Leaked Credentials

The Leaked Credentials add-on enables automated detection and management of compromised user credentials exposed on the deep and dark web. It strengthens your organization’s identity protection by providing early alerts and actionable intelligence to defend against:

  • Account takeover attempts

  • Unauthorized access using stolen credentials

  • Credential-based phishing and fraud

  • Leaks of corporate and personal data

Overview

When a leaked credential is detected, the Leaked Credentials add-on add-on monitors external sources for compromised credentials and generates a security event in the Harmony Email & Collaboration Administrator Portal, allowing administrators to take immediate action, such as resetting passwords or blocking access, to contain the threat.

Key Features

  • Real-Time Credential Monitoring: Continuously scans deep and dark web sources for compromised credentials.

  • Automated Security Event Generation: Creates a security event for each detected leak.

  • Early Warning Alerts: Notifies administrators of exposed credentials, enabling timely response actions such as password resets.

  • Historical Exposure Tracking: Provides visibility into past credential exposures for risk assessment and remediation.

Benefits

  • Instantly detects exposed employee credentials from breach dumps and underground sources.

  • Enables immediate remediation by blocking users or enforcing password resets before account compromise.

  • Streamlines incident response by integrating exposure events into existing SIEM workflows.

Activating Leaked Credentials

To activate the Leaked Credentials add-on for Harmony Email & Collaboration, contact your Check Point representative.

Reviewing Leaked Credentials Security Events

The ERM Leaked Credentials page provides a list of security events for all compromised credentials associated with your organization.

To view the ERM Leaked Credentials page, access the Harmony Email & Collaboration Administrator Portal. From left navigational panel, click Leaked Credentials.

Note - The ERM Leaked Credentials page appears only when you have a valid license for the Leaked Credentials add-on.

Extending the Time Frame of the Security Events

By default, the ERM Leaked Credentials page shows security events for the last 6 months.

To view security events for specific time periods, select a time frame from the drop-down at the top of the page.

  • Last 24 hours

  • Last 7 days

  • Last 30 days

  • Last 3 months

  • Last 6 months

To export the details to a CSV, click Export to CSV.

ERM Leaked Credentials Table

The ERM Leaked Credentials table shows the security events and details about compromised credentials within your organization, including their confidence levels and user information, in the selected time frame.

Column

Description
Observation Date Shows the date when the system first detected the leaked credentials.
User The full name and email address of the affected user.
Job Title/Department The job title and department associated with the user.
Application The website from which the credentials were leaked.
Password Lists the compromised password.
Confidence

Indicates the severity level and likelihood of misuse.

  • Low

  • Medium

  • High

Source The origin of the leak (for example, dark web, public repository, breached database).

Resetting Passwords for a Compromised User Account

To reset the password for a compromised user account:

  1. Go to Leaked Credentials.

  2. In the ERM Leaked Credentials table, click the icon next to the required security event.

  3. Select Reset Password.

  4. In the Reset User Account Password pop-up, click OK.

Blocking a Compromised User Account

To block a compromised user account:

  1. Go to Leaked Credentials.

  2. In the ERM Leaked Credentials table, click the icon next to the required security event.

  3. Select Block User.

  4. In the Block User Account pop-up, click OK.