Introduction to HawkShield
  • Introduction to HawkShield
  • Deployment
  • On-Prem Deployment
  • Infrastructure Deployment
  • Automation Flow for Updating Services
  • Automation Flow to Update Services
  • Administrative Guide
  • Browser Protection
    • Browser Plug-In Deployment
    • User Guide of Browser Protection
  • Email Protection
    • Admin Policy Creation
    • User Guide of Email Protection (for G-Mail)
      • Connecting G-Mail Accounts to HawkShield
    • Deployment for Outlook
    • User Guide of Email Protection (for Outlook)
      • Connecting Outlook Accounts to HawkShield
  • Introduction to HawkShield DSPM
    • Capabilites
    • Analytics Dashboard
    • DSPM Connectors
      • Setting Up Connectors
      • Managing Connector
      • Connector Dashboard
    • DSPM Findings
      • File by Entities
    • DSPM Reports
      • How to Create New Report
    • DSPM Policy
      • How to Create SaaS Policy
      • How to Create DBaaS Policy
    • DSPM Incident
    • DSPM Entities
      • How to Create New Entities
      • How to Create Categories
    • DSPM Privacy Law
      • How to Create a Privacy Law
    • Data Lineage
    • Security Inventory
  • Settings
    • Add/Edit Notification Channel
    • Default Reason
    • Blocked Domain
    • Request Approval
  • Subscription
  • Logs
Powered by GitBook
On this page

Administrative Guide

PreviousAutomation Flow to Update ServicesNextBrowser Protection

Last updated 4 months ago

  1. Account Registration

To start, you need to fill in some basic information that is strictly necessary for registration purposes, in the special sign-up form. After entering your information, from our side, you will receive a “Subscription ID”, which will be required for further use.

  1. Login Process

Having finished the registration process, you need to use the login and password given to you to enter the system.

  1. Enabling Two-Factor Authentication (Optional)

Finally, after successful login in, you will have the privilege of turning on the two-factor authentication which will increase security. If you want, you may proceed with the configurations required for 2FA or you can skip configuring it for the present. It is advised to turn on 2FA for the protection of your account at its highest level.

  1. Two-Factor Authentication Setup

  • If you decide to turn on 2FA, you will be taken to the next page – here you will be asked to use the QR code with an authentication application.

  • After the scan, go to the next window where the participant would enter the authentication token generated.

  1. Accessing the HawkShield Dashboard

When you complete the authentication process without any issue, the HawkShield Dashboard will appear in front of you with all the access rights to the system and the administrator dashboard.