Customer Dashboard (/dash/)
The Customer Dashboard is the primary interface for security and compliance teams using Slim.io. It provides full visibility into your organization’s sensitive data exposure across cloud storage environments.
Navigation
The dashboard uses a sidebar navigation with the following sections:
- Overview — Executive scorecard and risk summary
- Connectors — Cloud provider connections
- Data Catalog — Inventory of scanned assets
- Scans — Scan history and monitoring
- Investigation — Finding drill-down and analysis
- Classifiers — Detection rule management
- Governance — Policy and compliance controls
- Settings — Account and workspace configuration
Command Center
The landing page is the Command Center — a question-first intelligence layer that shows actionable intelligence cards powered by real scan data. Each card answers a critical security question with live metrics drawn from your most recent scan results:
- Critical Exposures — What sensitive data is publicly accessible right now?
- Anomalies Detected — What changed unexpectedly since the last scan?
- SLA Breach Risk — Which findings are about to miss their remediation deadline?
- Top Risky Owner — Who owns the most unresolved findings?
- Data Movement — Is sensitive data spreading to new locations?
- New PII Detected — Have new types of sensitive data appeared?
Each card deep-links into the relevant drill-down view with filters pre-applied. If everything is clear, you see a single “All Clear” confirmation.
Intelligence cards update automatically as new scan results arrive — both from scheduled scans and agentless scanning. Findings from all scan sources (including agentless scanners deployed in your environment) are aggregated into the same Command Center view.
See Reporting & Analytics for the full reporting and visualization capabilities, and Data Visualization for detailed chart reference.
Executive Scorecard
Below the Command Center, the executive scorecard provides a persistent overview:
- Total Risk Score — 0–100 gauge showing aggregated risk across all connectors
- Finding Trends — Stacked area chart showing new findings over time by severity
- Category Breakdown — Donut chart with PII type distribution (SSN, email, credit card, etc.)
- Top Risks — Ranked resources with the highest risk scores
- Compliance Coverage — Multi-framework posture (SOC 2, HIPAA, GDPR, PCI-DSS)
Connectors View
Manage your cloud storage connections from this section:
- View all configured connectors with their current status (Active, Disconnected, Error)
- Add new connectors using the setup wizard
- Test existing connections to verify credential validity
- Trigger manual scans on individual connectors
- View scan history per connector
Each connector displays the last scan time, total files scanned, and findings count. Use the filter controls to narrow the view by provider type or status.
Global Cross-Filtering
Every chart and visualization is connected through a shared filter context. Click any chart element to apply a global filter — all other charts on the page update simultaneously. Active filters appear as pills at the top of the dashboard. All filter state is encoded in the URL, making every view bookmarkable and shareable.
See Reporting & Analytics — Global Cross-Filtering for details.
Data Catalog
The Data Catalog provides a unified, searchable inventory of all scanned assets across every connected data source. All scan results — including findings from agentless scanners — flow into the same catalog, giving you a single pane of glass for your organization’s sensitive data:
- Object Browser — Browse all discovered files, tables, and resources from any scan source
- Sensitivity Labels — Each object shows its highest-severity classification (Public, Internal, Confidential, Restricted)
- Risk Score — Color-coded risk indicator (green/yellow/orange/red) based on PII type, confidence, and exposure context
- File Type Detection — Automatic format identification (CSV, JSON, Parquet, Excel, PDF, Avro, ORC, text)
- PII Breakdown — Per-object summary of findings by PII type (e.g., 12 SSN, 20 email)
- Drill-Down — Click any object to see paginated findings with confidence scores, detection method, and masked evidence
- Filters — Narrow results by file type, classification level, PII type, connector, or minimum finding count
- Export — Download findings as CSV or JSON for external reporting
Scan Monitor
Track scan execution in real time:
- Active Scans — Worker count, files processed, elapsed time, estimated completion
- Scan History — Past scans with status, duration, file count, and finding count
- Worker Details — Individual worker progress for parallel scan jobs
- Error Log — Failed files with error details and retry status
Discovery
The Discovery page provides a high-level view of PII distribution and trends across your environment:
- PII Distribution — Breakdown of detected PII types across all connectors, showing concentration and spread
- Trend Analysis — Track how PII exposure changes over time as new scans complete
- Connector Heatmap — Visual heatmap showing PII distribution across connectors, highlighting which data sources contain the most sensitive data
- New Detections — Surface newly discovered PII types or newly exposed resources since the previous scan cycle
Investigation
The Investigation page enables deep analysis of findings:
- Filter by Category — Narrow to specific PII types (SSN, email, phone, API keys)
- Filter by Severity — Focus on critical, high, medium, or low risk findings
- Filter by Source — Scope to specific connectors, buckets, or file paths
- Bulk Actions — Select multiple findings for batch tokenization, suppression, or export
- Risk Graph — Visual representation of relationships between resources that share PII. The graph surfaces resources linked by common sensitive data patterns, helping you understand how PII spreads across your environment
Classifiers
Manage the detection rules that identify sensitive data:
- Built-in Classifiers — Pre-configured rules for common PII types, active by default
- Custom Classifiers — User-defined YAML rules with regex, dictionary, or proximity patterns
- Confidence Tuning — Adjust confidence thresholds to balance precision and recall
- Test Console — Validate classifier patterns against sample data before deployment
See Classifiers for detailed configuration guidance.
Governance
The Governance section provides policy management and compliance monitoring:
- Active Policies — List of deployed governance rules with status and last trigger time
- Policy Inspector — View policy definitions, scope, conditions, and actions
- Drift Events — Timeline of configuration changes and new violations
- Compliance Dashboard — Mapping of findings to regulatory frameworks (GDPR, HIPAA, PCI-DSS)
See Governance & Compliance for policy authoring and deployment.