/
Focus Admin Guide

Focus Admin Guide

A screen-by-screen guide to the platform

Dashboard > Scan Progress

 

  1. All files found during all scans carried out

  2. All files successfully classified by AI/ML

  3. All files containing Personal Identifiable Information

  4. Set to refresh the results automatically

Dashboard > Classification Tags

 

 

Details of the classification taxonomy used to categorise and classify files. The Sensitive grouping (1) identifies files that the organisation deems to have a critical impact on their operations. The Non-Sensitive grouping (2) identifies files that do not fit into the above group but should be classified and categorised nonetheless.

Dashboard > Company Overview

 

An overall look at the file and access landscape of the organisation/company.

 

  1. All files found during all scans carried out

  2. All files successfully classified by AI/ML

  3. All files containing Personal Identifiable Information

  4. The number of Active Directory groups found

  5. The number of Active Directory users found

  6. The number of users who have logged-in in the last 90 days

  7. The number of users who have not logged-in in the last 90 days

  8. The number of users whose access has been paused/suspended

Dashboard > Results

  1. Search for files or folders using their path

  2. Select/filter by the source of the files, e.g. SMB, Sharepoint, etc…

  3. Filter by Categorisation of files. Linked to their functionality, e.g. HR, Finance, etc…

  4. Filter by file extension, e.g. docx, jpg, pdf, etc…

  5. Filter by sensitivity. These are files that have been deemed to contain critical organisational information

  6. Filter by Subcategorisation of files. This identifies their usage, e.g. contract, code, sales agreement, etc…

  7. Filter by PII. Files that contain Personal Identifiable Information (PII)

  8. Filter by Classification tags. These are security tags put on files, e.g. Internal, Confidential, etc…

  9. Filter by Risk level. Associates critical data with user access. Low, medium, and high based on the share of users that have access to that file. Higher level more users have access.

10. Filter on files that were successfully classified or not. Folder are included her as non-classified.

11. Export data from the current filters to a CSV

12. Filter on files created on or after this date

13. Filter on files created on or before this date

14. Filter on files modified on or after this date

15. Filter on files modified on or before this date

16. Select Keywords/Patterns/RegEx. Multiple can be selected and their counts will be visible

17. Clear all previously set filters

18. The file results based on the filters used

19. Navigate to next set of 10 displayed files using the filters

Dashboard > Permission Management

 

 

To investigate files and users/groups based on access or permissions.

  1. Enter know user or group name

  2. Enter known file or folder name

  3. Export results of search to CSV

Dashboard > Reports

 

 

Generate preconfigured PDF reports. Select the icons to download the report.

  1. Detailed report on the classification and categorisation of files scanned

  2. Details of Active Directory users from a security perspective

  3. Tailored to help in regulatory analysis, this report details files that fall under regulatory regimes such as GDPR

  4. Detailing the areas where data risk is most severe. Risk scoring helps allocate remediation resources

Scan Control > Discover

  1. Configured LDAP scan name

  2. Kick of the scan of users and groups

  3. View connection details

Scan Control > Scan

 

  1. Configured SMB scan name

  2. Kick off the file scan

  3. View SMB connection details

Administration > Connections > CIFS/LDAP

 

 

Configure various file and user scans.

  1. Tab to setup CIFS file based connections and LDAP user based connections

  2. Tab to setup Sharepoint Online and On-Prem connections

  3. The name used to identify the connections

  4. The name of the server/machine to be scanned

  5. The IP address of the server/machine to be scanned

  6. The port used to access the server

  7. The path of the root directory to begin scanning from

  8. The username that grants access to these files

  9. The protocol used to view the files

10. The domain in which the files are located

11. If the files are a local share, this is the path used to begin scanning

12. Opens the CIFS connection wizard to setup a new connections

13. The name used to identify the configured LDAP scanning

14. The host where the Active Directory (AD) is located

15. The port used to access the AD

16. The username that grants access to all AD data

17. The LDAP base to begin the scan

18. The alias, if applicable of the Everyone/World grouping

19. Inactivity period of users. Used to identify users who have not logged-in in that time

20. Open the LDAP connection wizard to setup a new scanning

Administration > Connections > Sharepoint

 

  1. Name used to identify the configured Sharepoint connection

  2. The Domain address of the Sharepoint server

  3. The user that grants access to the files to be scanned

  4. The URL to the files

  5. The path at which the scan will begin

  6. The type of entities to be scanned (files/users)

  7. Open Sharepoint Online Connection wizard

  8. Name used to identify the configured Sharepoint connection

  9. The Domain address of the Sharepoint server

10. The user that grants access to the files to be scanned

11. The URL to the files

12. The path at which the scan will begin

13. The type of entities to be scanned (files/users)

14. Open Sharepoint On-Prem Connection wizard

Administration > Screens > Results screen

 

Edit the way results are filtered and presented on the Dashboard > Results screen.

  1. The filter setting used search files

  2. Reset any previous configuration to the default below

  3. List of filters that will be seen on the Results screen

  4. List of filters that will no be seen on the Results screen

  5. The file attributes that will be visible on the Results screen

  6. Reset any previous configuration to the default below

  7. The file attribute and other fields visible on the Results screen files table

Administration > Pattern Matching

Filters

 

  1. Search: Enter text here to filter patterns based in name

  2. Classification: Filter by classification tags associated with patterns

  3. Compliance: Filter by compliance tags associated with patterns

  4. Distribution: Filter by distribution tags associated with patterns

  5. Categories: Filter by file categories associated with patterns

  6. Subcategories: Filter by file subcategories associated with patterns

  7. Enabled: Filter by patterns that have been enabled or disabled.

  8. Published: Filter by patterns that have been published or unpublished

  9. Add New Pattern: Create a custom pattern

10. Publish: Push changes to the pattern matching system for start using

11. Clear filters: Remove all previously selected filters

Pattern Table

 

  1. Sort patterns by name

  2. Sort patterns by Classification tag

  3. Sort patterns by Compliance tag

  4. Sort patterns by Distribution tag

  5. Sort patterns by Category

  6. Sort patterns by Subcategory

  7. Sort patterns on whether they are enabled or not

  8. Switch to enable or disable a pattern

  9. Actions column

10. Select to view:

Select edit to edit pattern contents

Select delete to remove the pattern

Administration > User Management

 

This screen will bring the user the to Keycloak dashboard.

Here, login, credentials, users, and access details can be configured:

 

Related content

K3s Installation
K3s Installation
Read with this
Scan Progress
Scan Progress
More like this
Focus Connectors List
Focus Connectors List
Read with this
Enterprise Search
Enterprise Search
More like this
Admin Guide Agent v4
Admin Guide Agent v4
Read with this
SEU Focus Training
SEU Focus Training
More like this

Classified as Getvisibility - Partner/Customer Confidential