Help Center
Quick Start
- System requirements
- Minimum privileges required
- Default port configuration
- Installing DataSecurity Plus
- Uninstalling DataSecurity Plus
- Starting DataSecurity Plus
- Launching DataSecurity Plus
- Configuring your solution
- Licensing details
- Applying a license
File Auditing
- About File Auditing
- Domain configuration
- File server configuration
- Failover cluster configuration
- Workgroup configuration
Setting up File Audit
Dashboard
Reports
Alerts
Configuration
Storage Configuration
Endpoint DLP
- About Endpoint DLP
Setting up Endpoint DLP
Reports
Alerts
Prevention policies
Configuration
File Analysis
- About File Analysis
Setting up File Analysis
Dashboard
Reports
Alerts
Configuration
Data Risk Assessment
- About Data risk assessment
Setting up Data risk assessment
Dashboard
Reports
Alerts
Configuration
Cloud Protection
- About Cloud Protection
- Gateway Server Configuration
- Certificate Authority Configuration
- Gateway Configuration in Endpoint
- Manage Certificate Trust Store
- Threat Analytics Database
- Manage Banned Applications
- Manage Authorized Applications
- Global Insight
- Application Insight
- User Insight
- Shadow Application Insight
- Banned Application Insight
- Cloud Access Reports
- Application Reports
- Shadow Cloud Application Reports
- Banned Cloud Application Reports
- File Upload Reports
Setting up Cloud Protection
Dashboard
Reports
Storage Configuration
Administrative settings
- Technician configuration
- Email configuration
- Notification filters
- Manage agent
- SIEM integration
- Business hours configuration
General settings
About DataSecurity Plus
Release notes
2020
2019
2018
2017
2016
2015
Troubleshooting
Contact usSecurity Overview
Once you've set up the solution and the first file scan is completed, you can start viewing data on your dashboard after a few minutes. The dashboard sports a tree view, providing both a domain-level perspective and granular insights into drives.
The Security Overview shows analytics on the permission hygiene of the analyzed files and folders. By default, the Security Overview has the following panels:
Files Owned by Stale Users: Shows the graphical breakdown of the number of files owned by inactive, disabled, deleted, and expired users.
Inconsistent Permissions: Shows the number and percentage of files and folders with broken inheritances.
Open Access: Shows the number and percentage of files shared across your domain that provide full control access to users or groups.
Open Access (user-based): Shows the list of top five users who own the most number of files allowing unrestricted access.
Active Files Owned by Stale Users: Shows the total number of active files owned by stale users.
Note: Active files are files that have been accessed and/or modified recently.
Don't see what you're looking for? Ask the Community