UpGuard Knowledge Base
UpGuard Breach Risk
UpGuard Platform Quick Start Guide
The UpGuard Platform
What is UpGuard?
Security ratings
Resolving risks
Notifications
Integrations
User management
Templates and co-branding
Other questions
Evaluation guides
Billing
UpGuard Breach Risk
Executive Summary Report
Risk Profile
Domains
IP addresses
Remediation
Typosquatting
Subsidiaries
Vulnerabilities
Identity breaches
UpGuard Vendor Risk
Executive summary report
Portfolio risk profile
Vendors
Remediation
Shared with me
Fourth parties
Security questionnaires
Third-Party Risk Management Services
UpGuard Data Leaks
Data Leaks
UpGuard Trust Exchange
Questionnaires
Remediation requests
Trust page
Content library
UpGuard API
Back to home
UpGuard Knowledge Base
UpGuard Breach Risk
UpGuard Platform Quick Start Guide
The UpGuard Platform
What is UpGuard?
Security ratings
Resolving risks
Notifications
Integrations
User management
Templates and co-branding
Other questions
Evaluation guides
Billing
UpGuard Breach Risk
Executive Summary Report
Risk Profile
Domains
IP addresses
Remediation
Typosquatting
Subsidiaries
Vulnerabilities
Identity breaches
UpGuard Vendor Risk
Executive summary report
Portfolio risk profile
Vendors
Remediation
Shared with me
Fourth parties
Security questionnaires
Third-Party Risk Management Services
UpGuard Data Leaks
Data Leaks
UpGuard Trust Exchange
Questionnaires
Remediation requests
Trust page
Content library
UpGuard API
UpGuard Breach Risk
Learn how to use UpGuard Breach Risk with tutorials, onboarding tips, and team use cases
How to generate a Breach Risk subsidiaries report
How to add your Security Rating badge to your website
What is Detected Products?
How to use Public Risk Waivers in Breach Risk
What is UpGuard Breach Risk?
Identity breaches from ransomware leak blogs
What are Known Exploited Vulnerabilities?
Executive Summary Report
How to generate a risk report on your organization
How to add and remove competitors from your executive summary
What is in the UpGuard Breach Risk Executive Summary?
Risk Profile
What is your risk profile?
How to use risk waivers in Breach Risk
How to investigate and verify a risk finding?
Domains
What is UpGuard's Breach Risk Domains module?
How to rescan a domain in UpGuard Breach Risk
How to use asset portfolios to segment your domains
How to remove a label from a domain or IP in UpGuard Breach Risk
How to remove a domain from UpGuard Breach Risk
How to label your domains
How to handle domains that aren't in use
How to export your domains
How to add a domain to UpGuard Breach Risk
Options for adding to your domains in UpGuard Breach Risk
What's the difference between an active and inactive domain?
See more
IP addresses
How to label your IP addresses or IP ranges
How to export your IP addresses
How to filter your IP addresses and IP ranges
How to monitor your IP addresses and IP ranges
How to add a custom IP address or IP ranges
See more
Remediation
How to manage internal remediation requests with UpGuard
How to request remediation from someone at your organization
How to export your internal remediation requests
Typosquatting
What is UpGuard's typosquatting module?
How to ignore a typosquatting permutation
How to add a domain to typosquatting
How to begin a typosquatting takedown request
How to export from typosquatting
How to filter typosquatting permutations
What types of typosquatting permutations does UpGuard protect against
See more
Subsidiaries
How to use subsidiaries to monitor your organization's attack surface
What is the Subsidiary Summary page?
How to label a subsidiary's domains
How to label a subsidiary's IP address or IP ranges
What is your subsidiary's risk profile?
See more
Vulnerabilities
What is UpGuard Breach Risk’s vulnerabilities module?
Why isn't every vulnerability shown on my Risk Profile?
What is Exploit Prediction Scoring System (EPSS)?
Identity breaches
How to export an individual Identity Breach
What is the UpGuard Breach Risk Identity Breaches module?
How to use the UpGuard Breach Risk Identity Breaches module
How is the severity of an identity breach determined?
What is infostealer malware?
How to collaborate on Identity Breaches
See more