Introduction to HawkShield
  • Introduction to HawkShield
  • Deployment
  • On-Prem Deployment
  • Infrastructure Deployment
  • Automation Flow for Updating Services
  • Automation Flow to Update Services
  • Administrative Guide
  • Browser Protection
    • Browser Plug-In Deployment
    • User Guide of Browser Protection
  • Email Protection
    • Admin Policy Creation
    • User Guide of Email Protection (for G-Mail)
      • Connecting G-Mail Accounts to HawkShield
    • Deployment for Outlook
    • User Guide of Email Protection (for Outlook)
      • Connecting Outlook Accounts to HawkShield
  • Introduction to HawkShield DSPM
    • Capabilites
    • Analytics Dashboard
    • DSPM Connectors
      • Setting Up Connectors
      • Managing Connector
      • Connector Dashboard
    • DSPM Findings
      • File by Entities
    • DSPM Reports
      • How to Create New Report
    • DSPM Policy
      • How to Create SaaS Policy
      • How to Create DBaaS Policy
    • DSPM Incident
    • DSPM Entities
      • How to Create New Entities
      • How to Create Categories
    • DSPM Privacy Law
      • How to Create a Privacy Law
    • Data Lineage
    • Security Inventory
  • Settings
    • Add/Edit Notification Channel
    • Default Reason
    • Blocked Domain
    • Request Approval
  • Subscription
  • Logs
Powered by GitBook
On this page
  1. Introduction to HawkShield DSPM

DSPM Incident

PreviousHow to Create DBaaS PolicyNextDSPM Entities

Last updated 4 months ago

The Incident Dashboard in HawkShield tracks and lists all incidents that occur during information sharing across connectors. This section enables admins to identify data leaks and take immediate actions to prevent further risks.

To access the Incident Dashboard, log into HawkShield, go to "Discovery" from the main dashboard, and click "Incident" in the left sidebar menu. Once inside, you can view a detailed list of all incidents recorded in the system.

Click on an incident, opens an information box containing comprehensive details such as the file name, size, data type, file URL, owner email, severity level, and the individuals or groups the data was shared with.