Dashboard

Welcome to the Log360 platform's feature tour of dark web monitoring

You're now looking at the main dashboard, which provides a comprehensive overview of your security environment.

1 / 19

Centralized log management

The Events Overview section provides a unified platform for security data analysis. Here, you'll get a bird's-eye view of your network's log trends, inactive devices, recent alerts, and more.

2 / 19
Dashboard

Dark web monitoring

To gain insights into dark web incidents, head on to the Threat Analytics section.

3 / 19

Malicious event detection

Find supply chain breaches and breaches by categories and source types.

4 / 19

Botnet infections

Get insights into botnet infections.

5 / 19

Uncover leaked data on third-party websites

Personal info leaks involve names and email addresses, while credential leaks involve passwords.

6 / 19
Reports

Monitor and analyze dark web breaches

Navigate to Reports > Threats > Threat Analytics.

7 / 19
Reports

Advanced threat analytics

With threat intel from global threat feeds like STIX/TAXII, Webroot, and VirusTotal, Log360 detects malicious connections to and from your network. From spam sources to phishing, learn if malicious domains, IP addresses, and URLs have been accessed from your network and block them immediately.

8 / 19
Reports

Insights into breached data

Stay in the know regarding all breached data on the dark web.

9 / 19
Reports

Insights into botnet leak data

Detect personal data and credentials compromised by botnets operating on the dark web.

10 / 19
Reports

Insights into supply chain breaches

Discover if your credentials have been compromised on the dark web due to breaches in third-party applications.

11 / 19
Reports

A built-in investigation module

The Go To Incident Workbench button lets you investigate a particular email address from your domain and spot the source of a data leak.

12 / 19
Reports

The Incident Workbench

Find out what personal information was leaked on the dark web and when.

13 / 19

Recommendations

In the event of a credential leak, click Mail User to inform the relevant user so they can take remedial measures (in this case, changing their password to prevent an account compromise attempt).

14 / 19
Reports

Real-time alerting

Create alert profiles to get instantly informed about threats related to the dark web.

15 / 19
Alerts

Adding an alert profile

Select Threat Group and Darkweb to receive alerts on dark web threats.

16 / 19
Select Log source

Alert criteria

Select the threat about which you'd like to receive instant notifications.

17 / 19
Alert criteria

Notifications

Customize your notifications to receive real-time alerts via email or SMS about the specific threat you've selected.

18 / 19
Alerts

Alerts

Once the alert profile is created, you will receive alerts on your selected threat (in this case, supply chain breaches), enabling you to take swift action and stay protected from dark web threats.

19 / 19

Book a product tour

Get a complete, personalized demo of Log360 with one of our technical experts.

Take a product tour now  
 
 

Thank you!

One of our team members will contact you shortly.

Get started with Log360

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  • By clicking 'Contact us' you agree to processing of personal data according to the Privacy Policy.

  Zoho Corporation Pvt. Ltd. All rights reserved

This tour takes you through the “Dark Web Monitoring” feature in Log360 and was built for a desktop viewing experience.