Security Setup Guide

Protect your digital identity in minutes. Follow this beginner-friendly guide to activate comprehensive threat monitoring.

Step 1: Create Account Required

Start your protection journey by creating a secure Netraksha AI account. We require email verification to ensure that you, and only you, have access to your identity dashboard.

Action: Click "Sign Up" in the navigation bar, enter your credentials, and verify your email address via the link we send you.

Step 2: Add Identity Details

To accurately scan the internet for misuse, our AI needs to know who to look for. Providing your full name, aliases, and public social profile links increases detection accuracy.

Action: Navigate to the "Profile Settings" in your dashboard and input your name, common usernames, and social media links.

Step 3: Enable Monitoring Crucial

Our continuous scanning engine operates 24/7 across public platforms, forums, and dark web sources to detect anomalies and unauthorized usage of your data.

Action: Toggle the "Real-Time Scanning" switch to the ON position in your security dashboard.

Step 4: Upload Images

Prevent deepfakes and stolen photos by adding reference images to your secure vault. We use advanced facial recognition to identify visual impersonations.

Action: Go to the "Image Vault" section and securely upload 2-3 clear reference photos of yourself.

Step 5: Configure Alerts

Stay informed the moment a threat is detected. Customize how you want to be notified so you can take rapid action against identity theft.

Action: In "Notification Preferences", enable both Email Alerts and Dashboard Notifications for high-risk threats.

Step 6: Use Link Scanner

Don't fall for phishing scams designed to steal your credentials. Use our AI-powered link scanner to verify URLs before you click them.

Action: Bookmark the "Phishing Scanner" tool and paste any suspicious email or SMS links there first.

Step 7: Take Action on Threats

When a threat is detected, Netraksha gives you the tools to fight back. From generating takedown notices to providing step-by-step blocking guidance.

Action: Review active alerts in your dashboard, report fake profiles using our templates, and block malicious sources.
Start Protection