Help CenterFile Audit Endpoint Security File Analysis Risk Analysis Release Notes
- System requirements
- Minimum privileges required
- Default port configuration
- Installing DataSecurity Plus
- Uninstalling DataSecurity Plus
- Starting datasecurity plus
- Launching datasecurity plus
- Configuring your solutions
Setting up File Audit
- Predefined audit reports
- Creating new audit reports
- Creating new alert profiles
- Creating new incident profiles
- Configuring exclusion-based settings
- Configuring retention and archive settings
Setting up Endpoint Security
Setting up File Analysis
Setting up Data Risk AssessmentDashboard
About DataSecurity Plus
How-ToQuick Start File Audit Endpoint Security Risk Analysis File Analysis About DataSecurity Plus Release notes Contact us
Here's a look at the different modules DataSecurity Plus has to offer and what you can do with them:
The File Audit solution offers:
File access auditing: Audit all file accesses and modifications.
File change monitoring: Track and provide alerts for changes made to files and folders.
File integrity monitoring: Detect unauthorized changes made to sensitive files.
Compliance auditing: Meet requirements for PCI DSS, HIPAA, GDPR, FISMA and more.
Ransomware response: Detect and shut down ransomware attacks instantly.
Data Risk Assessment
The Data Risk assessment solution offers:
Data discovery: Locate sensitive data (PII/ePHI) across your file servers and OneDrive.
Data classification: Use automated and manual tagging functions to organize data based on sensitivity and vulnerability.
Incident management: Prioritize, assign, and remediate incidents from a single console.
With the Endpoint Security solution, you can:
Track endpoint usage: Audit usage and transfer of data through removable devices.
Monitor file copy to endpoints: Track file copy events to USBs and across local systems.
Protect critical data: Block files with PII and ePHI from being moved via removable devices and Outlook.
With the free File Analysis add-on, you can:
Analyze file metadata: Gain key insights on file ownership, size, location,and more.
Manage ROT data: Identify and discard ROT files, duplicate files, and other junk data.
Optimize disk usage: Analyze storage trends and receive alerts on low disk space.
Examine permissions: List effective permissions, and spot permission hygiene issues.