Fortinet black logo

User Guide

Viewing leaked credential details

Viewing leaked credential details

On the EASM > Leaked Credentials page, click the Leaked Credentials tab to view the results.

You can filter the list of leaked credentials by date and domain, and you can search for keywords.

To view leaked credential details:
  1. Go to EASM > Leaked Credentials, and click Leaked Credentials.
  2. Apply the filters that you want.
  3. Click a domain name to display more details.
  4. Change the status of a report by selecting Mark as Resolved or Mark as Active in the Actions dropdown.
To filter leaked credentials details:
  1. Go to EASM > Leaked Credentials.
  2. On Leaked Credentials tab, filter reports by a date range:
    1. Click Filter Report by Date Range. Two calendars are displayed.
    2. In the left calendar, select a month, year, and day to specify the start date of the range.
    3. In the right calendar, select a month, year, and day to specify the end date of the range.

      Only reports from the date range are displayed.

    4. Click the Filter Report by Date Range box, and click X to remove the date range filter.
  3. Search for keywords:

    1. In the Type and hit Enter to Search box, type a keyword, and press Enter.

    2. The threats are filtered to display only threats with the keyword.

    3. Click the X beside the keyword to remove the filter.

  4. Toggle Has Password option to filter reports that contain passwords.
  5. Filter by status in the By Status section:
    • Select Active or Resolved to filter threats by their assigned status.
  6. Filter by domain in the By Domains section.

Viewing leaked credential details

On the EASM > Leaked Credentials page, click the Leaked Credentials tab to view the results.

You can filter the list of leaked credentials by date and domain, and you can search for keywords.

To view leaked credential details:
  1. Go to EASM > Leaked Credentials, and click Leaked Credentials.
  2. Apply the filters that you want.
  3. Click a domain name to display more details.
  4. Change the status of a report by selecting Mark as Resolved or Mark as Active in the Actions dropdown.
To filter leaked credentials details:
  1. Go to EASM > Leaked Credentials.
  2. On Leaked Credentials tab, filter reports by a date range:
    1. Click Filter Report by Date Range. Two calendars are displayed.
    2. In the left calendar, select a month, year, and day to specify the start date of the range.
    3. In the right calendar, select a month, year, and day to specify the end date of the range.

      Only reports from the date range are displayed.

    4. Click the Filter Report by Date Range box, and click X to remove the date range filter.
  3. Search for keywords:

    1. In the Type and hit Enter to Search box, type a keyword, and press Enter.

    2. The threats are filtered to display only threats with the keyword.

    3. Click the X beside the keyword to remove the filter.

  4. Toggle Has Password option to filter reports that contain passwords.
  5. Filter by status in the By Status section:
    • Select Active or Resolved to filter threats by their assigned status.
  6. Filter by domain in the By Domains section.