How to setup a Dark Web Monitor
Setting up a Dark Web Monitor allows you to proactively monitor for compromised credentials or sensitive information related to your organization on the dark web. Follow these steps to configure your Dark Web Monitor effectively.
- User Manual
- Agents
- The Cyber Risk Assessment Process
- API Documents
- General Questions and Troubleshooting
- The Cyber Risk Assessment Process (Video Tutorials)
- Sales and Prospecting Articles
- CYRISMA Partner Portal Access
- Glossary
- CYRISMA Change Log
- Support Ticket SLA
- Onboarding Framework
- PSA Integrations
- Billing Questions
- Self Onboarding Guide
Table of Contents
Step 1: Navigate to Dark Web Monitor Setup
-
Access the Monitor Configuration:
- Go to Dark Web -> Setup Dark Web Monitor.
Step 2: Configure the Monitor
Choose Notification Email:
- Select the email address where notifications will be sent.
- Ensure you verify the email address. If using an admin email account, confirm that the recipient is aware and can approve the verification email from CYRISMA regarding the Dark Web Monitor.
Enter Instance Domain:
- Input the domain associated with the client’s email (usually the organization's primary domain).
Specify IP Addresses to Search:
- Enter up to two external IP addresses to monitor. These could be external firewall addresses or any other externally facing IPs.
Step 3: Submit the Monitor
-
Finalize Setup:
- Click Submit to activate your Dark Web Monitor.

Conclusion
By following these steps, you can effectively set up a Dark Web Monitor to safeguard your organization against potential threats related to compromised information. Regular monitoring helps ensure prompt action can be taken if any sensitive data is found on the dark web.