How does the scan work?

Created by Charley Downey, Modified on Fri, 22 Mar at 12:24 PM by Alex Wanat

Using a business domain, or a spreadsheet of domains, Breach Check will first run a scan to check for all internet-facing assets associated with the domain/domains. Once the data has been collected, we then use this to run our scans.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article