< go back

Reviewing advanced scan results

Getting Started
Last Updated
May 21, 2024

To access advanced scan results for an org, follow these steps within the Hubbl Diagnostics platform:

  1. Navigate: Navigate to the Home Page or the Scans page within the Hubbl Diagnostics portal.
  2. Select scan: Click on the name of the specific scan you wish to review.
  3. Access results: The scan results page will display advanced results if you have applied a license to that org. Explore the detailed insights and analysis provided by the advanced scan results.
  4. Exporting results: Results can also be exported to CSV format for further analysis or documentation purposes.

🚀 Hubbl Diagnostics Tip: Utilize the Recommendations dashboard to easily import recommendations into Jira for efficient issue tracking and resolution. Learn more about this feature here.

Insights provided in advanced scan results

Upon completion of the advanced scan, the results are compiled into a variety of dashboards, each offering unique insights and analysis. Click on each dashboard to learn more: 

  1. Summary dashboard: Provides a summarized overview of key findings and metrics from the scan.
  2. Org Utilization dashboard: Offers insights into org resource utilization and optimization opportunities.
  3. Recommendations dashboard: Provides actionable recommendations for improving org performance, security, and efficiency.
  4. Packages dashboard: Visualizes installed packages and their characteristics, aiding in package management and optimization.
  5. Automation dashboard: Analyzes object automation, including flows, processes, triggers, and workflows, for optimization and risk assessment.
  6. Custom Code dashboard: Evaluates custom Apex and JavaScript code, identifying issues, performance metrics, and technical debt.
  7. Field Utilization: Offers insights into how fields are being used across objects, identifying underutilized fields and opportunities to optimize data management.
  8. Profiles & Permission Sets dashboard: Assesses profiles and permission sets, identifying assignments, risky permissions, and access control optimization opportunities.