Help Center
Quick Start
- System requirements
- Minimum privileges required
- Default port configuration
- Installing DataSecurity Plus
- Uninstalling DataSecurity Plus
- Starting DataSecurity Plus
- Launching DataSecurity Plus
- Configuring your solution
- Licensing details
- Applying a license
File Auditing
- About File Auditing
- Domain configuration
- File server configuration
- Failover cluster configuration
- Workgroup configuration
Setting up File Audit
Dashboard
Reports
Alerts
Configuration
Storage Configuration
Endpoint DLP
- About Endpoint DLP
Setting up Endpoint DLP
Reports
Alerts
Prevention policies
Configuration
File Analysis
- About File Analysis
Setting up File Analysis
Dashboard
Reports
Alerts
Configuration
Data Risk Assessment
- About Data risk assessment
Setting up Data risk assessment
Dashboard
Reports
Alerts
Configuration
Cloud Protection
- About Cloud Protection
- Gateway Server Configuration
- Certificate Authority Configuration
- Gateway Configuration in Endpoint
- Manage Certificate Trust Store
- Threat Analytics Database
- Manage Banned Applications
- Manage Authorized Applications
- Global Insight
- Application Insight
- User Insight
- Shadow Application Insight
- Banned Application Insight
- Cloud Access Reports
- Application Reports
- Shadow Cloud Application Reports
- Banned Cloud Application Reports
- File Upload Reports
Setting up Cloud Protection
Dashboard
Reports
Storage Configuration
Administrative settings
- Technician configuration
- Email configuration
- Notification filters
- Manage agent
- SIEM integration
- Business hours configuration
General settings
About DataSecurity Plus
Release notes
2020
2019
2018
2017
2016
2015
Troubleshooting
Contact usSolutions offered
Here's a look at the different modules DataSecurity Plus has to offer and what you can do with them:
File auditing
The File auditing solution offers:
File access auditing: Audit all file accesses and modifications.
File change monitoring: Track and provide alerts for changes made to files and folders.
File integrity monitoring: Detect unauthorized changes made to sensitive files.
Compliance auditing: Meet requirements for PCI DSS, HIPAA, GDPR, FISMA and more.
Ransomware response: Detect and shut down ransomware attacks instantly.
Data risk assessment
The Data risk assessment solution offers:
Data discovery: Locate sensitive data (PII/ePHI) across your file servers and OneDrive.
Data classification: Use automated and manual tagging functions to organize data based on sensitivity and vulnerability.
Endpoint DLP
With the Endpoint DLP solution, you can:
Track endpoint usage: Audit usage and transfer of data through removable devices.
Monitor file copy to endpoints: Track file copy events to USBs and across local systems.
Protect critical data: Block files with PII and ePHI from being moved via removable devices and Outlook.
File Analysis
With the File analysis solution, you can:
Analyze file metadata: Gain key insights on file ownership, size, location,and more.
Manage ROT data: Identify and discard ROT files, duplicate files, and other junk data.
Optimize disk usage: Analyze storage trends and receive alerts on low disk space.
Examine permissions: List effective permissions, and spot permission hygiene issues.
Don't see what you're looking for? Ask the Community