/Users/Guide/Insights 360
Overview Insights 360
Overview Insights 360
Managing user account settings and preferences
API Keys
DSPM and DSPM Discovery best practices
Dataflows Components Content Attributes
Dashboards
Use the Data view in DSPM Discovery to investigate objects and labels
Data at Rest Deployment & Tuning Best Practices
Data Catalog
Data Catalog Search
Data Object Details
Use Data Pattern labels to reflect content inspection matches (Early Access)
Understand data ownership with Data Provenance labels (Early Access)
Configure Data Sensitivity rollups from other labels (Early Access)
Configure AI-driven Data Type labels (Early Access)
Review connected repositories in DSPM Discovery
Directory Integrations
Overview of DSPM Discovery, features, benefits, and pages
Endpoint Management Configurations
Endpoint Detection Configuration
Endpoint Inspection Configuration
Download Cyberhaven endpoint installers and registration commands
Monitor registered Cyberhaven sensors and endpoint health
Managing endpoint sensors and sensor deployment groups
Endpoint Policy Configuration
Endpoint Management Profiles
Define sensor and extension update behavior
Use Explorer to visualize data objects and locations in DSPM Discovery
FAQs for DSPM and DSPM Discovery
Manage and track security incidents when user actions result in policy responses
Manage and track security incidents when user actions result in policy responses
Comprehensive user-focused view of your organization's internal security risks
Comprehensive user-focused view of your organization's internal security risks
Insights 360 Dashboards
Insights 360 Detect
Insights 360 Identify and Classify
Insights 360 Protect
Insights 360 Respond
Insights 360 User Interface
Label overview for Cyberhaven Classification (Early Access)
AI-powered incident detection and management with Cyberhaven's Linea AI
Understand how Linea AI summarizes, prioritizes, and escalates incidents within the Cyberhaven Console
Dataflows Components Location Attributes
Create, duplicate, and maintain endpoint management profiles
Overview Object Management
Users & Keys
Endpoint Performance Configuration
Profile Overrides
Protection Policy Design & Tuning Best Practices
Cyberhaven Risk Overview Dashboard and Features
Understand filtering options, event details, and export capabilities in Risks Overview.
Understand the policy column in Risks Overview and how policies are enforced at destinations.
Understand the datasets column in Risks Overview, sensitivity ratings, and dataset management.
Comprehensive user-focused view of your organization's internal security risks
Overview of Security for AI
Security for AI Apps
Security for AI Dashboards
Security for AI Data
Security for AI User Interface
Security for AI Users
Incident Status
Simplified vs. legacy lineage views in Cyberhaven dataflows.
Cyberhaven Users Documentation Overview
User Management
User Mapping
User Roles
User Scopes
Advanced business intelligence platform for visualizing Cyberhaven data through dashboards and charts
Advanced business intelligence platform for visualizing Cyberhaven data through dashboards and charts
Advanced business intelligence platform for visualizing Cyberhaven data through dashboards and charts
Advanced business intelligence platform for visualizing Cyberhaven data through dashboards and charts