UpGuard Knowledge Base
UpGuard BreachSight
UpGuard Platform Quick Start Guide
The UpGuard Platform
What is UpGuard?
Security ratings
Resolving risks
Notifications
Integrations
User management
Templates and co-branding
Other questions
Evaluation guides
UpGuard BreachSight
Executive Summary Report
Risk Profile
Domains
IP addresses
Remediation
Typosquatting
Subsidiaries
Vulnerabilities
Identity breaches
UpGuard Vendor Risk
Executive summary report
Portfolio risk profile
Vendors
Remediation
Shared with me
Fourth parties
Security questionnaires
Third-Party Risk Management Services
UpGuard Data Leaks
Data Leaks
UpGuard Trust Exchange
Questionnaires
Remediation requests
Trust page
Content library
UpGuard API
Back to home
UpGuard Knowledge Base
UpGuard BreachSight
UpGuard Platform Quick Start Guide
The UpGuard Platform
What is UpGuard?
Security ratings
Resolving risks
Notifications
Integrations
User management
Templates and co-branding
Other questions
Evaluation guides
UpGuard BreachSight
Executive Summary Report
Risk Profile
Domains
IP addresses
Remediation
Typosquatting
Subsidiaries
Vulnerabilities
Identity breaches
UpGuard Vendor Risk
Executive summary report
Portfolio risk profile
Vendors
Remediation
Shared with me
Fourth parties
Security questionnaires
Third-Party Risk Management Services
UpGuard Data Leaks
Data Leaks
UpGuard Trust Exchange
Questionnaires
Remediation requests
Trust page
Content library
UpGuard API
UpGuard BreachSight
Learn how to use UpGuard BreachSight with tutorials, onboarding tips, and team use cases
What is UpGuard BreachSight?
Identity breaches from ransomware leak blogs
What is Detected Products?
How to add your Security Rating badge to your website
How to generate a BreachSight subsidiaries report
What are Known Exploited Vulnerabilities?
How to use Public Risk Waivers in BreachSight
Executive Summary Report
What is in the UpGuard BreachSight Executive Summary?
How to add and remove competitors from your executive summary
How to generate a risk report on your organization
Risk Profile
How to investigate and verify a risk finding?
How to use risk waivers in BreachSight
What is your risk profile?
Domains
Options for adding to your domains in UpGuard BreachSight
How to export your domains
How to remove a domain from UpGuard BreachSight
How to remove a label from a domain or IP in UpGuard BreachSight
What's the difference between an active and inactive domain?
How to use asset portfolios to segment your domains
How to add a domain to UpGuard BreachSight
How to rescan a domain in UpGuard BreachSight
How to label your domains
What is UpGuard BreachSight's Domains?
How to handle domains that aren't in use
See more
IP addresses
How to monitor your IP addresses and IP ranges
How to add a custom IP address or IP ranges
How to filter your IP addresses and IP ranges
How to export your IP addresses
How to label your IP addresses or IP ranges
See more
Remediation
How to export your internal remediation requests
How to request remediation from someone at your organization
How to manage internal remediation requests with UpGuard
Typosquatting
How to filter typosquatting permutations
How to export from typosquatting
How to begin a typosquatting takedown request
How to add a domain to typosquatting.
How to ignore a typosquatting permutation
What is UpGuard's typosquatting module?
What types of typosquatting permutations does UpGuard protect against
See more
Subsidiaries
How to label a subsidiary's IP address or IP ranges
How to label a subsidiary's domains
What is your subsidiary's risk profile?
What is the Subsidiary Summary page?
How to use subsidiaries to monitor your organization's attack surface
See more
Vulnerabilities
Why isn't every vulnerability shown on my Risk Profile?
What is UpGuard BreachSight’s vulnerabilities module?
What is Exploit Prediction Scoring System (EPSS)?
Identity breaches
How is the severity of an identity breach determined?
How to use UpGuard BreachSight's Identity Breaches module
What is UpGuard BreachSight's Identity Breaches module?
What is infostealer malware?
How to export an individual Identity Breach
How to collaborate on Identity Breaches
See more