Skip to main content

Admin Guide

In a nutshell

What this document is: A guide to managing Clawscan through the Admin Control Center.

Why this matters: Provides full control over system behavior, detection scope, and operational visibility.

When to use this: During day-to-day operations, configuration updates, and monitoring.


Overview

Clawscan is managed through the Admin Control Center, a dedicated interface that allows organizations to:

  • configure detection domains
  • monitor system activity
  • manage usage and billing
  • control operational settings

The Admin Control Center operates without access to raw communication content.


Accessing the Admin Control Center

Access is provided to authorized users within your organization.

Typical access roles include:

  • compliance teams
  • legal teams
  • IT administrators

Access should be restricted according to internal governance policies.


Detection domain management

Admins can activate or deactivate detection domains.

Examples:

  • competition law
  • anti-corruption
  • other compliance areas

This allows organizations to:

  • align Clawscan with their risk profile
  • progressively expand coverage

Changes apply dynamically without requiring redeployment.

See:


Monitoring and insights

The Admin Control Center provides aggregated insights, including:

  • volume of analyzed communications
  • distribution of detected risks
  • trends over time

These insights are:

  • aggregated
  • non-identifying
  • focused on compliance signals

No dashboards or metrics are provided at an individual employee level.


Billing and usage

Admins can:

  • view subscription status
  • monitor usage levels
  • access invoices

Billing is based on:

  • usage metrics (e.g. processing volume)
  • subscription configuration

See:


Configuration management

Admins can manage:

  • active detection domains
  • system parameters retrieved by the engine
  • operational settings

Configuration changes are centrally managed and propagated to the Clawscan Engine.


Security and access control

The Admin Control Center enforces:

  • authenticated access
  • role-based permissions
  • secure data access patterns

Access should be granted only to authorized personnel.

See:


Data visibility

The Admin Control Center provides access to:

  • aggregated results
  • system metadata
  • operational telemetry

It does not provide access to raw communication content.

This ensures alignment with:

  • privacy-by-design principles
  • tenant-resident processing architecture

See:


Operational responsibilities

Client organizations remain responsible for:

  • defining compliance policies
  • managing user access
  • interpreting results
  • handling investigations

Clawscan provides the technical capabilities but does not enforce organizational decisions.


Next steps

➡️ Understand how users interact with the system: