Help Center

File Audit Endpoint Security File Analysis Risk Analysis Release Notes

Setting up File Audit

Dashboard

Reports

Alerts

Incidents

Advanced configurations

Setting up Endpoint Security

Reports

Advanced configurations

Setting up File Analysis

Dashboard

Reports

Incidents

Configuration

Setting up Data Risk Assessment

Dashboard

Reports

Advanced configuration

Quick Start File Audit Endpoint Security Risk Analysis File Analysis About DataSecurity Plus Release notes Contact us

2018

2017

2016

2015

Account Logon » Default Port Configuration

Security Reports

The reports under the Security Reports tab are as follows:

  • Files Owned by Stale Users: Lists all the files owned by stale users. The stale users configuration can be edited under File Analysis > Configuration > Settings > Report Configuration > Edit Inactive Users Report. The value of these files has to be assessed, based on which they can be reclaimed or purged.
  • Inconsistent Permissions: Lists the files and folders with permission inconsistencies.
  • Open Access: Lists files that are overexposed. The definition of “overexposed” can be viewed or altered under the Excessive Permissions Report in the Configuration tab.
  • Open Access (user-based): Lists the users who own overexposed files.
  • Active Files Owned by Stale Users: Lists all active files owned by stale, inactive, or expired user accounts. A new owner has to be assigned to these files.
×

Thanks for your interest in DataSecurity Plus' Private Beta!

Please let us know your mail ID so we can send the beta download link.

Thanks! Kindly check your mailbox for the link.
  • Please enter a valid Business Email
    Please enter your Business Email
  • By clicking 'Send me the link', you agree to processing of personal data according to the Privacy Policy.