FAQ

Clear answers about the passive lane, the deeper authorized lane, and how private results work.

These answers explain the passive_public lane, the governed authorized_deep lane, private results delivery, connectors, trusted exports, and ongoing monitoring behavior in language that stays useful for technical buyers and executive readers.

Quick answer

What happens after I submit a domain?

KMayer Exposure Lens AI validates the domain, queues the passive_public review, and emails a one-time verification link plus the private results URL. The review runs asynchronously so the public form stays fast.

Quick answer

What do I receive after I verify my email?

You unlock the private results page for that review. The page can include the executive summary, technical highlights, risk themes, recommended next steps, and the trust or business context available for the current result.

Quick answer

What is the difference between the passive public review and the authorized deep review?

passive_public is the default entry lane and uses public passive evidence only. authorized_deep is a governed lane for verified ownership plus active engagement, and it can add approved read-only connector context, trusted export intelligence, monitoring, and deeper explainability.

Quick answer

When does the deeper authorized review apply?

It applies only when verified ownership, an active authorized engagement, and the right approvals are in place. It is not anonymously available and it does not replace the passive public boundary.

Quick answer

Do you use logins, brute force, or active testing?

No. The public lane is passive-only and the product does not do exploit attempts, credential spraying, brute-force discovery, or offensive testing.

Quick answer

Which connectors can contribute evidence?

When authorized for the reviewed account or domain, read-only connectors such as Cloudflare and Microsoft 365 can enrich evidence. Connector coverage is governed per tenant and only used when configured safely.

Quick answer

Can trusted exports or customer-provided artifacts be used?

Yes, but only in the governed authorized_deep lane. Trusted exports or customer-provided artifacts are used only when the account, engagement, and parse approvals allow them.

Quick answer

Are uploads quarantined and reviewed before parsing?

Yes. Approved artifact types are quarantined first, then held for scanner or manual review and explicit parse approval before structured extraction is allowed.

Quick answer

Can the tool compare scans and track changes over time?

Yes. The platform can retain history, compare scans, and explain meaningful deltas when recurring monitoring or prior authorized context exists for the reviewed domain.

Quick answer

Does the tool support ongoing monitoring and alerts?

Yes. Monitoring, benchmark drift, trust changes, and other recurring signals can continue after the initial review where that workflow is enabled.

Quick answer

How are suppressions or accepted risk handled?

Governed monitoring workflows can retain suppression or accepted-risk context so recurring alerts stay readable instead of noisy. Those decisions are part of the operational layer, not the anonymous public submission flow.

Quick answer

What happens if no connectors or approved artifacts are provided?

The review still works. Public passive evidence remains the base layer, and the results simply stay within the passive_public lane until deeper authorized inputs exist.

Who this tool is for

Exposure Lens AI is built for business leaders, IT managers, infrastructure owners, cybersecurity teams, MSP evaluation processes, audit preparation, and organizations that need a passive first view now plus a governed route into deeper evidence later.

What this tool is not

It is not a penetration test, exploit platform, credential-spraying tool, or anonymous authenticated assessment workflow. passive_public remains bounded, while authorized_deep still requires verified ownership, active engagement, approved evidence sources, and non-offensive operation.

KMayer - IT Service Provider
Privacy Policy

Our website is committed to protecting your privacy. We collect and process data to enhance your experience, such as recognizing you when you return and understanding how you interact with our content. Your information is used responsibly to ensure that our services remain valuable, secure, and tailored to your needs. For a detailed explanation of how we handle and protect your data, please refer to our Privacy Policy