Selki Knowledge Base
  • English
  • Spanish
  • Portuguese (BR)
Go to website
Back
Articles on:Threats
Understand how to interpret the threats table and mitigate risks

Categories

  • General
  • Selki Dashboard
  • Threats
  • Vulnerabilities
  • Watchers
  • Simulated Phishing Campaigns
  • Reporting
  • Integrations
The Threats Table
  • The Threats Table
    Selki Threat Management System - Infostealer Detection Overview The Threat Management System provides comprehensive monitoring and detection of infostealer malware threats that may have compromised user credentials. This system helps organizations identify both internal employee compromises and external customer credential breaches through automated collection and analysis of infostealer logs. Understanding the Threats List Interface Main Dashboard The Threats List dashboard displaSome readers
Filtering Threats
  • Filtering Threats
    Filtering Threats The threats table can quickly fill up as Selki is ingesting millions of records per day. The more watchers you have the more threats will be uncovered. Use the filter to find exactly what you're looking for. The filter has eight sections: Watcher - The domain(s) you are monitoring URL - The URL that was accessed by the compromised credential Domain - The website where the compromised credential was found Username - The account holders' username Email - The accountPopular
Searching Threats
  • Using The Threat Search Bar
    Search Bar Overview The search option gives you full visibility into detected threats. To help you manage large volumes of data efficiently, the platform includes a simple yet powerful search bar. This article explains how to use it to quickly find specific threats. Search Bar Overview At the top of the dashboard, you’ll see the search bar where you can enter in search criteria of your choice: Search Bar (https://storage.crisp.chat/users/helpdesk/website/-/6/3/7/f/637f76e01392d4Few readers
Exporting Threats
  • How To Export Threats
    Exporting Threat Data from the Dashboard You may wish to export threat data from the threat table. This feature allows you to extract and analyze threat data filtered by status, and save it in different formats such as CSV, Excel, or PDF. Export Summary (https://storage.crisp.chat/users/helpdesk/website/-/6/3/7/f/637f76e01392d400/image1sf2euf.png =800x781) Step-by-Step: Exporting Open Threats 1. Review Export Summary Before exporting, the system provides a clear summary of yoSome readers
Threat Options
  • Threat Options
    Threat Options By default, the threat table blurs out the username and password for security purposes. Hovering over each value will de-blur the selection, but if you're wanting to see all values at the same time you can unblur the entire table. Simply click the cog icon and select "Disable SafeView" Unblur Username & PasswordFew readers

Not finding what you are looking for?

Chat with us or send us an email.

  • Chat with us
  • Send us an email
© 2025Selki Knowledge BaseWe run on Crisp Knowledge.