Identity protection

Learn how to set up and administrate identity protection feature.

Monitor identity breaches of Salesforce users

Identity protection extends WithSecure Cloud Protection for Salesforce capabilities beyond file and URL scanning. It detects when Salesforce user accounts – both internal (standard) and external (community) – may have been exposed in third-party data breaches.

It gives Salesforce admins visibility into identity risks that standard Salesforce controls don’t surface, such as reused or leaked passwords. By using continuously updated breach intelligence, identity protection helps you detect compromised accounts before attackers can exploit them for data exposure, fraud, impersonation, or unauthorized access.

Identity protection is built into WithSecure Cloud Protection for Salesforce and requires no separate license or integration. It requires active WithSecure Cloud Protection for Salesforce user-based licenses.

Before you start

You can access Identity protection under Administration → Identity protection. By default, all identity protection settings are off.

Fig 1: Identity protection settings in the Administration page

Before enabling the feature:

  • Make sure your active CPSF user licenses match the user types you want to include in breach checks.
  • Check that assigned user licenses don’t exceed your purchased CPSF user licenses. If they do, you’ll see a “batch failed” error and identity protection can’t be enabled.
  • Confirm that the connected app is enabled.
  • Identity protection can scan standard and community users. Integration and automation users are excluded.

How identity protection works

Identity protection scans Salesforce user email addresses to detect potential data breaches.

Depending on your organization’s setup:

  • All users: Scans all standard and community users, as long as the total number of users is within the license limit.
  • Selective users: Scans only selected standard and/or community users within the license limit.

The breach scan job runs automatically based on your configured schedule. Notifications appear in the CPSF app when scans start and complete.

Schedule a breach scan

You can schedule breach scans weekly to run on a specific day and time.

  1. Go to Administration → Identity protection.
  2. Under Schedule scan, select the day and time for the weekly breach lookup.
  3. Click Save.
Fig 2: Scheduled breach scan configuration in identity protection

What to expect

  • Once started, each scan takes up to three days to complete.
  • Notifications appear in the CPSF app when the scan starts and when it completes.
  • Breach records become visible progressively as the job runs.

Within three days after the scheduled scan starts, identity protection provides updates on breaches found.

View breach details

Each detected breach includes detailed metadata provided by a third-party research team.

Fig 3: Identities section showing monitored users

Reading the breach details

FieldDescription
Breach dateThe date on which the breach occurred.
TitleBreach title, if available. Generic if undisclosed.
WebsiteWebsite of the breached organization, when available.
Acquisition dateWhen the research team first obtained the data.
Breach categoryHow the data was breached (combolist, exfiltrated, exposed, infostealer, phished, scraped, unknown_).
ConfidenceConfidence in the breach source (Low, Medium, High).
Breach main categoryGeneral classification: combolist, breach, or malware.
Publish dateWhen the breach became public.
TypePublic (found online) or Private (exclusive threat intelligence).
Num recordsNumber of records parsed and deduplicated from the breach.
Sensitive sourceIndicates whether the breach source is sensitive.
Consumer categoryCategorization for product or service mapping.
Fig 4: Breach history for a user exposed to multiple breaches
Fig 5: Detailed breach information view

Review identity events

Identity events track breach activity for Salesforce users. Each event includes the breach date and time, risk type, breach reason, affected user, and other related information.

Fig 6: Identity protection events in the Analytics section

You can use search values to narrow results. Supported values are TIME, RISK, REASON, and USER.

Example:
To find all critical breaches for a specific user:
RISK=Critical, USER=John Doe

Notifications

Identity protection generates in-app notifications for configuration changes, scheduled scans, and detected breaches.

Fig 7: Notifications for breached users in identity protection
Fig 8: Breached user notification details

How severity is classified in alerts

SeverityReasonSource
InformationalConfiguration updatedAdministration
InformationalBreach check job started or completedAdministration
CriticalConnected app disconnected due to missing permission setAdministration
CriticalIdentity protection disabled due to feature parameterAdministration
CriticalIdentity protection disabled due to connected app issueIdentity protection
CriticalBreach check failed due to data processing region changeIdentity protection
CriticalBreach check exceeded the maximum number of usersIdentity protection
CriticalUsers exposed to third-party data breachIdentity protection
CriticalLicense limit exceeded — feature inactive for extra usersAdministration

Verify the setup

  • Check Administration → Identity protection to confirm settings are enabled.
  • Verify that notifications appear when the scheduled breach job runs.
  • Review Identity events in Analytics to confirm breach records are being logged.

Frequently asked questions

What is identity protection in WithSecure Cloud Protection for Salesforce?

Identity protection is a feature in WithSecure Cloud Protection for Salesforce that detects Salesforce user credentials exposed in third-party breaches.
Early detection of credential compromise enables Salesforce administrators and security teams to act before attackers get the chance to exploit it.

Why is identity protection needed in Salesforce?

Salesforce doesn’t monitor for exposed credentials, and stolen logins are involved in 22% of all data breaches globally (Verizon DBIR 2025).

When users reuse the same passwords across different services, which is known as password reuse, a breach in one system can compromise many others.

If an employee, partner, or community user’s credentials are leaked elsewhere, attackers can use those logins to access Salesforce as a trusted user.

Identity protection provides early detection and visibility inside Salesforce. Existing security tools have no scalable coverage for community user monitoring.

Which Salesforce users does identity protection monitor?

Identity protection in WithSecure Cloud Protection for Salesforce covers both internal and external user types:

Internal Salesforce users: Employees, administrators, and system accounts. Detect compromised credentials early to prevent unauthorized access or privilege escalation.

Community and partner users: Experience Cloud and partner logins often fall outside corporate security controls. WithSecure Cloud Protection for Salesforce uniquely monitors these accounts at enterprise scale — reducing the risk of impersonation, supply-chain abuse, and data exposure.

How does identity protection work?

Identity protection continuously scans Salesforce user email identifiers (securely hashed) against a combination of proprietary, commercial, and dark-web breach intelligence feeds.
This hybrid approach detects new exposures 3–6 months earlier than any public or open-source lists.

If a user’s credentials appear in a known data leak, the system flags it directly in the Cloud Protection for Salesforce dashboard, complete with breach metadata and severity information.

You’ll know:

Which users were exposed — and when

The breach source and password format

How severe the risk is

How often does identity protection run scans?

By default, identity protection scans run automatically every week. Threat intelligence feeds for credential compromises are updated daily.

Does identity protection automatically block or disable users?

No. Identity protection provides early detection and visibility, but control for response actions stays with the administrator to avoid unwanted disruption.
You decide when to reset credentials or apply other remediation steps.

Do I need to enable the connected app for identity protection to work?

Yes. The connected app must be active to use the identity protection feature.

Where can I see breach results?

Detected breaches appear under Administration → Identity protection and in the Analytics → Identity events section.

Is identity protection included in my existing license?

Yes. Identity protection is part of the WithSecure Cloud Protection for Salesforce user-based license and doesn’t require an additional license or add-on. However, it is not currently supported by volume-based licenses.

Does enabling identity protection have any data processing or compliance implications?

All email addresses are encrypted before matching with breach records. Please note that encrypted email addresses may be processed outside your normal data processing data region. By turning on the Identity Protection feature, you confirm that your organization as the data controller has a legal basis for processing the personal data of individuals covered by the Identity Protection feature and that the Data Processing Agreement applies.

Does Identity Protection process personal data?

Some personal data may be processed in the Identity Protection feature, namely the email address and related breach data. Such personal data is stored in encrypted form and processed in accordance with the Data Processing Agreement. Please note that the data in the Identity Protection feature may be processed outside your normal data processing data region.

For more information on privacy in WithSecure Cloud Protection for Salesforce, please see the WithSecure Cloud Protection for Salesforce Privacy Policy.