1What is Opsiton?
Opsiton is a browser-native Data Loss Prevention (DLP) platform. It helps organizations prevent sensitive data from leaking through employees' browsers.
How it works at a high level
- 1Your organization sets up security policies (what to detect and what to do when detected)
- 2Employees install the Opsiton Chrome extension and configure it with your organization's API key
- 3The extension enforces your policies in real time — blocking, warning, or logging when sensitive data is about to leave the browser
- 4Security events appear in the Opsiton portal for your admin team to review and act on
What Opsiton can detect
- Sensitive text typed into websites (credit card numbers, IBAN, ID numbers, etc.)
- Files being uploaded that match defined patterns
- File contents (including text extracted from images via OCR)
- Visits to malicious or phishing URLs
- Data being pasted into AI platforms (ChatGPT, Claude, etc.)
2Platform Components
| Component | Who Uses It | Purpose |
|---|---|---|
| Tenant Portal | Organization admins and employees | Manage policies, view events, manage users and API keys |
| Chrome Extension | Employees on their devices | Enforces policies in real time inside the browser |
3User Roles
Every user in Opsiton has one of three roles:
| Role | What They Can Do |
|---|---|
| Viewer | Read-only: view events, incidents, policies, users |
| User | Same as viewer, standard employee access |
| Tenant Admin | Full organization management: create policies, invite users, manage API keys and settings |
4Tenant Onboarding & Getting Started
Step 1: Register Your Organization
Go to the Tenant Portal and click "Get Started" or "Register". Fill in:
- First Name and Last Name
- Organization Name
- Work Email
- Password
Click Register. Your organization is created automatically and you are signed in as a Tenant Admin. You will be directed to the Onboarding Wizard.
Step 2: Onboarding Wizard (3 Steps)
1Create Your First Policy
Choose a security policy template to get started quickly:
| Template | What it detects |
|---|---|
| Block Credit Cards | 16-digit card numbers in any format |
| Block SSN | Social security number patterns |
| Warn on Email | Email addresses being typed or pasted |
| Block Phone Numbers | Phone number patterns |
Select a template and click "Add Policy". You can customize and add more policies later from the Policies page.
2Generate an API Key
Click "Generate Key". An API key is created for your organization.
3Install the Extension
Follow the on-screen instructions to install the Opsiton Chrome extension and enter your API key into the extension settings. Once configured, the extension will connect to your organization and start enforcing your policies.
5Dashboard
The Dashboard is the main overview screen after logging in.
Security Score
A 0–100 score representing your organization's current security posture. A higher score means fewer violations. The score decreases when security events and unresolved incidents accumulate. See Section 17 for how the score is calculated.
KPI Cards
| Card | What it Shows |
|---|---|
| Portal Users | Number of users with access to the Tenant Portal |
| Extension Devices | Total devices with the extension installed, with a count of currently online devices |
| Active Policies | Number of enabled security policies |
| Events (24h) | Security events logged in the last 24 hours |
Charts
- 7-Day Event Trend — daily event volume over the past week
- Event Type Distribution — breakdown of event types (DLP text, file, URL, AI, etc.)
- 24-Hour Activity — hourly event distribution for the current day
- Top Websites — domains where the most events were triggered
Recent Events
The latest security events with their severity, type, and action taken.
Plan Usage
Shows how much of your plan limits you've used (users, extension devices, policies).
6Policies
Policies define what the extension detects and what action it takes.
Policy Fields
| Field | Description |
|---|---|
| Name | A descriptive name for the policy (must be unique within your organization) |
| Type | What kind of data to detect (see types below) |
| Action | What to do when a match is found: Block, Warn, or Log |
| Pattern | A regex pattern that defines what to detect |
| Severity | How serious this policy violation is: critical / high / medium / low |
| Priority | Higher number = checked first by the extension |
| Target URLs | Limit the policy to specific websites (leave empty to apply everywhere) |
| Exclude URLs | URLs where this policy should NOT apply |
| Auto-create Incident | Automatically create a security incident when this policy triggers |
| OCR Enabled | For file content policies: extract text from images using OCR before matching |
| Enabled | Turn the policy on or off without deleting it |
Policy Types
| Type | What It Does |
|---|---|
| DLP Text | Monitors text typed into browser inputs and textareas |
| DLP File | Monitors files being uploaded (matches by file name or extension) |
| DLP File Content | Extracts and scans the content of uploaded files |
| Threat URL | Blocks navigation to URLs matching the pattern |
| AI Generated | Controls what data users can paste into AI platforms |
Policy Actions
| Action | User Experience | What Gets Logged |
|---|---|---|
| Block | User sees a block page and cannot proceed | Event logged as BLOCKED |
| Warn | User sees a warning dialog, can choose to continue or cancel | Event logged as WARNED |
| Log | No interruption — event is silently recorded | Event logged as LOGGED |
Creating a Policy (Paid Plan)
- 1Go to Policies in the left navigation
- 2Click "Create Policy"
- 3Fill in the fields
- 4Use the built-in Pattern Tester to verify your regex works correctly
- 5Click Save
Templates (Free Plan)
Free plan users can add pre-built policy templates with a single click. Click "Templates" and select from the available options:
| Template | Detects |
|---|---|
| TC Kimlik No | Turkish national ID numbers |
| Türkiye IBAN | Turkish IBAN bank account numbers |
| Credit Card | Standard 16-digit card numbers |
| Turkish Landline | Turkish area-code phone numbers |
| Turkish Mobile | Turkish mobile numbers (+90 or 0 prefix) |
| Email Address | Any email address format |
Free Plan Policy Restrictions
| Action | Free Plan | Paid Plan |
|---|---|---|
| Create custom policy | Not available | Available |
| Use policy templates | TR templates only | Full library |
| Edit policy pattern | Not available | Available |
| Edit exclude URLs | Available | Available |
| Toggle policy on/off | Available | Available |
| Delete policy | Not available | Available |
7Inviting Users
To add a team member to the Tenant Portal:
- 1Go to Users in the left navigation
- 2Click "Invite User"
- 3Enter their work email address
- 4Select their role: Viewer, User, or Tenant Admin
- 5Click "Send Invite"
The invited user receives an email from Opsiton with a link to set up their account.
Managing Existing Users
From the Users page you can:
- Change role — update a user's role (tenant admin only)
- Activate — manually activate a user account
- Delete — remove a user from the organization
8Accepting an Invitation
When an employee receives an invitation email:
- 1Click the link in the invitation email
- 2You are taken to the Accept Invite page
- 3Choose a password (minimum 8 characters)
- 4Click Set Password
- 5You will be redirected to the Login page
- 6Log in with your email and new password
- 7You land on the Dashboard with the role your admin assigned
9API Keys
API keys connect the Chrome extension to your organization. Each device running the extension uses your organization's API key to authenticate.
Creating an API Key
- 1Go to API Keys in the left navigation
- 2Click "Create New Key"
- 3Enter a descriptive name (e.g., "Production Key", "Istanbul Office")
- 4Click Create
- 5Copy the full key immediately — it is shown only once and cannot be retrieved again
If you lose a key, generate a new one and update the extension on affected devices.
Managing API Keys
From the API Keys page you can:
- View key names and partial key previews (first 40 characters)
- Enable / Disable a key using the toggle — disabling a key disconnects all devices using it
- Delete a key permanently
Key Format
sk_browseguard_{your-org-slug}_{random-characters}10Installing the Chrome Extension
Prerequisites
- Google Chrome browser
- An Opsiton API key (created from the API Keys page)
Installation Steps
- 1Install the Opsiton extension from the Chrome Web Store (or as provided by your admin)
- 2Click the extension icon in the Chrome toolbar
- 3Enter your organization's API key in the API Key field
- 4Click Save
What Happens After Installation
- 1Registers your device with your organization (counts toward your extension device limit)
- 2Downloads your organization's policies from the platform
- 3Begins monitoring in real time — every page you visit is checked against your policies
- 4Reports activity — any policy violations appear in the Tenant Portal under Security Events
What Users See When a Policy Triggers
| Policy Action | What Appears on Screen |
|---|---|
| Block | A full-page block screen explaining the action was prevented |
| Warn | A dialog explaining the potential risk — user can cancel or continue |
| Log | Nothing — the event is silently recorded in the background |
Device Online Status
The extension sends a heartbeat signal every few minutes. In the Active Users page of the portal, a green indicator shows devices that have been active within the last 5 minutes.
11Security Events
The Events page shows every security detection recorded by the extension across all devices in your organization.
What Each Event Shows
| Field | Description |
|---|---|
| Type | Category of detection (DLP text, file, URL threat, AI, etc.) |
| Rule Name | Which policy triggered |
| Website | The domain where the event occurred |
| Severity | Critical, High, Medium, or Low |
| Action Taken | Blocked, Warned, Logged, Monitored, or Masked |
| Time | When the event was recorded |
Severity Levels
| Severity | Typical Cause |
|---|---|
| Critical | URL threat detected (phishing, malicious site) |
| High | Data actively blocked from leaving the browser |
| Medium | Monitored activity |
| Low | Logged or masked activity |
Filtering Events
Use filters to narrow results:
- Event type — filter by detection category
- Severity — show only critical or high severity events
- Search — search by website, rule name, or device
Exporting Events
Click "Export CSV" to download a filtered list of events for reporting or further analysis.
12Incidents
Incidents are security cases that require investigation and resolution. They can be created automatically (when a policy has Auto-create Incident enabled) or manually by an admin.
Incident Statuses
| Status | Meaning |
|---|---|
| Open | Newly created, not yet assigned |
| Investigating | Someone is actively looking into it |
| Resolved | The issue has been addressed |
| Closed | Fully closed, no further action needed |
Working with Incidents
From the Incidents page:
- 1Click an incident to open its detail view
- 2View the related security event that triggered it
- 3Update the status as your investigation progresses
- 4Assign the incident to a team member
- 5Add notes in the description field
Incident Stats
The top of the Incidents page shows:
- Total incidents
- Open (needs attention)
- Investigating (in progress)
- Resolved
13Active Users
The Active Users page shows all devices that have the Opsiton extension installed and connected to your organization.
What Each Entry Shows
| Field | Description |
|---|---|
| Hostname | The name of the device |
| Status | Online (active in last 5 minutes) or Offline |
| Chrome Version | Browser version on that device |
| Extension Version | Opsiton extension version installed |
| Last Seen | When the device last communicated with the platform |
This page is useful for confirming that the extension is running correctly across your organization and for tracking device coverage.
14AI Detection
The AI Detection page lets you configure how the extension monitors usage of AI platforms (such as ChatGPT, Claude, Gemini, and others).
What You Can Configure
- Platform rules — enable or disable monitoring per AI platform
- Predefined rules — built-in detection rules for common sensitive data categories
- Custom rules — define your own patterns to detect in AI inputs
When a user pastes sensitive data into a monitored AI platform, the extension can block, warn, or log the action based on your configuration.
15Settings & Integrations
Settings Page
Configure your organization's basic settings. Available to Tenant Admins only.
Integrations Page
Available on Professional and Enterprise plans.
| Integration | What It Does |
|---|---|
| Slack Webhook | Sends security event notifications to a Slack channel |
| VirusTotal | Enhanced URL threat detection using VirusTotal's database |
| Google Safe Browsing | Additional URL safety verification |
| Custom SMTP | Send notifications from your own email server |
To add an integration, go to Integrations, enter the required credentials, and save.
16Subscription & Plan Limits
Free Plan Limits
| Limit | Default |
|---|---|
| Portal Users | 5 |
| Extension Devices | 10 |
| Policies | 10 |
What Happens When a Limit Is Reached
| Limit Hit | Effect |
|---|---|
| Portal Users | Invite button is disabled; existing users unaffected |
| Extension Devices | New devices cannot register; they see an error on extension setup |
| Policies | Policy creation is blocked until a policy is deleted or limit is increased |
Viewing Your Usage
On the Dashboard, the plan usage section shows current usage vs. your limits. On the Subscription page, you can see your current plan details.
17Security Score
The Security Score (0–100) on your Dashboard reflects your organization's overall security health based on recent activity.
Score decreases based on
- Security events — higher severity events reduce the score more (Critical > High > Medium > Low)
- Open incidents — unresolved incidents reduce the score
- Resolution speed — how quickly your team resolves incidents affects a portion of the score