- System requirements
- Minimum privileges required
- Default port configuration
- Installing DataSecurity Plus
- Uninstalling DataSecurity Plus
- Starting DataSecurity Plus
- Launching DataSecurity Plus
- Configuring your solution
- Licensing details
- Applying a license
- About File Auditing
Setting up File Audit
- About File Analysis
Setting up File Analysis
Data Risk Assessment
- About Data risk assessment
Setting up Data risk assessment
- About Endpoint DLP
Setting up Endpoint DLP
- About Cloud Protection
- Gateway Server Configuration
- Certificate Authority Configuration
- Gateway Configuration in Endpoint
- Manage Certificate Trust Store
- Threat Analytics Database
- Manage Banned Applications
- Manage Authorized Applications
- Gateway Server Failover
- Cloud Access Reports
- Application Insights
- Shadow Cloud Application Reports
- Banned Cloud Application Reports
- File Upload Reports
Setting up Cloud Protection
- Technician configuration
- Email configuration
- Notification filters
- Manage agent
- SIEM integration
- Business hours configuration
- Two-factor authentication
- Workgroup configuration
- Security policy
- Agent document
- How to Migrate/Move DataSecurity Plus
- How to apply SSL certificate
- How to automate DataSecurity Plus database backup
- How to set alerts in DataSecurity Plus
Security View: Insights on file security posture
Once you've set up the solution and the first file scan is completed, you can start viewing data on your dashboard. The dashboard sports a tree view, providing both a domain-level perspective and granular insights into drives, folders, and files.
The Security View shows analytics on the permissions of the analyzed files and folders. By default, the Security View has the following panels:
Files owned by stale users: Shows the graphical breakdown of the number of files owned by inactive, disabled, deleted, and expired users.
Inconsistent permissions: Shows the number and percentage of files and folders with broken inheritances.
Open access: Shows the number and percentage of files that are publicly accessible to users and groups. For example, say that the Everyone group has been granted access to a particular file. This will lead to most domain users having unregulated access to that file even though not all users need access to it. The overview of files with public access is captured on the dashboard. By default, open access is configured as Everyone and Guests groups that have Any Control, and Authenticated Users with Full Control. You can modify this setting in Report Configuration.
Open access (user-based): Lists the five users who own the most number of files with unregulated access.
Active files owned by stale users: Shows the total number of active files owned by stale users. Active files are files that have been accessed and/or modified recently.
Ownership summary: Shows the users who own the most number of files and folders.
File- and folder-level insights: View security permission details by drilling down to the file or folder level in the tree view.