Introduction to HawkShield
  • Introduction to HawkShield
  • Deployment
  • On-Prem Deployment
  • Infrastructure Deployment
  • Automation Flow for Updating Services
  • Automation Flow to Update Services
  • Administrative Guide
  • Browser Protection
    • Browser Plug-In Deployment
    • User Guide of Browser Protection
  • Email Protection
    • Admin Policy Creation
    • User Guide of Email Protection (for G-Mail)
      • Connecting G-Mail Accounts to HawkShield
    • Deployment for Outlook
    • User Guide of Email Protection (for Outlook)
      • Connecting Outlook Accounts to HawkShield
  • Introduction to HawkShield DSPM
    • Capabilites
    • Analytics Dashboard
    • DSPM Connectors
      • Setting Up Connectors
      • Managing Connector
      • Connector Dashboard
    • DSPM Findings
      • File by Entities
    • DSPM Reports
      • How to Create New Report
    • DSPM Policy
      • How to Create SaaS Policy
      • How to Create DBaaS Policy
    • DSPM Incident
    • DSPM Entities
      • How to Create New Entities
      • How to Create Categories
    • DSPM Privacy Law
      • How to Create a Privacy Law
    • Data Lineage
    • Security Inventory
  • Settings
    • Add/Edit Notification Channel
    • Default Reason
    • Blocked Domain
    • Request Approval
  • Subscription
  • Logs
Powered by GitBook
On this page
  1. Introduction to HawkShield DSPM

Analytics Dashboard

PreviousCapabilitesNextDSPM Connectors

Last updated 4 months ago

Overview

The HawkShield dashboard provides an intuitive, interactive interface that centralizes data security management.

HawkShied Main Dashboard

  1. Three keys on the main dashboard (Discovery, Email Protection, Browser Protection) display specific metrics. Users can toggle time periods (7, 30, 60, custom days) via the top-right dropdown.

  2. The admin account button provides centralized access for account management, change password, and logout.

  3. Data security posture is displayed with metrics like Total Assets, Total Connectors, Total Entities, and Total Policies.

  4. Daily scan reports show data scans completed on all active connectors, highlighting new activity.

  5. Top incidents list key data-related events during the selected time period for easy tracking.

  6. Top findings display the types of sensitive data discovered and their frequency of extraction.

  7. Compliance metrics show adherence percentages to 20+ standards like PII, GDPR, CPRA, and HIPAA.

  8. Top sensitive information measures how often private data (e.g., phone numbers, emails) is securely shared within the system.

  9. Top connectors display the largest data activity across more than 100+ connectors, such as OneDrive, Dropbox, and AWS.

  10. Real-time protection metrics monitor active connector engagement, including added detection capabilities and total active logging.