Skip to main content
Version: Next (Unreleased)

Getting Started

This guide walks you through your first session with Detektix — from logging in to understanding your dashboard and reviewing your first PhantomID.

Logging In

Detektix uses Single Sign-On (SSO) for authentication. Depending on your organization's setup, you'll sign in with:

  • Google Workspace — Click "Sign in with Google" and use your corporate Google account
  • Microsoft Azure AD — Click "Sign in with Microsoft" and use your organization's Microsoft account
info

Your administrator will have already created your account and assigned your role. If you can't log in, contact your Detektix administrator or reach out to support.

After signing in, you'll be redirected to the main dashboard.

Understanding the Dashboard

Dashboard Overview

The dashboard is your home base — it provides an at-a-glance view of PhantomID activity across your organization.

The left sidebar provides access to all platform features:

SectionDescriptionAccess Level
DashboardAnalytics overview with call volume and activity chartsAll users
Phone NumbersPhantomID management table with all active identitiesAll users
GenerateCreate new PhantomIDs in bulkAdmin and above
ForensicsCall, SMS, and email logs with network graph visualizationAll users
Threat ActorsDetected threat actor profiles and trackingAll users
IntelligenceDomain intelligence and data awareness analysisAll users
InjectionInjection system — targets, jobs, mappingsAdmin and above
CampaignsCampaign orchestration and managementAdmin and above
IncidentsIncident detection and response trackingAll users
SettingsSystem configuration, integrations, user managementAdmin and above
DomainsEmail domain managementTenant Admin only
Activity LogsFull audit trail of user actionsTenant Admin only
BillingUsage tracking and billing informationTenant Admin only

Dashboard Analytics

The main dashboard displays:

  • Call volume over time — Chart showing incoming calls to PhantomIDs, broken down by affiliation
  • Active PhantomIDs — Count of currently deployed identities
  • Recent activity — Latest calls, SMS messages, and emails received
  • Threat actor summary — Count and severity distribution of detected threat actors

User Roles

Detektix uses three permission levels:

Tenant Admin

Full control over the entire tenant. Can manage users, domains, billing, and all system settings. Has access to every feature and all affiliations.

Admin

Can create, update, and delete most resources. Can manage PhantomIDs, run injections, configure integrations, and view all data within their assigned affiliations.

Read Only

Can view all data within their assigned affiliations but cannot create, modify, or delete anything. Ideal for stakeholders who need visibility without operational access.

Key Terminology

Before diving deeper, familiarize yourself with these terms:

TermDefinition
PhantomIDA synthetic identity (fake person) created by the platform with a name, email, phone number, and address
AffiliationAn organizational unit (department, brand, region) that owns a group of PhantomIDs
InjectionThe process of deploying a PhantomID into an external platform (CRM, website, database, etc.)
Injection TargetA specific external platform configured to receive PhantomIDs
TagA color-coded label used to categorize and organize PhantomIDs
Threat ActorAn identified entity that has contacted one or more of your PhantomIDs
CampaignAn organized set of PhantomID deployments with a defined objective
IncidentA security event triggered when a PhantomID is contacted
CleanA PhantomID that has not yet been contacted — no breach signal
DirtyA PhantomID that has been contacted — potential data exposure detected
ArchivedA PhantomID that has been retired from active monitoring
BYOTBring Your Own Twilio — connect your organization's existing Twilio account

Your First PhantomID

Let's walk through viewing and understanding a PhantomID.

Step 1: Navigate to Phone Numbers

Click Phone Numbers in the left sidebar. This shows all PhantomIDs in a sortable, filterable table.

Step 2: Understand the Table

Each row represents one PhantomID with these key columns:

  • Name — The synthetic identity's full name
  • Phone Number — The Twilio-provisioned number assigned to this PhantomID
  • Email — The monitored email address
  • Affiliation — Which business unit owns this PhantomID
  • Tags — Color-coded labels for organization
  • Status — Clean (no contact), Dirty (contacted), or Archived

Step 3: View PhantomID Details

Click on any PhantomID row to see its full profile:

  • Complete identity information (name, address, locale)
  • Assigned phone number and email
  • Injection history — where this PhantomID has been deployed
  • Communication log — calls, SMS, and emails received
  • Threat actor associations — who has contacted this PhantomID

Use the filters at the top of the table to narrow your view:

  • Affiliation — Show PhantomIDs for a specific business unit
  • Status — Filter by Clean, Dirty, or Archived
  • Tags — Filter by specific tags
  • Search — Free-text search across names, emails, and phone numbers

What Happens When a PhantomID Is Contacted?

When someone calls, texts, or emails a PhantomID:

  1. The communication is logged — Call details, SMS content, or email data is captured and stored
  2. The PhantomID status updates — Changes from "Clean" to "Dirty", signaling potential data exposure
  3. Caller information is enriched — The platform looks up the caller's carrier, location, and reputation
  4. Threat actor detection runs — The system checks if this caller matches known patterns or has contacted other PhantomIDs
  5. Alerts fire — Configured webhooks and notifications are triggered
  6. An incident may be created — Based on severity rules, an incident is automatically generated

This is the core detection loop — every contact with a PhantomID is a signal that planted data has been accessed or leaked.

Next Steps

Now that you understand the basics, explore these guides:

tip

Bookmark this documentation site — press Ctrl+K (or Cmd+K on Mac) at any time to search across all pages.