# Welcome to KELA's Documentation Portal

## Products Documentation

### Investigate

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Investigate User Guide</strong></td><td>Become a cybercrime investigations champion</td><td><a href="/files/M6UlQqzs27P1wlNCJnco">/files/M6UlQqzs27P1wlNCJnco</a></td><td><a href="https://docs.ke-la.com/user-guides/">https://docs.ke-la.com/user-guides/</a></td></tr><tr><td><strong>Investigate API</strong></td><td>Explore the Investigate API documentation and references</td><td><a href="/files/zz28YjCq4RPXc5YLSoOs">/files/zz28YjCq4RPXc5YLSoOs</a></td><td><a href="https://docs.ke-la.com/api-documentation/">https://docs.ke-la.com/api-documentation/</a></td></tr></tbody></table>

### Monitor

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Monitor User Guide</strong></td><td>Learn how to efficiently configure your attack surface and monitor alerts</td><td><a href="/files/cDml2VzW0j4zGG4jfZXT">/files/cDml2VzW0j4zGG4jfZXT</a></td><td><a href="https://docs.ke-la.com/user-guides/radark">https://docs.ke-la.com/user-guides/radark</a></td></tr><tr><td><strong>Monitor API</strong></td><td>Explore the Monitor API documentation and references</td><td><a href="/files/XHNmzxc2rWVy6JaVe1Pt">/files/XHNmzxc2rWVy6JaVe1Pt</a></td><td><a href="https://docs.ke-la.com/api-documentation/radark-api">https://docs.ke-la.com/api-documentation/radark-api</a></td></tr></tbody></table>

### Threat Landscape

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Threat Landscape User Guide</strong></td><td>Stay ahead of threats with KELA’s intelligence insights</td><td><a href="/files/WDO6CJ9pMVQM7sWVWzMK">/files/WDO6CJ9pMVQM7sWVWzMK</a></td><td><a href="https://docs.ke-la.com/user-guides/threat-landscape">https://docs.ke-la.com/user-guides/threat-landscape</a></td></tr><tr><td><strong>Threat Landscape API</strong></td><td>Explore the Threat Landscape API documentation and references</td><td><a href="/files/cJaGjBVq8Np91qnpCATP">/files/cJaGjBVq8Np91qnpCATP</a></td><td><a href="https://docs.ke-la.com/api-documentation/threat-landscape-api">https://docs.ke-la.com/api-documentation/threat-landscape-api</a></td></tr></tbody></table>

### Identity Guard

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Identity Guard User Guide</strong></td><td>Your ultimate defence against compromised credentials</td><td><a href="/files/WovQBLvUTszBgKodpRF9">/files/WovQBLvUTszBgKodpRF9</a></td><td><a href="https://docs.ke-la.com/user-guides/identity-guard">https://docs.ke-la.com/user-guides/identity-guard</a></td></tr><tr><td><strong>Identity Guard API</strong></td><td>Explore the Identity Guard API documentation and references</td><td><a href="/files/mSjPaxPTzrIMIWDZ8jm9">/files/mSjPaxPTzrIMIWDZ8jm9</a></td><td><a href="https://docs.ke-la.com/api-documentation/identity-guard-api">https://docs.ke-la.com/api-documentation/identity-guard-api</a></td></tr></tbody></table>

### Threat Actors

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Threat Actors User Guide</strong></td><td>Explore &#x26; identify actors posing threats to your organization</td><td><a href="/files/k6uoYossyaFW5ekUQetH">/files/k6uoYossyaFW5ekUQetH</a></td><td><a href="https://docs.ke-la.com/user-guides/threat-actors">https://docs.ke-la.com/user-guides/threat-actors</a></td></tr><tr><td><strong>Threat Actors API</strong></td><td>Explore the Threat Actors API documentation and references</td><td><a href="/files/x7CnuvE2fvxQVoOAO2k6">/files/x7CnuvE2fvxQVoOAO2k6</a></td><td><a href="https://docs.ke-la.com/api-documentation/threat-actors-api">https://docs.ke-la.com/api-documentation/threat-actors-api</a></td></tr></tbody></table>

### Brand Control

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Brand Control User Guide</strong></td><td>Protect your brand from phishing, impersonation, and digital abuse</td><td><a href="/files/fMcveaTJOD5Vk33nAwm8">/files/fMcveaTJOD5Vk33nAwm8</a></td><td><a href="https://docs.ke-la.com/user-guides/brand-control">https://docs.ke-la.com/user-guides/brand-control</a></td></tr><tr><td><strong>Brand Control API</strong></td><td>Explore the Brand Control API documentation and references</td><td><a href="/files/EsoAZCFGoIQMi9zRrEMe">/files/EsoAZCFGoIQMi9zRrEMe</a></td><td><a href="https://docs.ke-la.com/api-documentation/brand-control-api">https://docs.ke-la.com/api-documentation/brand-control-api</a></td></tr></tbody></table>

***

## Platform features

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="image">Cover image</th></tr></thead><tbody><tr><td><strong>Integrations</strong></td><td>Learn how to integrate your favourite apps with the KELA platform</td><td><a href="https://docs.ke-la.com/integrations/">https://docs.ke-la.com/integrations/</a></td><td><a href="/files/p3kDgkDiIldVziUbetP2">/files/p3kDgkDiIldVziUbetP2</a></td></tr><tr><td><strong>Safe Environment</strong> </td><td>Inspect potentially malicious artifacts in a cloud based safe space</td><td><a href="https://docs.ke-la.com/platform/safe-environment">https://docs.ke-la.com/platform/safe-environment</a></td><td><a href="/files/sn21ZSMkewyJV2D6PLbt">/files/sn21ZSMkewyJV2D6PLbt</a></td></tr></tbody></table>

***

## KELA Updates

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Release Notes</strong></td><td>Keep posted on KELA's most recent releases</td><td><a href="/files/LLjGDtK9XMM6wU4T1MzD">/files/LLjGDtK9XMM6wU4T1MzD</a></td><td><a href="https://docs.ke-la.com/kela-updates/">https://docs.ke-la.com/kela-updates/</a></td></tr></tbody></table>

{% hint style="info" %}
**Notice**: access to documents is subject to user authentication.
{% endhint %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.ke-la.com/kela-docs/welcome-to-kelas-documentation-portal.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
