Skip to main content

How to Perform Detection in Couchbase

The Detection process allows user to perform discovery in the Couchbase database.

Pre-requisites

Following are the pre-requisites:

  1. Controller must be installed. For detailed information about the installation process, refer Install DSM Administrator in Linux and Install DSM Administrator in Windows.

  2. NoSQL IDP must be Installed. To know more on how to install NoSQL IDP, refer Install NoSQL IDP.

Steps to Perform Detection

The following section of this page outlines the step-by-step procedure to discover sensitive information stored in Couchbase.

  1. The first step is to create a policy in the PK Protect. Policy allows you to create a set of Sensitive Data Types which are presented in the data source. You can define your policies as well. To know how to create a policy, refer DBMS Policy.

  2. The second step is to create a connection in NoSQL Connection Manager screen. The connection is established between controller and the IDP in order to access the Couchbase store, where data is kept. To know more on how to create a connection, refer Couchbase Connection.

  3. The last step in the process of performing Detection is to create a task. The Task screen enables a user to select locations of the saved data in which sensitive information is stored. To know more on how to create a task, refer Create Task in Couchbase.

View Detection Results

Once the task is executed successfully, the results are generated which depict what all information in the selected document were sensitive. A list of detailed information is displayed in the Results screen. To know more about each tab in the Results screen, refer Couchbase Results.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.