Introduction to HawkShield
  • Introduction to HawkShield
  • Deployment
  • On-Prem Deployment
  • Infrastructure Deployment
  • Automation Flow for Updating Services
  • Automation Flow to Update Services
  • Administrative Guide
  • Browser Protection
    • Browser Plug-In Deployment
    • User Guide of Browser Protection
  • Email Protection
    • Admin Policy Creation
    • User Guide of Email Protection (for G-Mail)
      • Connecting G-Mail Accounts to HawkShield
    • Deployment for Outlook
    • User Guide of Email Protection (for Outlook)
      • Connecting Outlook Accounts to HawkShield
  • Introduction to HawkShield DSPM
    • Capabilites
    • Analytics Dashboard
    • DSPM Connectors
      • Setting Up Connectors
      • Managing Connector
      • Connector Dashboard
    • DSPM Findings
      • File by Entities
    • DSPM Reports
      • How to Create New Report
    • DSPM Policy
      • How to Create SaaS Policy
      • How to Create DBaaS Policy
    • DSPM Incident
    • DSPM Entities
      • How to Create New Entities
      • How to Create Categories
    • DSPM Privacy Law
      • How to Create a Privacy Law
    • Data Lineage
    • Security Inventory
  • Settings
    • Add/Edit Notification Channel
    • Default Reason
    • Blocked Domain
    • Request Approval
  • Subscription
  • Logs
Powered by GitBook
On this page
  1. Introduction to HawkShield DSPM

Security Inventory

PreviousData LineageNextSettings

Last updated 4 months ago

The Security Inventory provides a comprehensive overview of all resources in the system, their associated risks, and compliance with security regulations.

  1. Go to the Discovery on the main dashboard and click on Security Inventory.

  2. The black banner displays:Total number of connected connectors in the system, total findings categorized by severity (Critical, High, Medium, Low), total number of applicable tags and security regulations.

  3. The Resource Table below gives an overview of all resources, including their regions and creation dates enabling admins to monitor and track them effectively.

Additionally: Clicking on a selected resource will open the Misconfiguration Dashboard, where the admin can view details such as the resource’s record state, compliance status, policy ID, and other related information.

For a deeper dive into a specific resource, click on it to open detailed information.