Skip to main content

How to Perform Detection in GCS

The Detection process allows user to perform discovery in the GCS module. This process helps you to fetch sensitive information across GCS system.

Pre-requisites

Following are the pre-requisites:

  1. Controller must be installed. For detailed information about the installation process, refer Install DSM Administrator in Linux and Install DSM Administrator in Windows.

  2. GCS and Cloud IDP must be Installed. Installing both the IDP will enable user to connect to Google Cloud Server. To know more on how to install GCS and Cloud IDP, refer Install GCS IDP and Install Cloud IDP.

Steps to Perform Detection

The following section of this page outlines the step-by-step procedure to discover sensitive information stored on GCS.

  1. The first step is to create a policy in the PK Protect. Policy allows you to create a set of Sensitive Data Types which are presented in the buckets. You can define your policies as well. To know how to create a policy, refer Hadoop & Files Policy.

  2. The next step is to create a task. The Task screen enables the user to select buckets of the objects in which sensitive information is stored. To know more on how to create a task, refer Create Task in GCS.

View Detection Results

Once the task is executed successfully, the results get generated which depict what all information in the selected objects were sensitive. A list of detailed information is displayed in the Results screen. To know more about each tab in Results screen, refer GCS Results.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.