Skip to main content

How to create a Target for Encryption

This section of the page elaborates the process of Encryption in PEM Administrator.

  1. The first step is to create a policy in the PEM Administrator. Policies are the set of instructions that get implemented on the data whenever a target is executed. These policies are responsible for controlling the end user experience, configuring, specifying administrative policy keys for the use by Audit, Discovery, Data Loss Prevention (DLP), processes, and technology. In case if no policy is defined, the user will automatically lie in the default policy i.e., Site Wide. To know how to create a policy, refer Define Policies.

  2. The next step is to define a filter in the Discovery Bundles/Regex/Dictionary screen. These are the sensitive types which the PEM Agent locates in the file. To know on how to create bundles, refer the following:  

    1. To create Discovery bundle, refer Create a Discovery Bundle.

    2. To define regex, refer Add Regular Expressions.

    3. To add entries in Dictionary, refer Add Custom Dictionaries.

*Note: Post creating Custom Dictionary and Regexes, you need to define Discovery Bundle.

  1. The third step is to define the remediation action which will take place on the data stored in the file. While creating remediation action, select Encrypt as an option that will be executed on a file. To know more on how to create a Remediation for a file, refer Adding a Remediation Action.

  2. In this step, create File Protection Policy. These policies contain information pertaining to a policy action and are selected in a target. To know more on how to create a File Protection Policy, refer Add a File Protection Policy.

  3. In the last step, create a Target which defines the scope of File Protection Policy where it will be executed. To know more on how to create a target, refer Add a Persistent Target.

Once the remediation takes place successfully, the data in the file is encrypted and PK Protect icon gets displayed on the file.

View Results

Once a target is executed successfully, DSI (Data Security Intelligence) event gets generated in the Reporting screen, where you can view the details for the event. Apart from the DSI event, you can also check results in the Dashboard screen by adding panels as per requirements.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.