Manage CCM
Use the following capabilities to view and manage data in Compromised Credential Management (CCM):
Dashboard: Access key metrics and graphical insights into compromised credentials and breach activities to assess exposure, spot trends, and prioritize actions. For more information, see View Dashboard.
Threat Insights: Correlate compromised credentials with user accounts through IAM integration to identify high-risk users and prioritize response efforts. For more information, see View Threat Insights.
Compromised Credentials: Track and manage compromised credentials detected in breaches, and review detailed information on exposure. For more information, see View Compromised Credentials.
Domain Sightings: Monitor where your domains appear across the dark web to assess exposure and investigate potential threats. For more information, see View Domain Sightings.
Audit Logs: Review logs of settings updates, response actions, and bulk operations to monitor user activity and maintain accountability. For more information, see View Audit Logs.