Skip to main content

DSAR View

DSAR View offers insight into the details of the data sources, RoA and RtE request status, and the information related to the alerts and the alert rules.

*Note: By default, only Admin can access the Reports section. You can provide rights to other users for accessing the Reports section through, User Management > Roles > Edit Product Access Permissions option in Admin.

To know more on Roles and Permissions in both Linux and Windows environment, refer to section Manage Roles and Permissions in Linux and Manage Roles and Permissions in Windows.


Access the DSAR View screen from the menu under Reports > DSAR View. There are three tabs under DSAR View:

  • DSAR Overview

  • RoA (Right of Access) and RtE (Right to Erasure)

*Note: If a user checks the Include GDPR Dashboard View checkbox on the Policy> New Policy tab, only then the data for that policy will be displayed under the GDPR View screen.

  1. DSAR Overview

    The DSAR Overview tab provides the complete details about the data sources.


    The charts in each row provide insight into the sensitive data status of different data sources. You can segregate the results for All, On-Premises, or Cloud data in the charts, based on the selection made at the top of the screen. Click Download button to download the DSAR View screen.

    1. Assets in Scope

      This panel provides an overview of the complete data assets.

      1. The All Assets chart indicates that how many data assets are On-Premises and on the Cloud. Any AWS and Azure assets are considered in the cloud, while all other Hadoop and RDBMS assets are on-premises or in the cloud according to their designation. Hadoop location is set when setting up the cluster connection. RDBMS location is set when creating a database connection. One asset is equal to one Hadoop cluster or one database.

        1. The Total chart indicates the total number of the sensitive data discovered across all the data assets. To see what will happen on clicking the chart, view Server Details.

        2. The Exposed chart indicates the percentage of the exposed files and tables that contain sensitive data. To see what will happen on clicking the chart, view Server Details.

        3. The Protected chart indicates the percentage of protected sensitive data sources that PK Protect has masked or encrypted. To see what will happen on clicking the chart, view Server Details.

        4. The Safe chart indicates the percentage of the safe objects within the assets. To see what will happen on clicking the chart, view Server Details.

        5. The Skipped chart indicates the percentage of the skipped objects. To see what will happen on clicking the chart, view Server Details.

        6. The Unprocessed chart indicates the percentage of Unprocessed objects. To see what will happen on clicking the chart, view Server Details.

      2. Overall Coverage

        This panel offers insight into the sensitive data coverage across all the data assets.


        Click on the rectangular icon shown in the top right corner of each of the graph to view it in the full

        screen as well as to download it in the PDF format.

        1. The Overall Coverage graph shows the number of tables and files involved in the coverage. The Sensitive data can be in any of the state i.e., Exposed, Protected, Safe and Skipped.

          1. Exposed: The Sensitive data, which is not protected during the processing, is marked as Exposed.

          2. Protected: The Sensitive data, which is encrypted or masked while processing, is categorized as Protected.

          3. Safe: The Sensitive data which is marked as safe in the Safelist and the data, which is already protected, is marked as Safe.

          4. Skipped: The data which were skipped during the processing, is marked as Skipped.
            To see what will happen on clicking the graph, view Server Details.

        2. The Processed Coverage graph shows the coverage trend of the Sensitive Data for different data sources.


          To see what will happen on clicking the graph, view Server Details.

        3. The Processed Content graph shows the breakdown of the data based on the structured vs unstructured data and relational vs non-relational data sources.


          To see what will happen on clicking the graph, view Server Details.

        4. The Policy Content graph shows the breakdown of the data based on the different policies.


          *Note: The Policy Content graph under DSAR View shows only DSAR policies and DSAR view enabled policies.

          To see what will happen on clicking the graph, view Server Details.

      3. Exposure and Protection
        The Exposure & Protection graphs break down the data sources based on the Sensitive data in them. It provides information whether the Sensitive data has been Protected (masked or encrypted), Exposed (detected but unprotected), Skipped or Safe.

        1. The Exposed graph displays information for the exposed data, data source-wise. This graph basically depicts that during the processing the sensitive data was detected which falls under the unprotected category i.e., Exposed.


          To see what will happen on clicking the graph, view Server Details.

        2. The Protected graph displays information for the protected data, which is either masked or encrypted, data source-wise.


          To see what will happen on clicking the graph, view Server Details.

        3. The Safe graph displays information for the Sensitive data which are marked as Safe, data source-wise.


          To see what will happen on clicking the graph, view Server Details.

        4. The Skipped graph displays information for the Skipped data, data source-wise. Any files or tables that have not been scanned is shown in the Skipped graph.


          To see what will happen on clicking the graph, view Server Details.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.