Getting Started with ShadowMap
ShadowMap is an External Attack Surface Management (EASM) platform that continuously discovers, monitors, and helps you manage your organization's external digital risk exposure.
What ShadowMap Does
ShadowMap scans the internet to find assets and threats related to your organization, including:
- Web and mobile applications associated with your domains
- Exposed data in code repositories, cloud storage, and leaked databases
- Dark web mentions of your organization in breach forums, stealer logs, and marketplaces
- Brand abuse such as phishing sites, fake apps, and domain squatting
- Threat intelligence relevant to your industry and technology stack
- Vulnerabilities in your exposed infrastructure
All findings are consolidated into a single dashboard with alerting, SLA tracking, and reporting.
Prerequisites
Before you begin, you need:
- An active ShadowMap account (provided by your organization's admin)
- A modern web browser (Chrome, Firefox, Edge, or Safari)
- The domains and keywords your organization wants to monitor (configured by your admin)
Next Steps
- First Login — Log in and set up your account security
- Navigating ShadowMap — Understand the interface layout and navigation
- Dashboard Overview — Start with the main dashboard
