Skip to main content

Overview of the Data Breach Module

Key Principles

Updated over a month ago

The breach detection module allows you to proactively monitor compromised data related to your organization.

Through regular scans performed across the Internet and the darknet, Arsen reports any information leakage involving your domains, helping you anticipate potential threats.

This module is an essential component for strengthening your cybersecurity posture.

Arsen breach dashboard displaying detected incidents, dates, notifications, and types of exposed data.


1 – Objectives

This article aims to explain how to:

  • activate the breach detection module

  • understand how scans and alerts work

  • interpret the information reported about compromised data within your organization

  • manage the sending parameters of transactional notifications


2 – Prerequisites

Before using the breach detection module, it is necessary to:

  • have the Threat Monitoring module activated

  • have Admin rights on the Arsen platform

  • have validated at least one domain in the platform


3 – Activating the module

3.1 – Initiating the activation request

  • On the module page (when not activated)

  • Click Get Started to request activation from customer support

Introduction page of the Breaches module showing the main features and a Get Started button

3.2 – Launching the activation

Once the module has been activated by Arsen:

  • Observe that the mention Get Started becomes Enable

  • Click Enable to launch the first scan on your domains

Breaches module introduction page showing module benefits and an Enable button.

📚 Note
If your account contains more than 5 validated domains, a pop-up will prompt you to select up to 5 domains to scan.

3.4 – Understanding the first scans

  • Display the breaches page once activation is complete

  • Understand that a full scan may take up to 48 hours

List of detected breaches showing exposed PII, compromised passwords, and associated sensitive data


4 – Understanding reported information and alerts

4.1 – How the scans work

  • Scans are performed through 3 specialized data providers

  • These scans ensure the most accurate information is reported

  • They refresh the data twice per day within the platform

4.2 – Alert emails

Alert emails are sent weekly to the owner of the account and include all new breaches:

  • Emails are sent once a week, on Monday morning (local time of the main administrator)

  • Emails are only sent if a new breach has been detected

4.3 – Managing the alert sender address

⚠️ In case of API whitelisting, it is possible to modify the sender address of alert emails:

  • Click Settings from the module page

Breaches module section showing the monitored domain with a button to access module settings
  • Open the dropdown menu to adjust sending parameters

  • Modify the sender address to ensure proper deliverability and avoid spam

Breaches module settings window showing Email Settings to customize the alert sender address
Did this answer your question?