Skip to main content

Guard Cloud command center

Use this guide when local Guard is already protecting a harness and you want the signed-in product to feel like one operating system instead of a set of unrelated routes.

What this part of Guard is forDirect link to What this part of Guard is for

Guard Cloud takes the local runtime evidence you already trust and turns it into shared memory:

  • synced receipts across devices
  • changed-after-approval review queues
  • watchlists, advisories, and revocation-aware alerts
  • shared policy defaults for teams
  • delegated approvals for managed workspaces
  • billing and plan pressure that explains what cloud value is actually unlocked

Command center routesDirect link to Command center routes

RouteWhat it answers
/guard/dashboardWhat needs attention right now, what Guard already handled, and what to do next
/guard/devicesWhich devices and harnesses are protected, connected, and syncing
/guard/changesWhich approved artifacts drifted and now need review
/guard/historyLong-term timeline and drift patterns for artifacts
/guard/alertsWhich risky changes should interrupt you and which can stay in digest form
/guard/artifactsWhat lives in shared inventory and how artifact trust looks right now
/guard/abomThe artifact bill of materials view for the broader trust estate
/guard/receiptsWhat the latest synced receipts say before you open long-term history
/guard/policyWhich shared defaults should apply across the team
/guard/exceptionsWhich temporary bypass windows are still active or expiring
/guard/agentsHow delegated approvals and managed workspaces flow through Guard
/guard/billingWhich plan, credits, and cloud limits are shaping the operator experience

Dashboard modes and next actionsDirect link to Dashboard modes and next actions

The signed-in dashboard is easier to understand if you treat it as a state-aware command center:

  1. Onboarding — signed in, but no protected runtime has shown up yet
  2. Solo local-only — Guard is protecting one machine, but trust history still stops there
  3. Solo synced — receipts are syncing, so the dashboard can highlight changed artifacts instead of setup chores
  4. Team admin — the shared queue matters more than one laptop, so policy and exceptions move to the center
  5. Workspace operator — delegated approvals and managed agents become the primary operating surface

Each mode should answer the same questions:

  • what changed?
  • what needs a decision?
  • what has Guard already handled?
  • what should I do next?
  • which route should I open next?

How local Guard hands off to cloud GuardDirect link to How local Guard hands off to cloud Guard

The cleanest rollout is:

  1. protect one harness locally
  2. record real receipts and diffs
  3. turn on sign-in and sync
  4. let the dashboard summarize what changed instead of replaying local setup
  5. add shared policy only when repeated approvals show a stable operating pattern

That handoff matters because Guard Cloud should explain the local runtime, not replace it.

See it in productDirect link to See it in product

Next guidesDirect link to Next guides