Help Center
Quick Start
- Overview
- System requirements
- Minimum privileges required
- Default port configuration
- Installing DataSecurity Plus
- Uninstalling DataSecurity Plus
- Starting DataSecurity Plus
- Launching DataSecurity Plus
- Configuring your solution
- Licensing details
- Applying a license
File Auditing
- About File Auditing
- Domain configuration
- File server configuration
- Failover cluster configuration
- NetApp server configuration
- Workgroup configuration
Setting up File Audit
Dashboard
Reports
Alerts
Configuration
Storage Configuration
File Analysis
- About File Analysis
- On-Demand Reports
Setting up File Analysis
Dashboard
Reports
Alerts
Configuration
Data Risk Assessment
- About Data risk assessment
Setting up Data risk assessment
Dashboard
Reports
Ownership analysis
Configuration
Endpoint DLP
- About Endpoint DLP
Setting up Endpoint DLP
Reports
Alerts
Prevention policies
Configuration
Cloud Protection
- About Cloud Protection
- Gateway Server Configuration
- Certificate Authority Configuration
- Gateway Configuration in Endpoint
- Manage Certificate Trust Store
- Threat Analytics Database
- Manage Banned Applications
- Manage Authorized Applications
- Gateway Server Failover
- Two-way SSL configuration
- Global Insight
- Application Insight
- User Insight
- Shadow Application Insight
- Banned Application Insight
- Cloud App Discovery
- Cloud Access Reports
- Application Insights
- Shadow Cloud Application Reports
- Banned Cloud Application Reports
- File Upload Reports
Setting up Cloud Protection
Dashboard
Reports
Control Policies
Storage Configuration
Administrative settings
- Technician configuration
- Notification filters
- Manage agent
- Agent settings
- SIEM integration
- Business hours configuration
- Two-factor authentication
- Workgroup configuration
- Security policy
Email configuration
General settings
- Connection
- Personalize
- DataSecurity Plus Server
- Privacy Settings
- Disk utilization
- Schedule Retention Policy
Policy Configuration
Release notes
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
Troubleshooting
- HTTP communication failure
- Dormant DataEngine
- Secure Gateway server failure
- RPC communication failure
- Known issues and limitations
- Known errors and solutions
Guides
- Agent document
- How to Migrate/Move DataSecurity Plus
- How to apply SSL certificate
- How to automate DataSecurity Plus database backup
- How to set alerts in DataSecurity Plus
- How to secure your DataSecurity Plus installation
General Settings
Listed below are various in-product settings that will help you manage the accuracy of discovery scans and the privacy of the data scanned by the Risk Analysis module.
Confidence level settings
Confidence level is a measure of the reliability of the sensitive data found. Setting a high confidence level to your data discovery scans helps reduce the instances of false positives and locates files with sensitive content reliably. The reliability of sensitive data captured can be of three categories — High, Medium, and Low.
Determining data confidence levels
Various algorithms, check sums, and criteria are used to determine the reliability of sensitive data detected. When the content of a file matches most or all of the reliability criteria and algorithms, the data confidence level is considered to be high. Fewer matches with these criteria will yield reports with a low data confidence level.
Best practice: Retain the default setting of Medium. A high data confidence level filters out files when even one of the configured keywords does not match, potentially capturing fewer sensitive data occurrences.
Configuring confidence levels in scans
You can configure confidence level in upcoming data discovery scans using the steps listed below:
- Select Risk Analysis from the application drop-down.
- Go to Configuration > Scan Configuration > General Settings.
- In the Confidence Level drop-down, choose your desired value.
Privacy settings
Security and confidentiality are essential aspects to consider for data risk assessment reports. These reports may contain sensitive content that must be hidden from users and technicians. Based on the rules and policies included in data discovery scans, this could be confidential data, personally identifiable information, or other sensitive data.
Most compliance regulations only require an index of locations where business-critical or sensitive personal data is stored in enterprise file storage. The detected data itself need not be included in reports.
Restricting the detected sensitive data from being stored in the database and displayed in reports can help:
- Enhance the privacy and security of sensitive data by making it inaccessible to technicians.
- Optimize disk usage by not storing the exact content match in the database.
There are two components that can be excluded from reports and storage:
- Rule-match content: This is the sensitive content detected in the scanned files.
- Display text: This is the set of characters preceding and succeeding the rule-match content within the files.
Modifying privacy settings
To modify privacy settings, follow these steps:
- Select Risk Analysis from the application drop-down.
- Go to Configuration > General Settings > Scan configuration.
- Under Privacy Settings select any one of the options listed below:
- Exclude display text: If this is enabled, the display text will be omitted from the reports and won't be stored in the database.
- Exclude both rule-match content and display text: If this is enabled, both display and rule-match content will be omitted from the reports and won't be stored in the database.
- Show both: The full data, including display text and rule-match content, will be available in the reports and also stored in the database.
- Click Save.