Skip to main content

How to Perform Detection in Files

The Detection process allows user to perform discovery in the File system. This process helps you to fetch sensitive information across different file systems.

Pre-requisites

Following are the pre-requisites:

  1. Controller must be installed. For detailed information about the installation process, refer Install DSM Administrator in Linux and Install DSM Administrator in Windows.

  2. Files IDP must be Installed. To know more about how to install File IDP in Linux and Windows environment, refer Install Files IDP in Linux and Install Files IDP in Windows.

Steps to Perform Detection

The following section of this page outlines the step-by-step procedure to discover sensitive information stored on different file systems.

  1. The first step is to create a policy in the PK Protect. Policy allows to create a set of Sensitive Data Types which are presented in the files. To know how to create a policy, refer Hadoop & Files Policy.

  2. The next step in the process of performing Detection is to create a task. The Task screen enables a user to selected locations of the saved files in which sensitive information is stored. To know more about each field in the Task screen, refer Create Task in Files.

View Detection Results

Once the task is executed successfully, the results are generated which depict what all information in the selected files were sensitive. A list of detailed information is displayed in the Results screen. To know more about each tab in the Results screen, refer Files Results.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.