Skip to main content

How to Perform Detection in RDBMS

The Detection process allows user to perform discovery in the Relational Database Systems (RDBMS). This process helps you to fetch sensitive information across different data sources.

Pre-requisites

Following are the pre-requisites:

  1. Controller must be installed. For detailed information about the installation process, refer Install DSM Administrator in Linux and Install DSM Administrator in Windows.

  2. Discover IDP must be installed to perform detection process on the selected databases when creating a task. To know more on how to install Discover IDP in Linux and Windows environment, refer Install Discover IDP in Linux and Install Discover IDP in Windows.

Steps to Perform Detection

The following section of this page outlines the step-by-step procedure to discover sensitive information stored on different databases.

  1. The first step is to create a policy in the PK Protect. Policy allows you create a set of Sensitive Data Types which are presented in the files. You can define your policies as well. To know more about each field, refer DBMS Policy.

  2. The second step is to create a connection in RDBMS Connection Manager screen. In the Add New Connection screen, select the Location, Service and the Connection Details from given list. Now, fill the details for the selected data source for which you need to create a connection. The connection is established between controller and the IDP in order to access the database. To know more about each field, refer Create RDBMS Connection.

  3. The last step to perform Detection, is to create a task. The Task screen enables a user to select locations of the saved files in which sensitive information is stored. To know more on how to create a task, refer Create Task in RDBMS.

*Note: The steps for creating a task in RDBMS, RDS, Azure and Google Cloud are same. If you want to create a task for any of given modules, then select the module from the Select Module drop - down.

View Detection Results

Once the task is executed successfully, the results get generated which depict what all information in the selected files were sensitive. A list of detailed information is displayed in the Results screen. To know more about each tab in the Results screen, refer RDBMS Detection Results.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.