HomeDocumentation

Opsiton Platform User Guide

Comprehensive guide for end users and tenant admins. Learn how to use the Opsiton platform step by step.

Last updated: February 25, 2026

1What is Opsiton?

Opsiton is a browser-native Data Loss Prevention (DLP) platform. It helps organizations prevent sensitive data from leaking through employees' browsers.

How it works at a high level

  1. 1Your organization sets up security policies (what to detect and what to do when detected)
  2. 2Employees install the Opsiton Chrome extension and configure it with your organization's API key
  3. 3The extension enforces your policies in real time — blocking, warning, or logging when sensitive data is about to leave the browser
  4. 4Security events appear in the Opsiton portal for your admin team to review and act on

What Opsiton can detect

  • Sensitive text typed into websites (credit card numbers, IBAN, ID numbers, etc.)
  • Files being uploaded that match defined patterns
  • File contents (including text extracted from images via OCR)
  • Visits to malicious or phishing URLs
  • Data being pasted into AI platforms (ChatGPT, Claude, etc.)

2Platform Components

ComponentWho Uses ItPurpose
Tenant PortalOrganization admins and employeesManage policies, view events, manage users and API keys
Chrome ExtensionEmployees on their devicesEnforces policies in real time inside the browser

3User Roles

Every user in Opsiton has one of three roles:

RoleWhat They Can Do
ViewerRead-only: view events, incidents, policies, users
UserSame as viewer, standard employee access
Tenant AdminFull organization management: create policies, invite users, manage API keys and settings
Note: Only tenant admins can create policies, invite users, and manage API keys. Viewers and users can view data but cannot make changes.

4Tenant Onboarding & Getting Started

Step 1: Register Your Organization

Go to the Tenant Portal and click "Get Started" or "Register". Fill in:

  • First Name and Last Name
  • Organization Name
  • Work Email
  • Password

Click Register. Your organization is created automatically and you are signed in as a Tenant Admin. You will be directed to the Onboarding Wizard.

Step 2: Onboarding Wizard (3 Steps)

1Create Your First Policy

Choose a security policy template to get started quickly:

TemplateWhat it detects
Block Credit Cards16-digit card numbers in any format
Block SSNSocial security number patterns
Warn on EmailEmail addresses being typed or pasted
Block Phone NumbersPhone number patterns

Select a template and click "Add Policy". You can customize and add more policies later from the Policies page.

2Generate an API Key

Click "Generate Key". An API key is created for your organization.

Important: Copy and save the full key immediately. It is displayed only once. If you lose it, you will need to generate a new one.

3Install the Extension

Follow the on-screen instructions to install the Opsiton Chrome extension and enter your API key into the extension settings. Once configured, the extension will connect to your organization and start enforcing your policies.

5Dashboard

The Dashboard is the main overview screen after logging in.

Security Score

A 0–100 score representing your organization's current security posture. A higher score means fewer violations. The score decreases when security events and unresolved incidents accumulate. See Section 17 for how the score is calculated.

KPI Cards

CardWhat it Shows
Portal UsersNumber of users with access to the Tenant Portal
Extension DevicesTotal devices with the extension installed, with a count of currently online devices
Active PoliciesNumber of enabled security policies
Events (24h)Security events logged in the last 24 hours

Charts

  • 7-Day Event Trend — daily event volume over the past week
  • Event Type Distribution — breakdown of event types (DLP text, file, URL, AI, etc.)
  • 24-Hour Activity — hourly event distribution for the current day
  • Top Websites — domains where the most events were triggered

Recent Events

The latest security events with their severity, type, and action taken.

Plan Usage

Shows how much of your plan limits you've used (users, extension devices, policies).

6Policies

Policies define what the extension detects and what action it takes.

Policy Fields

FieldDescription
NameA descriptive name for the policy (must be unique within your organization)
TypeWhat kind of data to detect (see types below)
ActionWhat to do when a match is found: Block, Warn, or Log
PatternA regex pattern that defines what to detect
SeverityHow serious this policy violation is: critical / high / medium / low
PriorityHigher number = checked first by the extension
Target URLsLimit the policy to specific websites (leave empty to apply everywhere)
Exclude URLsURLs where this policy should NOT apply
Auto-create IncidentAutomatically create a security incident when this policy triggers
OCR EnabledFor file content policies: extract text from images using OCR before matching
EnabledTurn the policy on or off without deleting it

Policy Types

TypeWhat It Does
DLP TextMonitors text typed into browser inputs and textareas
DLP FileMonitors files being uploaded (matches by file name or extension)
DLP File ContentExtracts and scans the content of uploaded files
Threat URLBlocks navigation to URLs matching the pattern
AI GeneratedControls what data users can paste into AI platforms

Policy Actions

ActionUser ExperienceWhat Gets Logged
BlockUser sees a block page and cannot proceedEvent logged as BLOCKED
WarnUser sees a warning dialog, can choose to continue or cancelEvent logged as WARNED
LogNo interruption — event is silently recordedEvent logged as LOGGED

Creating a Policy (Paid Plan)

  1. 1Go to Policies in the left navigation
  2. 2Click "Create Policy"
  3. 3Fill in the fields
  4. 4Use the built-in Pattern Tester to verify your regex works correctly
  5. 5Click Save

Templates (Free Plan)

Free plan users can add pre-built policy templates with a single click. Click "Templates" and select from the available options:

TemplateDetects
TC Kimlik NoTurkish national ID numbers
Türkiye IBANTurkish IBAN bank account numbers
Credit CardStandard 16-digit card numbers
Turkish LandlineTurkish area-code phone numbers
Turkish MobileTurkish mobile numbers (+90 or 0 prefix)
Email AddressAny email address format

Free Plan Policy Restrictions

ActionFree PlanPaid Plan
Create custom policyNot availableAvailable
Use policy templatesTR templates onlyFull library
Edit policy patternNot availableAvailable
Edit exclude URLsAvailableAvailable
Toggle policy on/offAvailableAvailable
Delete policyNot availableAvailable

7Inviting Users

To add a team member to the Tenant Portal:

  1. 1Go to Users in the left navigation
  2. 2Click "Invite User"
  3. 3Enter their work email address
  4. 4Select their role: Viewer, User, or Tenant Admin
  5. 5Click "Send Invite"

The invited user receives an email from Opsiton with a link to set up their account.

Your plan's user limit applies. If your organization has reached the maximum number of portal users, the invite button will be disabled. Contact your Opsiton account manager to increase your limit.

Managing Existing Users

From the Users page you can:

  • Change role — update a user's role (tenant admin only)
  • Activate — manually activate a user account
  • Delete — remove a user from the organization

8Accepting an Invitation

When an employee receives an invitation email:

  1. 1Click the link in the invitation email
  2. 2You are taken to the Accept Invite page
  3. 3Choose a password (minimum 8 characters)
  4. 4Click Set Password
  5. 5You will be redirected to the Login page
  6. 6Log in with your email and new password
  7. 7You land on the Dashboard with the role your admin assigned

9API Keys

API keys connect the Chrome extension to your organization. Each device running the extension uses your organization's API key to authenticate.

Creating an API Key

  1. 1Go to API Keys in the left navigation
  2. 2Click "Create New Key"
  3. 3Enter a descriptive name (e.g., "Production Key", "Istanbul Office")
  4. 4Click Create
  5. 5Copy the full key immediately — it is shown only once and cannot be retrieved again

If you lose a key, generate a new one and update the extension on affected devices.

Managing API Keys

From the API Keys page you can:

  • View key names and partial key previews (first 40 characters)
  • Enable / Disable a key using the toggle — disabling a key disconnects all devices using it
  • Delete a key permanently

Key Format

sk_browseguard_{your-org-slug}_{random-characters}

10Installing the Chrome Extension

Prerequisites

  • Google Chrome browser
  • An Opsiton API key (created from the API Keys page)

Installation Steps

  1. 1Install the Opsiton extension from the Chrome Web Store (or as provided by your admin)
  2. 2Click the extension icon in the Chrome toolbar
  3. 3Enter your organization's API key in the API Key field
  4. 4Click Save

What Happens After Installation

  1. 1Registers your device with your organization (counts toward your extension device limit)
  2. 2Downloads your organization's policies from the platform
  3. 3Begins monitoring in real time — every page you visit is checked against your policies
  4. 4Reports activity — any policy violations appear in the Tenant Portal under Security Events

What Users See When a Policy Triggers

Policy ActionWhat Appears on Screen
BlockA full-page block screen explaining the action was prevented
WarnA dialog explaining the potential risk — user can cancel or continue
LogNothing — the event is silently recorded in the background

Device Online Status

The extension sends a heartbeat signal every few minutes. In the Active Users page of the portal, a green indicator shows devices that have been active within the last 5 minutes.

11Security Events

The Events page shows every security detection recorded by the extension across all devices in your organization.

What Each Event Shows

FieldDescription
TypeCategory of detection (DLP text, file, URL threat, AI, etc.)
Rule NameWhich policy triggered
WebsiteThe domain where the event occurred
SeverityCritical, High, Medium, or Low
Action TakenBlocked, Warned, Logged, Monitored, or Masked
TimeWhen the event was recorded

Severity Levels

SeverityTypical Cause
CriticalURL threat detected (phishing, malicious site)
HighData actively blocked from leaving the browser
MediumMonitored activity
LowLogged or masked activity

Filtering Events

Use filters to narrow results:

  • Event type — filter by detection category
  • Severity — show only critical or high severity events
  • Search — search by website, rule name, or device

Exporting Events

Click "Export CSV" to download a filtered list of events for reporting or further analysis.

12Incidents

Incidents are security cases that require investigation and resolution. They can be created automatically (when a policy has Auto-create Incident enabled) or manually by an admin.

Incident Statuses

StatusMeaning
OpenNewly created, not yet assigned
InvestigatingSomeone is actively looking into it
ResolvedThe issue has been addressed
ClosedFully closed, no further action needed

Working with Incidents

From the Incidents page:

  1. 1Click an incident to open its detail view
  2. 2View the related security event that triggered it
  3. 3Update the status as your investigation progresses
  4. 4Assign the incident to a team member
  5. 5Add notes in the description field

Incident Stats

The top of the Incidents page shows:

  • Total incidents
  • Open (needs attention)
  • Investigating (in progress)
  • Resolved

13Active Users

The Active Users page shows all devices that have the Opsiton extension installed and connected to your organization.

What Each Entry Shows

FieldDescription
HostnameThe name of the device
StatusOnline (active in last 5 minutes) or Offline
Chrome VersionBrowser version on that device
Extension VersionOpsiton extension version installed
Last SeenWhen the device last communicated with the platform

This page is useful for confirming that the extension is running correctly across your organization and for tracking device coverage.

14AI Detection

The AI Detection page lets you configure how the extension monitors usage of AI platforms (such as ChatGPT, Claude, Gemini, and others).

What You Can Configure

  • Platform rules — enable or disable monitoring per AI platform
  • Predefined rules — built-in detection rules for common sensitive data categories
  • Custom rules — define your own patterns to detect in AI inputs

When a user pastes sensitive data into a monitored AI platform, the extension can block, warn, or log the action based on your configuration.

15Settings & Integrations

Settings Page

Configure your organization's basic settings. Available to Tenant Admins only.

Integrations Page

Available on Professional and Enterprise plans.

IntegrationWhat It Does
Slack WebhookSends security event notifications to a Slack channel
VirusTotalEnhanced URL threat detection using VirusTotal's database
Google Safe BrowsingAdditional URL safety verification
Custom SMTPSend notifications from your own email server

To add an integration, go to Integrations, enter the required credentials, and save.

16Subscription & Plan Limits

Free Plan Limits

LimitDefault
Portal Users5
Extension Devices10
Policies10

What Happens When a Limit Is Reached

Limit HitEffect
Portal UsersInvite button is disabled; existing users unaffected
Extension DevicesNew devices cannot register; they see an error on extension setup
PoliciesPolicy creation is blocked until a policy is deleted or limit is increased

Viewing Your Usage

On the Dashboard, the plan usage section shows current usage vs. your limits. On the Subscription page, you can see your current plan details.

17Security Score

The Security Score (0–100) on your Dashboard reflects your organization's overall security health based on recent activity.

Score decreases based on

  • Security events — higher severity events reduce the score more (Critical > High > Medium > Low)
  • Open incidents — unresolved incidents reduce the score
  • Resolution speed — how quickly your team resolves incidents affects a portion of the score
The score updates based on the last 7 days of events and last 30 days of incident resolution data.