- System requirements
- Minimum privileges required
- Default port configuration
- Installing DataSecurity Plus
- Uninstalling DataSecurity Plus
- Starting DataSecurity Plus
- Launching DataSecurity Plus
- Configuring your solution
- Licensing details
- Applying a license
- About File Auditing
Setting up File Audit
- About Endpoint DLP
Setting up Endpoint DLP
- About File Analysis
Setting up File Analysis
Data Risk Assessment
- About Data risk assessment
Setting up Data risk assessment
- About Cloud Protection
- Gateway Server Configuration
- Certificate Authority Configuration
- Gateway Configuration in Endpoint
- Manage Certificate Trust Store
- Threat Analytics Database
- Manage Banned Applications
- Manage Authorized Applications
- Cloud Access Reports
- Application Reports
- Shadow Cloud Application Reports
- Banned Cloud Application Reports
- File Upload Reports
Setting up Cloud Protection
- Technician configuration
- Email configuration
- Notification filters
- Manage agent
- SIEM integration
- Business hours configuration
About DataSecurity Plus
- How to Migrate/Move DataSecurity Plus
- How to apply SSL certificate
- How to automate DataSecurity Plus database backup
Once you've set up the solution and the first file scan is completed, you can start viewing data on your dashboard after a few minutes. The dashboard sports a tree view, providing both a domain-level perspective and granular insights into drives.
The Security Overview shows analytics on the permission hygiene of the analyzed files and folders. By default, the Security Overview has the following panels:
Files Owned by Stale Users: Shows the graphical breakdown of the number of files owned by inactive, disabled, deleted, and expired users.
Inconsistent Permissions: Shows the number and percentage of files and folders with broken inheritances.
Open Access: Shows the number and percentage of files shared across your domain that provide full control access to users or groups.
Open Access (user-based): Shows the list of top five users who own the most number of files allowing unrestricted access.
Active Files Owned by Stale Users: Shows the total number of active files owned by stale users.
Note: Active files are files that have been accessed and/or modified recently.
Don't see what you're looking for?
Request additional resources
Send us your requirements.
for getting in touch!
We'll get back to you shortly.
In the meanwhile, take a look
at these resources: :
Request help document
Looking for more technical papers and documents to suit your specific needs? Fill in the details in the form below.