- System requirements
- Minimum privileges required
- Default port configuration
- Installing DataSecurity Plus
- Uninstalling DataSecurity Plus
- Starting DataSecurity Plus
- Launching DataSecurity Plus
- Configuring your solution
- Licensing details
- Applying a license
- About File Auditing
- Domain configuration
- File server configuration
- Failover cluster configuration
- Workgroup configuration
Setting up File Audit
- About File Analysis
Setting up File Analysis
Data Risk Assessment
- About Data risk assessment
Setting up Data risk assessment
- About Endpoint DLP
Setting up Endpoint DLP
- About Cloud Protection
- Gateway Server Configuration
- Certificate Authority Configuration
- Gateway Configuration in Endpoint
- Manage Certificate Trust Store
- Threat Analytics Database
- Manage Banned Applications
- Manage Authorized Applications
- Gateway Server Failover
- Global Insight
- Application Insight
- User Insight
- Shadow Application Insight
- Banned Application Insight
- Cloud Access Reports
- Application Insights
- Shadow Cloud Application Reports
- Banned Cloud Application Reports
- File Upload Reports
Setting up Cloud Protection
- Technician configuration
- Email configuration
- Notification filters
- Manage agent
- SIEM integration
- Business hours configuration
- Two-factor authentication
- Workgroup configuration
- Security policy
- Agent document
- How to Migrate/Move DataSecurity Plus
- How to apply SSL certificate
- How to automate DataSecurity Plus database backup
- How to set alerts in DataSecurity Plus
Security and confidentiality are important aspects to consider for reports generated during data risk assessment. These reports may contain sensitive content that must be hidden from users and technicians. Based on the rules and policies included in data discovery scans, this could be confidential data, personally identifiable information, or other sensitive data types.
Most compliance regulations only require an index of locations where business-critical or sensitive personal data is stored in enterprise file storage. The detected data itself need not be included in reports.
Restricting the detected sensitive data from being stored in the database and being displayed in reports can help:
- Enhance the privacy and security of sensitive data by making it inaccessible to technicians.
- Optimize disk usage by not storing detected data matches in the database.
There are two report aspects that can be excluded from reports and storage:
- Display text: This is the set of characters preceding and succeeding policy-violating content in sensitive files.
- Violation text: This is the sensitive content detected in scanned files by using RegEx or keyword matching.
To view or modify these settings:
- Select Risk Analysis from the application drop-down.
- Go to Configuration > Scan Configuration > General Settings.
- Here, you can select one of three available privacy options:
- Exclude display text only: If this is enabled, display text will be omitted from reports and not stored in the database.
- Exclude both violation and display texts: If this is enabled, both display and violation texts will be omitted from reports and not be stored in the database.
- Exclude none: Neither display nor violation texts will be excluded. They will be visible on the console, in exported reports, and in the database.
- Click Save.