Help Center
About File Auditing About Endpoint DLP About File Analysis About Data risk assessment Release NotesQuick Start
- System requirements
- Minimum privileges required
- Default port configuration
- Installing DataSecurity Plus
- Uninstalling DataSecurity Plus
- Starting DataSecurity Plus
- Launching DataSecurity Plus
- Configuring your solution
Setting up File Audit
- Domain configuration
- File server configuration
- Failover cluster configuration
- Workgroup configuration
Dashboard
Reports
Alerts
Configuration
Storage Configuration
Setting up Endpoint DLP
Reports
Alerts
Configuration
Setting up File Analysis
Dashboard
Reports
Alerts
Configuration
Setting up Data risk assessment
Dashboard
Reports
Alerts
Configuration
About DataSecurity Plus
How-To
- How to Migrate/Move DataSecurity Plus
- How to apply SSL certificate
- How to automate DataSecurity Plus database backup
Troubleshooting
Quick Start File Auditing Endpoint DLP Data Risk Assessment File Analysis About DataSecurity Plus Release notes Contact usContact us
2019
2018
2017
2016
2015
Administrative settings
- Technician configuration
- Email configuration
- Notification filters
- Manage agent
- SIEM integration
- Business hours configuration
General settings
Solutions offered
Here's a look at the different modules DataSecurity Plus has to offer and what you can do with them:
File auditing
The File auditing solution offers:
File access auditing: Audit all file accesses and modifications.
File change monitoring: Track and provide alerts for changes made to files and folders.
File integrity monitoring: Detect unauthorized changes made to sensitive files.
Compliance auditing: Meet requirements for PCI DSS, HIPAA, GDPR, FISMA and more.
Ransomware response: Detect and shut down ransomware attacks instantly.
Data risk assessment
The Data risk assessment solution offers:
Data discovery: Locate sensitive data (PII/ePHI) across your file servers and OneDrive.
Data classification: Use automated and manual tagging functions to organize data based on sensitivity and vulnerability.
Endpoint DLP
With the Endpoint DLP solution, you can:
Track endpoint usage: Audit usage and transfer of data through removable devices.
Monitor file copy to endpoints: Track file copy events to USBs and across local systems.
Protect critical data: Block files with PII and ePHI from being moved via removable devices and Outlook.
File Analysis
With the File Analysis solution, you can:
Analyze file metadata: Gain key insights on file ownership, size, location,and more.
Manage ROT data: Identify and discard ROT files, duplicate files, and other junk data.
Optimize disk usage: Analyze storage trends and receive alerts on low disk space.
Examine permissions: List effective permissions, and spot permission hygiene issues.