# Results

The <mark style="color:green;">**Results**</mark> interface displays enriched and correlated information about each monitored entitywhether it is a <mark style="color:green;">**company-level configuration**</mark><mark style="color:green;">, a specific</mark> <mark style="color:green;"></mark><mark style="color:green;">**VIP**</mark><mark style="color:green;">, a</mark> <mark style="color:green;"></mark><mark style="color:green;">**sensitive string**</mark><mark style="color:green;">, or a</mark> <mark style="color:green;"></mark><mark style="color:green;">**domain**</mark>. This is the primary view for analysts to investigate entity-level exposure and track all findings linked to that asset across surface, deep, and dark sources.

Each record consolidates contextual metadata, historical findings, enrichment details, and automation outputs. Analysts can use this interface to monitor ongoing exposure, review detection history, and evaluate risk signals tied to the selected entity.

***

#### Sections per Entity Type

* <mark style="color:green;">**Company Profile Results**</mark>\
  Displays the company name, tax identifiers, social media handles, and configured monitoring profile. Shows a chronological list of all findings that matched any item from the company configuration, including domain-based leaks, impersonations, and VIP exposures.
* <mark style="color:green;">**VIP Results**</mark>\
  For each registered VIP (executive, stakeholder, or key individual), this section presents their identifiers, aliases, and custom metadata. Findings are grouped by type (e.g., mentions, credential leaks, impersonation attempts), with timeline and severity indicators.
* <mark style="color:green;">**Sensitive String Results**</mark>\
  Lists each configured keyword, tag, or expression, along with matches detected across monitored sources. Results include context snippets, source links, and whether the string was found in code, documents, or threat actor discussions.
* <mark style="color:green;">**Domain Results**</mark>\
  Displays all findings associated with the domain, including leaked documents, phishing lookalikes, code repository exposures, and clone detections from the JS monitoring probe. The view also includes domain enrichment (WHOIS, DNS records, certificate transparency, etc.).

***

#### Available Data Points

Each result includes:

* <mark style="color:green;">**Enriched metadata**</mark> (source, first seen, last seen, risk level, matched pattern)
* <mark style="color:green;">**Finding preview**</mark> (summary, evidence type, threat category)
* <mark style="color:green;">**Linked incidents**</mark> (if the finding triggered a response case)
* <mark style="color:green;">**Automated rule matches**</mark> (if any structured rule matched the entity)
* <mark style="color:green;">**Tags and classification**</mark> (automatically assigned by the DRP engine)
* <mark style="color:green;">**Visual timeline**</mark> (showing recurrence and frequency of exposure)

***

#### Exports

Results for each entity can be **exported** in <mark style="color:green;">**CSV**</mark><mark style="color:green;">,</mark> <mark style="color:green;"></mark><mark style="color:green;">**PDF**</mark><mark style="color:green;">, or</mark> <mark style="color:green;"></mark><mark style="color:green;">**HTML**</mark> format to support audits, reporting, or integration with external systems. Exports preserve all metadata and finding references for traceability.
