Help Center
Quick Start
- Overview
- System requirements
- Minimum privileges required
- Default port configuration
- Installing DataSecurity Plus
- Uninstalling DataSecurity Plus
- Starting DataSecurity Plus
- Launching DataSecurity Plus
- Configuring your solution
- Licensing details
- Applying a license
File Auditing
- About File Auditing
- Domain configuration
- File server configuration
- Failover cluster configuration
- NetApp server configuration
- Workgroup configuration
Setting up File Audit
Dashboard
Reports
Alerts
Configuration
Storage Configuration
File Analysis
- About File Analysis
- On-Demand Reports
Setting up File Analysis
Dashboard
Reports
Alerts
Configuration
Data Risk Assessment
- About Data risk assessment
Setting up Data risk assessment
Dashboard
Reports
Ownership analysis
Configuration
Endpoint DLP
- About Endpoint DLP
Setting up Endpoint DLP
Reports
Alerts
Prevention policies
Configuration
Cloud Protection
- About Cloud Protection
- Gateway Server Configuration
- Certificate Authority Configuration
- Gateway Configuration in Endpoint
- Manage Certificate Trust Store
- Threat Analytics Database
- Manage Banned Applications
- Manage Authorized Applications
- Gateway Server Failover
- Two-way SSL configuration
- Global Insight
- Application Insight
- User Insight
- Shadow Application Insight
- Banned Application Insight
- Cloud App Discovery
- Cloud Access Reports
- Application Insights
- Shadow Cloud Application Reports
- Banned Cloud Application Reports
- File Upload & Download Reports
Setting up Cloud Protection
Dashboard
Reports
Control Policies
Storage Configuration
Administrative settings
- Technician configuration
- Notification filters
- Manage agent
- Agent settings
- SIEM integration
- Business hours configuration
- Two-factor authentication
- Workgroup configuration
- Security policy
Email configuration
General settings
- Connection
- Personalize
- DataSecurity Plus Server
- Privacy Settings
- Disk utilization
- Schedule Retention Policy
Policy Configuration
Release notes
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
Troubleshooting
- HTTP communication failure
- Dormant DataEngine
- Secure Gateway server failure
- RPC communication failure
- Known issues and limitations
- Known errors and solutions
Guides
- Agent document
- How to Migrate/Move DataSecurity Plus
- How to apply SSL certificate
- How to automate DataSecurity Plus database backup
- How to set alerts in DataSecurity Plus
- How to secure your DataSecurity Plus installation
Security reports
Security Reports provide permission and ownership insights that are helpful in detecting file security issues such as undue privileges or inconsistent permissions.
To view the Security Reports:
- Select File Analysis from the modules drop-down. Go to Reports > Security Reports.
- Select the report you wish to view.
- Choose a Server Name to view data for that particular server.
Tip: Use the Filter option at the top to sort the report data by a particular detail, like the File Type or File Name.
The following reports are available under Security Reports:
- Files with Open Access lists files that are publicly accessible. For example, let's say that the Everyone group has been granted access to a particular file. This will lead to most domain users having unregulated access to that file even though not all users require it. This report helps identify such undue access that different users and groups have to files. By default, open access is configured as the Everyone and Guests groups having Any Control and the Authenticated Users group having Full Control. You can modify these settings on the Report Configuration page.
- Full Control lists the files to which the selected users have Full Control access.
- Inconsistent Permission lists files with broken inheritances.
Notes:
- Files deleted directly from the reports cannot be retrieved.
- Reports have graphs summarizing the overall data for up to three categories: the top actors by department, file size, and file owner. The department-based graph fetches data after the completion of the domain sync process and the automatic security and full scans. If the automatic scans fail, run them manually from Configuration > Data Sources > Windows File Server > View schedule status.
Tip: Graphs can be used to filter the report data corresponding to a particular actor. For example, if one of the top actors in the Top departments by file storage size graph is Department A, clicking the bar denoting Department A filters the report and shows data for this actor alone.