Easy Setup

From zero to
continuous scanning
in four steps.

Setting up Datashielder takes roughly five minutes. Give us a root domain, we handle the reconnaissance, you choose what becomes a target. No source code, no integrations, no tickets.

At a glance

Time to setup

~5 minutes

What we need

A root domain

Engineering effort

Zero

First findings

Within 24 hours

The setup flow.

Four short steps. Each one takes under a minute. You can walk away at any point — we save as you go.

  1. 01
    Organization

    Create your organization.

    All domains, targets, and reports live inside an organization. Invite teammates later from the dashboard — everyone on your team sees the same scans.

    ~30 seconds · single sign-on ready

  2. 02
    Target Set

    Name a target set.

    A target set is a named batch of domains scanned together — for example 'Production Endpoints' or 'Q1 Audit Scope'. Group anything you'd want in the same report.

    One name, one line

  3. 03
    Domains

    Add your root domains.

    Type a root domain like example.com. We run subdomain enumeration in the background and surface everything we find — api, admin, staging, the forgotten 2019 microsite.

    Automatic subdomain discovery

  4. 04
    Launch

    Review, authorize, launch.

    Tick the subdomains you want scanned, confirm you have authorization to probe them, and click create. Your first scan begins immediately.

    First findings within 24 hours

The actual interface.

Not a mockup — these are real screens from the product. Every monitored target gets its own command centre with severity scoring, a full scan timeline, and a triage-ready report feed.

Target · Scan History

Every domain gets its own command centre.

Domain status, threat severity, scan timeline, and triaged findings on a single screen.

Datashielder scan history page showing severity scores, pending reports, and a scan timeline.
Threat Severity

Risk, at a glance.

Each detector category gets a 0-100 score and colour-coded severity. Quick to read, quick to prioritise.

Severity gauges showing Data Exposure at 27/100 (moderate) and Data Manipulation at 12/100 (low).
Target Header

Monitored host, at a glance.

URL, last scan state, pending count, and severity for every detector — in one header strip.

Target header for payments.example.org with two critical-severity detectors and a Request Scan button.
Scan Timeline

A clean audit trail.

Every scan is recorded — in progress, completed, failed — with exact start and finish timestamps.

Scan timeline table with In Progress, Pending, Failed, and Completed rows.
Request Scan

Scan on demand.

Kick off an ad-hoc scan between scheduled runs. Every state of the button is reachable in one place.

Request Scan button in its idle, requesting, requested, cancelling, and in-progress states.
Report Feed

Every finding, triaged.

Pending, resolved, or dismissed — filter by state, category, or domain. Built to be worked through, not stared at.

Report list showing twenty vulnerability findings with severity tags and pending status.

Ready when you are

Five minutes to your first scan.

No engineering effort, no source-code access. Just a domain and a name — we'll take it from there.