Updated Articles

  1. Event API POST

    Overview Within the API settings of your workspace, you can set up an API Post URL. If this URL is set, then for each event-type with API POST enabled in it's configuration settings, a response will be pushed to the Post URL for the workspace a...
  2. Referrer/Web Server Log Integration

    Overview The referrer data in your web server logs capturing where users visiting your official sites were redirected from can be extremely valuable for detecting phish since many phishing pages redirect users to the legitimate sites of the brand t...
  3. DMARC Integration

    Overview DMARC (Domain-based Message Authentication, Reporting and Conformance) is a technical specification published in 2012 with the goal of reducing the potential for email-based fraud. It works by allowing senders to indicate that emails from ...
  4. Abuse Box Integration

    Overview Abuse box integrations are available at no extra cost to customers who have purchased External Threats . RiskIQ abuse box integrations automate the ingestion and analysis of suspected phish reported by an organization's customers an...
  5. Cloud Asset Discovery

    Cloud Asset Discovery If a customer provides access to known AWS Accounts with Read-Only permissions and full API access and API Keys, we have the ability to leverage that information for discovery of AWS related assets. These assets are compared ...
  6. Open Ports in Inventory

    RiskIQ shows exposed services and open ports on IP Addresses in the 2020 Digital Footprint release (Global Inventory). RiskIQ is undertaking mass scanning of Open Ports on all address in the IPv4 space. Our infrastructure scans around 230 distin...
  7. External Threats

    Product Description RiskIQ External Threats automates the detection, monitoring, and remediation of fraudulent websites, domains, social profiles, and mobile apps impersonating an organization. As businesses evolve and move more processes and i...
  8. Custom Dashboards

    Overview  RiskIQ's Dashboards allow our users to visualize the metrics that matter most to their organization, revealing key insights quickly and efficiently. RiskIQ provides default dashboards that showcase the findings we consider useful...
  9. Event User Actions

    This article provides definitions and instructions for managing events within the RiskIQ interface or API, including  Assigning event status, owner, and priority Adding notes or tags Emailing event details for feedback from teammates (UI on...
  10. Identity Federation (SSO) Integration

    Overview Identity Federation is a method of access control between multiple related but independent systems.   Identity Federation can give customers greater control over their users’ access to the RiskIQ Platform. RiskIQ now offers Iden...