Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

A screen-by-screen guide to the platform

Dashboard > Scan Progress

...

  1. All files found during all scans carried out

  2. All files successfully classified by AI/ML

  3. All files containing Personal Identifiable Information

  4. Set to refresh the results automatically

Dashboard > Classification Tags

Image RemovedImage Added

Details of the classification taxonomy used to categorise and classify files. The Sensitive grouping (1) identifies files that the organisation deems to have a critical impact on their operations. The Non-Sensitive grouping (2) identifies files that do not fit into the above group but should be classified and categorised nonetheless.

Dashboard > Company Overview

Image RemovedImage Added

An overall look at the file and access landscape of the organisation/company.

...

  1. All files found during all scans carried out

  2. All files successfully classified by AI/ML

  3. All files containing Personal Identifiable Information

  4. The number of Active Directory groups found

  5. The number of Active Directory users found

  6. The number of users who have logged-in in the last 90 days

  7. The number of users who have not logged-in in the last 90 days

  8. The number of users whose access has been paused/suspended

Dashboard > Results

...

  1. Search for files or folders using their path

  2. Select/filter by the source of the files, e.g. SMB, Sharepoint, etc…

  3. Filter by Categorisation of files. Linked to their functionality, e.g. HR, Finance, etc…

  4. Filter by file extension, e.g. docx, jpg, pdf, etc…

  5. Filter by sensitivity. These are files that have been deemed to contain critical organisational information

  6. Filter by Subcategorisation of files. This identifies their usage, e.g. contract, code, sales agreement, etc…

  7. Filter by PII. Files that contain Personal Identifiable Information (PII)

  8. Filter by Classification tags. These are security tags put on files, e.g. Internal, Confidential, etc…

  9. Filter by Risk level. Associates critical data with user access. Low, medium, and high based on the share of users that have access to that file. Higher level more users have access.

...

19. Navigate to next set of 10 displayed files using the filters

Dashboard > Permission Management

Image RemovedImage Added

To investigate files and users/groups based on access or permissions.

  1. Enter know user or group name

  2. Enter known file or folder name

  3. Export results of search to CSV

Dashboard > Reports

Image RemovedImage Added

Generate preconfigured PDF reports. Select the icons to download the report.

  1. Detailed report on the classification and categorisation of files scanned

  2. Details of Active Directory users from a security perspective

  3. Tailored to help in regulatory analysis, this report details files that fall under regulatory regimes such as GDPR

  4. Detailing the areas where data risk is most severe. Risk scoring helps allocate remediation resources

Scan Control > Discover

...

  1. Configured LDAP scan name

  2. Kick of the scan of users and groups

  3. View connection details

Scan Control > Scan

...

  1. Configured SMB scan name

  2. Kick off the file scan

  3. View SMB connection details

Administration > Connections > CIFS/LDAP

Image RemovedImage Added

Configure various file and user scans.

...

20. Open the LDAP connection wizard to setup a new scanning

Administration > Connections > Sharepoint

Image RemovedImage Added

  1. Name used to identify the configured Sharepoint connection

  2. The Domain address of the Sharepoint server

  3. The user that grants access to the files to be scanned

  4. The URL to the files

  5. The path at which the scan will begin

  6. The type of entities to be scanned (files/users)

  7. Open Sharepoint Online Connection wizard

  8. Name used to identify the configured Sharepoint connection

  9. The Domain address of the Sharepoint server

...

14. Open Sharepoint On-Prem Connection wizard

Administration > Screens > Results screen

Image RemovedImage Added

Edit the way results are filtered and presented on the Dashboard > Results screen.

  1. The filter setting used search files

  2. Reset any previous configuration to the default below

  3. List of filters that will be seen on the Results screen

  4. List of filters that will no be seen on the Results screen

  5. The file attributes that will be visible on the Results screen

  6. Reset any previous configuration to the default below

  7. The file attribute and other fields visible on the Results screen files table

Administration > Pattern Matching

Filters

...

  1. Search: Enter text here to filter patterns based in name

  2. Classification: Filter by classification tags associated with patterns

  3. Compliance: Filter by compliance tags associated with patterns

  4. Distribution: Filter by distribution tags associated with patterns

  5. Categories: Filter by file categories associated with patterns

  6. Subcategories: Filter by file subcategories associated with patterns

  7. Enabled: Filter by patterns that have been enabled or disabled.

  8. Published: Filter by patterns that have been published or unpublished

  9. Add New Pattern: Create a custom pattern

...

11. Clear filters: Remove all previously selected filters

Pattern Table

  1. Sort patterns by name

  2. Sort patterns by Classification tag

  3. Sort patterns by Compliance tag

  4. Sort patterns by Distribution tag

  5. Sort patterns by Category

  6. Sort patterns by Subcategory

  7. Sort patterns on whether they are enabled or not

  8. Switch to enable or disable a pattern

  9. Actions column

...

Select delete to remove the pattern

Administration > User Management

Image Modified

This screen will bring the user the to Keycloak dashboard.

...

Here, login, credentials, users, and access details can be configured:

...