Skip to main content

Manage CCM

Use the following capabilities to view and manage data in Compromised Credential Management (CCM):

  • Dashboard: Access key metrics and graphical insights into compromised credentials and breach activities to assess exposure, spot trends, and prioritize actions. For more information, see View Dashboard.

  • Threat Insights: Correlate compromised credentials with user accounts through IAM integration to identify high-risk users and prioritize response efforts. For more information, see View Threat Insights.

  • Compromised Credentials: Track and manage compromised credentials detected in breaches, and review detailed information on exposure. For more information, see View Compromised Credentials.

  • Domain Sightings: Monitor where your domains appear across the dark web to assess exposure and investigate potential threats. For more information, see View Domain Sightings.

  • Audit Logs: Review logs of settings updates, response actions, and bulk operations to monitor user activity and maintain accountability. For more information, see View Audit Logs.