Credential Risk Detection is available to organizations on a Dashlane Business Plus plan.
Upgrade to Dashlane Business Plus
What is Credential Risk Detection?
After Credential Risk Detection is turned on, any at-risk passwords entered by employees in company-managed desktop browsers will be logged in the Activity Log and displayed on the Insights tab on the Risk Detection page.
The Insights tab displays the total number of weak and compromised passwords entered on company-managed desktop browsers by employees not logged in to Dashlane. In the Insights tab, you can see the employees most at risk, how many weak and compromised passwords they have, and their last activity. To export Risk Detection logs to a CSV file and filter the logs, select Download CSV
When you identify an employee with risky password practices, you can invite them to your Dashlane plan. With Dashlane, they can use the Password Generator to create strong, secure passwords and store their credentials safely in an encrypted vault.
Over time, you'll see changes in these numbers according to how consistently your plan members start using Dashlane and strengthen their passwords.
Invite employees to your plan
Generate a password using Dashlane
Review Risk Detection insights
Admins can view totals for at-risk password activity on the Insights tab on the Risk Detection page and detailed log data on the Dashlane Activity Log page.
General insights
The Insights tab on the Risk Detection page displays the risk detection totals since the organization started tracking credential risk:
- The total number of employees not logged in to Dashlane and have entered weak or compromised passwords
- The number of times these employees have entered a weak password
- The number of times employees have entered a compromised password
- The employees most at risk
Detailed log data
The Insights tab of the Risk Detection page shows the Employees most at risk and their detailed data.
To work with reporting data more easily, Dashlane offers a detailed Activity Log, which admins can search and filter to find employees with weak or compromised passwords. These logs help you pinpoint the exact device and website using an at-risk password that isn't stored in Dashlane. The Risk Detection logs are encrypted using AWS Nitro technology and don't include the password itself, helping maintain employee data privacy.
More about Risk Detection and privacy
Admins can view detailed Risk Detection activity on the Activity Log page. To view all risky password activity across employees, filter the log by selecting Risk Detection as the Category.
Working with log data
Activity logs can be accessed through CLI and Splunk if those integrations are in place.
To export Risk Detection logs to a CSV file and filter the logs, select Download CSV.
More about Activity Logs
Manage your data with Dashlane's Command Line Interface
Track team activity for your Dashlane Business plan with Splunk
Add more employees to Credential Risk Detection
Although Credential Risk Detection is most beneficial when rolled out to your entire organization, you can start with a smaller group (or just yourself) during setup and extend it to more employees anytime.
To add more employees, update the Credential Risk Detection policy.
Add employees on Windows using Intune
Add employees on Windows using Group Policy (GPO)
Add employees on macOS using Jamf