Full onboarding guide

Walk through every step needed to get your Stealed organization production-ready: domains, keywords, team members, and your first monitor.

This guide covers everything beyond the quickstart: how to surface your full attack surface (domains, subdomains, keywords), invite team members, and set up your first end-to-end alert flow.

1. Add your domains

Stealed surveillance is anchored on the domains you own and operate. Open Settings → Domains and add every root domain you want to monitor.

Each root domain you add automatically covers:

  • The root domain itself (e.g. acme.com)
  • Every subdomain (portal.acme.com, api.acme.com, mail.acme.com)
  • Variations on uppercase / lowercase

You don't need to list subdomains individually. If you have a specific subdomain that doesn't fall under a root you control (e.g. a SaaS-hosted portal), see Keyword Insight instead.

For each domain Stealed checks ownership via a DNS TXT record. The record name and value are displayed when you add the domain. Verification typically takes a few minutes, up to one hour depending on your DNS provider's TTL.

Domain management page with multiple watched domains and their verification status

2. Add keywords (Keyword Insight)

If you want to watch for leaks targeting URLs that contain your brand or a sensitive term but aren't on your own domains, add keywords. Stealed surfaces every leak whose URL contains the keyword, even on third-party domains.

Common keywords:

  • Your company name (acme)
  • A product brand
  • A subsidiary name
  • An internal project codename

Open Settings → Keywords and add the term. Stealed highlights matches on URLs like acme.vendor.com, portal-acme.service.io or saas.example.com/acme.

Adding a keyword from the Keyword Insight settings page

Keyword Insight is included with Enterprise plans and available as an add-on on Pro plans. Contact sales to enable it.

3. Add team members

Self-service team invitations are not yet available. To add a member to your organization, write to contact@stealed.io with the email address and the role you want them to have. We'll provision them within one business day.

Available roles:

  • Owner: full administrative access, can manage billing
  • Admin: manage monitors, channels, domains, keywords, API keys
  • Member: read-only access to leaks, can be assigned events

The self-service invitation flow is on our short-term roadmap.

4. Configure your first monitor

A monitor is a rule applied to your live leak feed. When new credentials match the rule, an event fires and notifications are dispatched to your chosen channels.

Open Monitoring → New monitor and configure:

  • Filters: root domain, subdomain, keyword, leak type (combo list / infostealer), source
  • Trigger threshold: how many matching leaks before the alert fires (default: 1)
  • Time-based renotification: reminder cadence if the event stays open (default: 24 h)
  • Volume-based renotification: reminder when N new leaks match since the last notification (default: 10)
  • Delivery channels: Slack, Microsoft Teams, webhook, email

The full lifecycle of a monitor is documented in Create a monitor.

Monitor creation form with filters, threshold, renotification and channel selection

5. Configure a notification channel

Channels are where Stealed sends the alerts. From Monitoring → Channels you can configure:

  • Slack: OAuth-installed app, pick a channel
  • Microsoft Teams: incoming webhook URL from Teams + workspace
  • Custom webhook: any HTTPS endpoint that accepts JSON POST
  • Email: comma-separated list of email addresses

Channels are organization-scoped. Once configured, attach them to any monitor. See Receive notifications.

Notification channel creation form with delivery type and configuration

6. Test the flow

The fastest way to confirm your setup works end-to-end:

  1. Create a monitor with a permissive filter (e.g. all leaks on your root domain) and threshold 1
  2. Attach a notification channel
  3. Wait for the next scheduler tick (max 10 minutes) or use the Re-evaluate now button on the monitor page

If your domain has any pre-existing leaks in our dataset, you'll get an event within minutes. If not, leave the monitor running, real leaks will trigger naturally.

You can mute the test monitor or delete it after the validation: mute a monitor or just toggle it off.

What's next

On this page