Fortinet black logo

User Guide

Viewing breached datasets

Viewing breached datasets

On the EASM > Leaked Credentials page, you can click the Breach Dataset tab to view results displayed on the following tabs:

  • The Relevant tab displays breach information that contains email addresses related to your organization's domains.
  • The Other tab displays all breach information indexed in FortiRecon's database, including breach information related to third-parties that does not contain email addresses related to your organization's domains.

You can filter the list of breached datasets by date, and you can search for keywords.

To view breached datasets:
  1. Go to EASM > Leaked Credentials. Select Breached Dataset tab. The following columns of information are available:

    Breach Name

    Displays the name of the breach.

    Breach Date

    Displays the date that the breach occurred.

    Added On

    Displays the date that the information was made available to other malicious actors.

    Compromised Accounts

    Displays the number of known compromised accounts.

  2. Apply the filters that you want.
  3. Click a breach to display more information about it.
To filter breached datasets:
  1. Go to EASM > Leaked Credentials, and click Breached Dataset.
  2. Filter reports by a date range:
    1. Click Filter Report by Date Range. Two calendars are displayed.
    2. In the left calendar, select a month, year, and day to specify the start date of the range.
    3. In the right calendar, select a month, year, and day to specify the end date of the range.

      Only reports from the date range are displayed.

    4. Click the Filter Report by Date Range box, and click X to remove the date range filter.
  3. Search for keywords:

    1. In the Type and hit Enter to Search box, type a keyword, and press Enter.

    2. The threats are filtered to display only threats with the keyword.

    3. Click the X beside the keyword to remove the filter.

  4. Toggle Has Password option to filter reports that contain passwords.

  5. Filter the reports by relevance in By Relevance section.

Viewing breached datasets

On the EASM > Leaked Credentials page, you can click the Breach Dataset tab to view results displayed on the following tabs:

  • The Relevant tab displays breach information that contains email addresses related to your organization's domains.
  • The Other tab displays all breach information indexed in FortiRecon's database, including breach information related to third-parties that does not contain email addresses related to your organization's domains.

You can filter the list of breached datasets by date, and you can search for keywords.

To view breached datasets:
  1. Go to EASM > Leaked Credentials. Select Breached Dataset tab. The following columns of information are available:

    Breach Name

    Displays the name of the breach.

    Breach Date

    Displays the date that the breach occurred.

    Added On

    Displays the date that the information was made available to other malicious actors.

    Compromised Accounts

    Displays the number of known compromised accounts.

  2. Apply the filters that you want.
  3. Click a breach to display more information about it.
To filter breached datasets:
  1. Go to EASM > Leaked Credentials, and click Breached Dataset.
  2. Filter reports by a date range:
    1. Click Filter Report by Date Range. Two calendars are displayed.
    2. In the left calendar, select a month, year, and day to specify the start date of the range.
    3. In the right calendar, select a month, year, and day to specify the end date of the range.

      Only reports from the date range are displayed.

    4. Click the Filter Report by Date Range box, and click X to remove the date range filter.
  3. Search for keywords:

    1. In the Type and hit Enter to Search box, type a keyword, and press Enter.

    2. The threats are filtered to display only threats with the keyword.

    3. Click the X beside the keyword to remove the filter.

  4. Toggle Has Password option to filter reports that contain passwords.

  5. Filter the reports by relevance in By Relevance section.