Skip to main content

How to create a Target for Redaction

This section of the page elaborates the process of Redaction in PEM Administrator. Redaction is a process of masking the data with based on the pre-defined redaction types given in the PEM.

  1. The first step is to create a policy in the PEM Administrator. Policies are the set of instructions that get implemented on the data whenever a target is executed. These policies are responsible for controlling the end user experience, configuring, specifying administrative policy keys for the use by Audit, Discovery, Data Loss Prevention (DLP), processes, and technology. In case if no policy is defined, the user will automatically lie in the default policy i.e., Site Wide. To know how to create a policy, refer Define Policies.

  2. The next step is to define a Discovery bundle and Redaction Bundle. These are the sensitive types which the PEM Agent locates in the file.

    1. If you want to use Pre-defined filter bundles, create Discovery and Redaction bundles using Discovery and Redaction Bundles screen. To know more on how to create bundles, refer Create a Discovery Bundle and Create a Redaction bundle.

    2. If you want to define custom filter bundles, create Custom Dictionaries either by adding entries or uploading a text file else create Regexes. To know more on how to create custom filter bundles, refer Add Custom Dictionaries and Add Regular Expressions.

Post creating Custom Dictionary and Regexes, define Discovery and Redaction Bundle.

  1. The third step is to define the remediation action which will take place on the data stored in the file. While creating remediation action, select Redact as an option that will be executed on a file. To know more on how to create a Remediation for a file, refer Adding a Remediation Action.

  2. In this step, create File Protection Policy. These policies contain information pertaining to a policy action and are selected in a target. To know more on how to create a File Protection Policy, refer Add a File Protection Policy.

  3. In the last step, create a Target which defines the scope of File Protection Policy where it will be executed. To know more on how to create a target, refer Add a Persistent Target.

Once the remediation takes place successfully, the data in the file is redacted and PK Protect icon gets displayed on the file.

View Results

Once a target is executed successfully, DSI (Data Security Intelligence) event gets generated in the Reporting screen, where you can view the details for the event. Apart from the DSI event, you can even check results in the Dashboard screen by adding panels as per requirements.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.