Jump to Content
Home
SpyCloud Guides
API Reference
SpyCloud Labs
Trust Center
spycloud.com
Get a demo
SpyCloud Guides
spycloud.com
Get a demo
Home
SpyCloud Guides
API Reference
SpyCloud Labs
Trust Center
FAQs
All
Pages
Start typing to search…
SPYCLOUD
Introduction
Our Data
Data Types & Breach Categories
Severity, Source Types
Data Collection, Parsing & Ingestion
Data FAQs
Limited Data Schema
API Guidelines
SPYCLOUD CONSOLE
Configuration
User Management
License Assignment
Configuring SSO
Audit Logging
RBAC
Source Catalog
Exploring and Filtering Sources
Using the Source Catalog
ENTERPRISE PROTECTION
Introduction
Tips for Strong Passwords
Workforce Threat Protection
Workforce Threat Protection Fundamentals
Managing Your Watchlist
View All Records
Recent Records
Exporting Records
Endpoint Threat Protection
Understanding Malware Data
Endpoint Threat Protection Fundamentals
Supply Chain Threat Protection
Supply Chain Fundamentals
Identity Threat Index
Threat Index Summaries
Compromised Applications
Acting on Supply Chain Exposures
Employee ATO Prevention
Understanding Your Portal
Account Settings
FAQs
Compass Malware Remediation
Understanding Alerts & Severity
Investigating Alerts
Responding & Remediating
Best Practices & Optimization
Identity Guardians
Active Directory Guardian
Requirements
Installation
Configuring ADG
Configuring Scan Options
Scan in Progress
Viewing the Scan Report
Remediating Users from the Scan Results
CSV Reports
Launching UI After Installation
Scheduling a Scan
Settings
Advanced | Configuring Banned Passwords List
Advanced | AD Object Collections
Advanced | Email Templates
Advanced | Extended Attributes
Advanced | Configuring Okta
Advanced | Configuring Remediations
Logging
Upgrading Active Directory Guardian
Uninstalling ADG Using the Installer
Configuring a Group with 'Least Privilege'
LDAPS Configuration
Entra ID Guardian
Okta Workforce Guardian
VIP Guardian
How It Works & Set Up
VIP Guardian and SSO
CONSUMER PROTECTION
Introduction
Risks of Consumer Password Reuse
Communicating with Exposed Users
Industry Guides
E-commerce & Retail
CAP User Exposure API
CAP Password Exposure API
Telecommunications
CAP User Exposure API
Compromised Credit Card API
Healthcare Providers
CAP User Exposure API
Compromised Credit Card API
SLED
CAP User Exposure API
ISP & Cable Providers
CAP User Exposure API
Compromised Credit Card API
Travel & Hospitality
CAP User Exposure API
Compromised Credit Card API
Financial Services
CAP User Exposure API
Compromised Credit Card API
Consumer ATO Prevention
The "Before You Get Started" Guide
Deployment Options
User Exposure API ONLY
Password Exposure API ONLY
Password AND User Exposure APIs
Consumer IDLink API
Choosing the Right CAP API
Tips for Measuring Program Success
Session Identity Protection
Compromised Credit Card API
Password Exposure API
INVESTIGATIONS
Introduction
Use Cases
Choosing the Right Deployment
Understanding Data Sources
Selector Best Practices
FAQs
Investigations Module
User Guides
Understanding AI Insights
Understanding Searching
Understanding IDLink
Saving Investigations
Advanced Search Controls
Graphing
Example Investigations
Investigating Fraud
Validating Identities in Cryptocurrency Exchange
Establishing a Real Identity in a Resume
Investigating a Hijacking Incident
Detecting Evidence of DPRK Remote IT Workers
Investigations API
IDLink API
Analyst Credits & Training
INTEGRATIONS
Introduction
Crowdstrike Falcon EDR
Integration Guide
Elastic SIEM
Microsoft Defender for Endpoint
Microsoft Sentinel SIEM
Okta
Okta Identity Threat Protection
Ping Identity
PingOne DaVinci Connector
Ping Advanced Identity Cloud
Palo Alto Cortex XSOAR
Splunk SIEM
SpyCloud Connect
Tines SOAR
SUPPORT
How We Can Help
Powered by
FAQs
Updated 7 months ago
Introduction
Ask AI