Admin Guide
What this document is: A guide to managing Clawscan through the Admin Control Center.
Why this matters: Provides full control over system behavior, detection scope, and operational visibility.
When to use this: During day-to-day operations, configuration updates, and monitoring.
Overview
Clawscan is managed through the Admin Control Center, a dedicated interface that allows organizations to:
- configure detection domains
- monitor system activity
- manage usage and billing
- control operational settings
The Admin Control Center operates without access to raw communication content.
Accessing the Admin Control Center
Access is provided to authorized users within your organization.
Typical access roles include:
- compliance teams
- legal teams
- IT administrators
Access should be restricted according to internal governance policies.
Detection domain management
Admins can activate or deactivate detection domains.
Examples:
- competition law
- anti-corruption
- other compliance areas
This allows organizations to:
- align Clawscan with their risk profile
- progressively expand coverage
Changes apply dynamically without requiring redeployment.
See:
Monitoring and insights
The Admin Control Center provides aggregated insights, including:
- volume of analyzed communications
- distribution of detected risks
- trends over time
These insights are:
- aggregated
- non-identifying
- focused on compliance signals
No dashboards or metrics are provided at an individual employee level.
Billing and usage
Admins can:
- view subscription status
- monitor usage levels
- access invoices
Billing is based on:
- usage metrics (e.g. processing volume)
- subscription configuration
See:
Configuration management
Admins can manage:
- active detection domains
- system parameters retrieved by the engine
- operational settings
Configuration changes are centrally managed and propagated to the Clawscan Engine.
Security and access control
The Admin Control Center enforces:
- authenticated access
- role-based permissions
- secure data access patterns
Access should be granted only to authorized personnel.
See:
Data visibility
The Admin Control Center provides access to:
- aggregated results
- system metadata
- operational telemetry
It does not provide access to raw communication content.
This ensures alignment with:
- privacy-by-design principles
- tenant-resident processing architecture
See:
Operational responsibilities
Client organizations remain responsible for:
- defining compliance policies
- managing user access
- interpreting results
- handling investigations
Clawscan provides the technical capabilities but does not enforce organizational decisions.
Next steps
➡️ Understand how users interact with the system: