Identity protection

Learn how to set up and administrate identity protection feature.

Monitor identity breaches of Salesforce users with Identity Protection

Identity protection is a feature of WithSecure Cloud Protection for Salesforce (CPSF) that goes beyond file and URL scanning. It checks whether Salesforce user accounts – both internal (standard) and external (community) – have appeared in known third-party data breaches.

Identity protection gives Salesforce admins visibility into identity risks that standard Salesforce controls don’t surface, such as reused or leaked passwords. By continuously checking users against updated breach data, it helps you detect compromised accounts before attackers

Identity protection is built into WithSecure Cloud Protection for Salesforce and requires no separate license or integration. It requires active WithSecure Cloud Protection for Salesforce user-based licenses.

Before you start

You can access Identity protection under Administration → Identity protection. By default, all identity protection settings are off.

Fig 1: Identity protection settings in the Administration page

Complete the following checks before enabling the feature:

  • Ensure your active CPSF user licenses cover the user types you want to scan.
  • Verify that assigned user licenses not exceed your purchased CPSF license count. Exceeding this limit triggers a “batch failed” error and prevents identity protection from running.
  • Ensure that the connected app is enabled.
  • Only standard and community users are scanned. Integration and automation users are excluded from breach checks.

How identity protection works

Identity protection checks Salesforce user email addresses in encrypted form against a continuously updated database of known data breaches, surfacing any accounts that may be at risk.

You can configure identity protection to scan all users or a chosen subset, depending on your license count and preferences:

  • All users: Scans all standard and community users, provided the total user count is within your license limit.
  • Selective users: Scans a chosen subset of standard and/or community users, up to your license limit.

The breach scan job runs automatically based on your configured schedule. In-app notifications are sent when scans start and when they complete.

Schedule a breach scan

Breach scans run on a weekly schedule. Set the day and time that works best for your organization.

  1. Go to Administration → Identity protection.
  2. Under Schedule scan, choose the preferred day and time for the weekly scan.
  3. Click Save.
Fig 2: Scheduled breach scan configuration in identity protection

What to expect

  • Each scan can take up to three days to complete from the time it starts.
  • You receive in-app notifications in CPSF when the scan starts and again when it finishes.
  • Breach results appear in the Identities section as the scan progresses – you do not need to wait for the job to finish.

All breach results are available within three days of the scan start date.

View breach details

When a breach is detected, identity protection displays detailed metadata sourced from a third-party threat intelligence team. The table below describes each field.

Fig 3: Identities section showing monitored users

Reading the breach details

FieldDescription
Breach dateThe date on which the breach occurred.
TitleBreach title, if available. Generic if undisclosed.
WebsiteWebsite of the breached organization, when available.
Acquisition dateWhen the research team first obtained the data.
Breach categoryHow the data was breached (combolist, exfiltrated, exposed, infostealer, phished, scraped, unknown_).
ConfidenceConfidence in the breach source (Low, Medium, High).
Breach main categoryGeneral classification: combolist, breach, or malware.
Publish dateWhen the breach became public.
TypePublic (found online) or Private (exclusive threat intelligence).
Num recordsNumber of records parsed and deduplicated from the breach.
Sensitive sourceIndicates whether the breach source is sensitive.
Consumer categoryCategorization for product or service mapping.
Fig 4: Breach history for a user exposed to multiple breaches
Fig 5: Detailed breach information view

Review identity events

Identity events provide a detailed log of breach activity across your Salesforce users. Each event records the date and time of the breach, its risk severity, the breach reason, and the affected user.

Fig 6: Identity protection events in the Analytics section

You can use search values to narrow results. Supported values are TIME, RISK, REASON, and USER or use visual filters.

Example:
To find all critical breaches for a specific user:
RISK=Critical, USER=John Doe

Notifications

Identity protection generates in-app notifications for key events: configuration changes, scheduled scan status updates, and detected user breaches.

Fig 7: Notifications for breached users in identity protection
Fig 8: Breached user notification details

How severity is classified in alerts

SeverityReason
InformationalConfiguration updated
InformationalBreach check job started or completed
CriticalConnected app disconnected due to missing permission set
CriticalIdentity protection disabled due to feature parameter
CriticalIdentity protection disabled due to connected app issue
CriticalBreach check failed due to data processing region change
CriticalBreach check exceeded the maximum number of users
CriticalUsers exposed to third-party data breach
CriticalLicense limit exceeded — feature inactive for extra users

Verify the setup

Once enabled, use the following checks to confirm that identity protection is working correctly.

  • Go to Administration → Identity protection to confirm that the feature is enabled and settings are saved.
  • Verify that notifications appear when the scheduled breach job runs.
  • Review Identity events in Analytics to confirm breach records are being logged.

Frequently asked questions

What is identity protection in WithSecure Cloud Protection for Salesforce?

Identity protection is a feature in WithSecure Cloud Protection for Salesforce that detects Salesforce user credentials exposed in third-party breaches.
Early detection of credential compromise enables Salesforce administrators and security teams to act before attackers get the chance to exploit it.

Why is identity protection needed in Salesforce?

Salesforce doesn’t monitor for exposed credentials, and stolen logins are involved in 22% of all data breaches globally (Verizon DBIR 2025).

When users reuse the same passwords across different services, which is known as password reuse, a breach in one system can compromise many others.

If an employee, partner, or community user’s credentials are leaked elsewhere, attackers can use those logins to access Salesforce as a trusted user.

Identity protection provides early detection and visibility inside Salesforce. Existing security tools have no scalable coverage for community user monitoring.

Which Salesforce users does identity protection monitor?

Identity protection in WithSecure Cloud Protection for Salesforce covers both internal and external user types:

Internal Salesforce users: Employees, administrators, and system accounts. Detect compromised credentials early to prevent unauthorized access or privilege escalation.

Community and partner users: Experience Cloud and partner logins often fall outside corporate security controls. WithSecure Cloud Protection for Salesforce uniquely monitors these accounts at enterprise scale — reducing the risk of impersonation, supply-chain abuse, and data exposure.

How does identity protection work?

Identity protection continuously scans Salesforce user email identifiers (securely hashed) against a combination of proprietary, commercial, and dark-web breach intelligence feeds.
This hybrid approach detects new exposures 3–6 months earlier than any public or open-source lists.

If a user’s credentials appear in a known data leak, the system flags it directly in the Cloud Protection for Salesforce dashboard, complete with breach metadata and severity information.

You’ll know:

Which users were exposed — and when

The breach source and password format

How severe the risk is

How often does identity protection run scans?

By default, identity protection scans run automatically every week. Threat intelligence feeds for credential compromises are updated daily.

Does identity protection automatically block or disable users?

No. Identity protection provides early detection and visibility, but control for response actions stays with the administrator to avoid unwanted disruption.
You decide when to reset credentials or apply other remediation steps.

Do I need to enable the connected app for identity protection to work?

Yes. The connected app must be active to use the identity protection feature.

Where can I see breach results?

Detected breaches appear under Administration → Identity protection and in the Analytics → Identity events section.

Is identity protection included in my existing license?

Yes. Identity protection is part of the WithSecure Cloud Protection for Salesforce user-based license and doesn’t require an additional license or add-on. However, it is not currently supported by volume-based licenses.

Does enabling identity protection have any data processing or compliance implications?

All email addresses are encrypted before matching with breach records. Please note that encrypted email addresses may be processed outside your normal data processing data region. By turning on the Identity Protection feature, you confirm that your organization as the data controller has a legal basis for processing the personal data of individuals covered by the Identity Protection feature and that the Data Processing Agreement applies.

Does Identity Protection process personal data?

Some personal data may be processed in the Identity Protection feature, namely the email address and related breach data. Such personal data is stored in encrypted form and processed in accordance with the Data Processing Agreement. Please note that the data in the Identity Protection feature may be processed outside your normal data processing data region.

For more information on privacy in WithSecure Cloud Protection for Salesforce, please see the WithSecure Cloud Protection for Salesforce Privacy Policy.