Home » Getting Started
 

Endpoint Central Data Protection Officer Dashboard

Table of contents

  1. What is a DPO dashboard?
  2. How to customize the Data Protection Officer dashboard?

What is a DPO dashboard?

A Data Protection Officer (DPO) is an official who is in charge of defending and securing important critical data of enterprises. The main objective of a DPO is to ensure that the personal data of all the individuals involved with a company or business is in compliance with all the stated data protection rules. A DPO is responsible for overseeing an organization's data protection strategy and its process of implementation. Keeping in mind the major responsibilities of a DPO, Endpoint Central provides an intuitive dashboard that offers an insightful view into the various vulnerabilities found in the system and network. It also provides key security measures that can be implemented to protect your data from unauthorized access and corruption throughout its lifecycle.

How to customize the DPO dashboard?

The DPO dashboard provides important guidelines that can protect your data from unauthorized access and corruption throughout its lifecycle. The security measures offered by Endpoint Central that can be customized according to your requirements are as follows:

    • Monitoring data transmission

You can supervise the data transmission in your network in two ways:

1. Control Incoming Data: This security feature defines strict security guidelines to monitor the data entering your network through applications, USB devices, browsers or mail clients.

  • To monitor the data entering your network through applications, select Application Control -->Configure Now.

The Prohibit software feature in the Inventory module will open where a list of all the prohibited software in the network will be displayed along with the auto-uninstall policies, auto-uninstall statuses, names of the systems containing the prohibited software and user requests. You can add and remove prohibited software here as per your requirements.

  • To monitor the data entering your network through USB devices, select USB Device Management--> Configure Now.

The Secure USB configuration module will open where you can select the devices that needs to be blocked/unblocked in the target devices in your network which can also be configured as per your requirements.

  • To monitor the data entering your network through browsers, select browser management --> Configure Now.

The Browser configuration module will open where you can customize the settings as per your requirements.

  • To monitor the data entering your network through mails, select Mail Client Management
  • To prevent any unwanted data entering your system, select Inbound Firewall Rules --> click Configure Now

2. Control Outgoing Data: This security feature defines critical guidelines to monitor the data exiting your network through applications, USB devices, browsers or mail clients

Note : Refer the previous section (Control Incoming Data)to know how to configure the security settings to monitor the data leaving through applications, USB devices, browsers or mail clients.

You can also enable advanced security features by configuring the following features:

  • Configure Outbound Firewall Rules: Monitor the data leaving your system by selecting Configure Outbound Firewall Rules --> Configure Now.
  • Securing Wireless Transmissions : Secure data transfer over wireless networks by using secure encryption like WPA or WPA2 by enabling this feature. To configure Securing Wireless Transmissions, select the feature and click Configure now.

3. Secure Data: Secure the data in your network from unauthorized access, breaches and from data loss by defining rules for file folder access, share access, encryption, and securing data transmission. To configure the features to secure data, refer below:

  • File level Security : Configure NTFS permissions to restrict access to local users for file containing sensitive data. To configure File level Security, select File level Security --> Configure Now.
  • Share Level Security: Configure access permissions for shared folders and restrict Users and Groups.
  • Scan, identify and remove unwanted files in your systems and eliminate possibilites of compliance issues Enable Windows Bitlocker to shield confidential data from users with physical access to the computer.
  • Data Backup: Backup the data regularly and store it offsite to sustain unforeseen data loss.
  • Strong Password Policy: Understand how to configure a strong password by defining the right set of characters, complexity and the optimum duration for password change.

4. Remove Unused Data: Destroy unused data to prevent breaches or compliance issues and ensure that no sensitive data is leaked when asset is retired.

To remove unused data, configure the following settings:

  • Delete Files and Folders: Identify unused data in your network and present unforeseen data breaches by deleting the same. Select Delete Files and Folders ---> Configure Now.
  • Disk Cleanup: Cleanup all temporary, cache & unused files from your windows machines. Select Disk Cleanup ---> Configure Now.
  • File Scan: Scan, identify and remove unwanted files in your systems and eliminate possibilites of compliance issues.