SpyCloud collector
Overview
The SpyCloud collector can help fraud prevention teams stay ahead of customer ATO fraud by detecting and resetting exposed consumer passwords early in the breach lifecycle, heading off account takeover attempts.
Minimum configuration required for basic pulling
Although this collector supports advanced configuration, the fields required to retrieve data with basic configuration are defined below.
This minimum configuration refers exclusively to those specific parameters of this integration. There are more required parameters related to the generic behavior of the collector. Check setting sections for details.
Setting | Details |
---|---|
| SpyCloud API key. You can access your API key(s) |
See the Accepted authentication methods section to verify what settings are required based on the desired authentication method.
Devo collector features
Feature | Details |
---|---|
Allow parallel downloading ( |
|
Running environments |
|
Populated Devo events |
|
Flattening preprocessing |
|
Data sources
Data source | Description | API endpoint | Collector service name | Devo table | Available from release |
---|---|---|---|---|---|
Watchlist | Watchlist assets extracted from breach data |
|
|
| v1.0 |
Vendor setup
Configure domains: Add all appropriate domains and subdomains owned by your company to the watchlist - you must own your domain to add it-.
Configure emails: Add all the personal email addresses of key employees and executives to the Personal email watchlist. The owner of the email will receive a verification message. Once the owner of the mailbox clicks the verification button in the message, the email address will be immediately added to monitor it.
Configure IPs: Add the IP address ranges that your company uses to the watchlist.
Whitelist the Devo collector IP:
Request that your Devo account manager or support provide you with the IP of your Devo collector.
Once you know the IP, request that SpyCloud add your IP to the whitelist in the API section.
Obtain your SpyCloud API key from the API page.
Generate sample events:
Insert
example.net
into the domains watchlist.Insert
192.168.1.0
into the IP watchlist.Wait for the SpyCloud platform to correlate watchlist entries with the collections dataset to create incidents.
Accepted authentication methods
Authentication method | API key |
API key | Required |
Run the collector
Once the data source is configured, you can either send us the required information if you want us to host and manage the collector for you (Cloud collector), or deploy and host the collector in your own machine using a Docker image (On-premise collector).
Collector services detail
This section is intended to explain how to proceed with specific actions for services.
Events service
Collector operations
This section is intended to explain how to proceed with the specific operations of this collector.
Change log
Release | Released on | Release type | Details | Recommendations |
---|---|---|---|---|
| Nov 29, 2024 | IMPROVEMENTS SECURITY |
| |
| May 24, 2024 | IMPROVEMENTS |
| |
| Jun 21, 2023 | BUG FIX |
| |
| Jun 9, 2023 | RELEASE |
|