Last Updated: May 2026
Shadow IT Guard utilizes external forensic analysis and public-facing APIs. We do not require, store, or request administrative credentials for your domain.
All forensic audits are conducted using publicly accessible node endpoints and third-party validation tools (e.g., Google PageSpeed Insights). We do not install tracking scripts on your server to generate our diagnostic reports.
Email addresses provided for payload decryption are secured and used exclusively for the delivery of technical documentation and critical infrastructure updates regarding your domain.