track and monitor changes in your attack surface over time
What is your risk profile?Learn about how your risk profile can help you understand your security posture and potential attack vectors in your attack surface.
How to export your domainsLearn how to export your domains from the UpGuard platform
What is UpGuard BreachSight's Domains?Learn about how UpGuard can help you monitor the security posture of your domains.
Options for adding to your domains in UpGuard BreachSightLearn how to use UpGuard to monitor any custom domains that weren't picked up by our automated scanning.
How to add a domain to UpGuard BreachSightLearn how to start monitoring a new domain for security issues inside UpGuard BreachSight.
How to use asset portfolios to segment your domainsOrganizing your domains into portfolios can simplify management and help enforce access controls.
How to remove a domain from UpGuard BreachSightLearn which domains can be removed from your profile and how to remove them.
How to rescan a domain in UpGuard BreachSightLearn how to request a rescan of a domain monitored in UpGuard BreachSight.
How to label your domainsLearn how to use the labelling feature to group or categorize monitored domains in UpGuard BreachSight.
How to remove a label from a domain or IP in UpGuard BreachSight.Learn how to remove a label from a domain in UpGuard BreachSight.
How to handle domains that aren't in useLearn how to handle a domain you don't want to see in your UpGuard BreachSight reports.
What's the difference between an active and inactive domain?Learn about how UpGuard BreachSight classifies a domain as active or inactive.
How to monitor your IP addresses and IP rangesLearn how UpGuard can help you monitor your IP addresses and IP ranges
How to add a custom IP address or IP rangesLearn how UpGuard can help you monitor any of your IP address or IP ranges automatically
How to filter your IP addresses and IP rangesLearn how you can use UpGuard to drill down into individual IP addresses and IP ranges
How to export your IP addressesLearn how to export your IP addresses that are monitored on the UpGuard platform
How to label your IP addresses or IP rangesLearn how to label your IP addresses or IP ranges in UpGuard
How to request remediation from someone at your organizationLearn how UpGuard can help you request and manage your internal remediation requests
How to manage internal remediation requests with UpGuardManage remediation workflows for internal requests within BreachSight.
How to export your internal remediation requestsLearn how to export your internal remediation requests from UpGuard
What types of typosquatting permutations does UpGuard protect againstLearn about how UpGuard can protect your organization from typosquatting-based attacks.
How to filter typosquatting permutationsLearn how to filter registered, unregistered, and ignored permutations of a monitored typosquatting domain.
How to export from typosquattingLearn how you can export your monitored domains and underlying permutations from typosquatting.
How to ignore a typosquatting permutationLearn how to ignore a typosquatting permutation in UpGuard
What is UpGuard's typosquatting module?Learn more about what our typosquatting module does, and how it works.
How to add a domain to typosquattingThis article explains how to monitor a domain with typosquatting.
How to begin a typosquatting takedown requestLearn how to report a malicious domain found in UpGuard
How to label a subsidiary's IP address or IP rangesLearn how to use the labelling feature to group a subsidiary's IP addresses or IP ranges in UpGuard BreachSight
What is your subsidiary's risk profile?Learn about how your subsidiary's risk profile can help you understand their security posture and potential attack vectors.
How to label a subsidiary's domainsLearn how to use the labelling feature to group a subsidiary's domains in UpGuard BreachSight
How to use subsidiaries to monitor your organization's attack surfaceLearn how UpGuard can help you monitor your subsidiaries for common attack vectors and other cybersecurity risks.
What is the Subsidiary Summary page?Learn about the Subsidiary Summary page and how it can help you better understand the security posture of your subsidiaries.
Why isn't every vulnerability shown on my Risk Profile?Learn about how vulnerabilities are treated in your Risk Profile versus your Vulnerabilities.
What is UpGuard BreachSight’s vulnerabilities module?Learn about what the vulnerabilities module of UpGuard BreachSight is, CVSS, CVE IDs, and more.
What is Exploit Prediction Scoring System (EPSS)?UpGuard incorporates FIRST's Exploit Prediction Scoring System (EPSS) to help prioritize vulnerabilities most likely to be exploited.
How is the severity of an identity breach determined?Learn how UpGuard determines the severity of the third-party data breaches that expose your employees' information.
What is UpGuard BreachSight's Identity Breaches module?Learn about the Identity Breaches module in UpGuard BreachSight and how it can protect your organization from third-party data breaches.
How to export an individual Identity BreachLearn how to export an individual Identity Breach as a PDF report or Excel document.
How to use UpGuard BreachSight's Identity Breaches moduleLearn how to explore the third-party data breaches found and how to notify your employees of exposed credentials
How to collaborate on Identity BreachesLearn how to process Identity Breaches within the UpGuard platform by assigning an owner and leaving comments with status updates.
What is infostealer malware?