To use the Breach Check, you can either enter a business domain or upload a spreadsheet with a list of domains as a portfolio. The system will then identify all the internet-facing assets of the business, which is then used to conduct a scan across our scanning modules.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article