Welcome to
Help Desk

Product Updates
Ideas Contact Support

Actions in the Sensitive Content Tab


Once you set up content classification policies, Egnyte Secure & Govern will start surfacing locations matching these policies in the Sensitive Content tab. There are many actions you can take on the content, like filtering out where the sensitive content is to quickly narrow down your search, allowing the sensitive content, or remediating the sensitive content by moving or deleting the content from unpermitted locations.

Filter the Locations List

Export the Locations List

Permit Sensitive Content

Remediate Unpermitted Sensitive Content

Filter the Locations List

You can narrow down the list of sensitive locations using filters from the collapsible Filters pane. Once you apply these filters, only locations matching all the filters will be displayed.


The available filters in the Sensitive Content tab are:

  • Whether the location contains any unpermitted sensitive content.
  • The Location search box
  • The time when the details of the location, such as the Risk score or the matched classification policies, were last updated.
  • The matched classification policies.
  • The Risk score of the folder.

Use the Reset or Reset All options to remove the selected filter or all filters that have been applied.

Export the Locations List

You can export the list of sensitive locations shown in the Sensitive Content tab as a CSV file. Click on the Export locations drop-down and either export the complete list of locations or just the filtered list of locations currently shown in the tab.


Permit Sensitive Content

While you can permit an entire folder tree to contain sensitive content from the Source settings page, you can permit individual folders from the Sensitive Content tab. For example, you may want to permit just a folder to contain files with PCI-DSS content but not permit any of its subfolders to do so.

  1. In the Sensitive Content tab, turn on the toggle to display only those locations with unpermitted content. This toggle is turned on by default.


  2. Click on the location to bring up the folder's details. You can see the classification policies that have matched against content in the location.


  3. By default, no sensitive content is permitted in the location. If you want to permit content matching a policy, you can click the red X to allow the content for that policy in that location.


  4. Once you’ve permitted a policy for this location, any new files matching this policy are considered permitted in the location.
  5. If you’ve permitted all the detected policies for a location, it will be hidden from your view as the location now only contains permitted content. Any new files matching the currently permitted policies will not bring the location back. However, if content matching some new unpermitted policy is found in the location, the location will come back to the view.


  6. To view all locations with sensitive content, regardless of whether the content is permitted or not, turn Off the toggle.


Using the above actions, you can reduce the risk of sensitive content exposure in your sources. The Sensitive Content tab is also periodically refreshed to reflect any changes you make in your sources. When you take actions outside Egnyte Protect, such as moving identified sensitive content to more secure folders, the list of locations with unpermitted sensitive content will get automatically shrunk down.

Remediate Unpermitted Sensitive Content

You can also choose to shrink the footprint of unpermitted sensitive content in an Egnyte Connect source. For example, files with sensitive employee information that belong in the Human Resources folder may have been accidentally copied to several publicly shared folders. To avoid a potential leak of this information, you may choose to either delete these files or move them to a location within the Human Resources folder.

  1. In the Sensitive Content tab, turn On the toggle to display only those locations with unpermitted content.


  2. Check the box next to the location you wish to fix or multi-select locations that contain any unpermitted sensitive content that can be remediated together.
  3. If you wish to remediate all the contents of a location, from the Details pane will show the number of such files and the type of unpermitted sensitive content. Click on the Fix (or Fix selected) button in the Details pane.  Actions available are:
    • Move File - allows the user to move the file(s) to another location on the same source
    • Delete file - allows the user to delete the file(s)
    • Request Review - allows the user to request that Data Owners for that location review the sensitive content
      • Note: To allow reviews, the following permissions must be enabled in Settings -> Roles:
        • Data Owner - Sensitive Content -> Users can Fix Sensitive Locations
        • Data Owner - Data Owners -> Request Sensitive Content reviews from Data Owners


  4. If you wish to remediate only specific files, in the Show Detected Content view, click the menu button on the line of the file you wish to remediate and select Move or Delete
    Screenshot 2023-10-09 at 9.29.23 AM.png

  5. If you wish to simply move these files to trash, click on the Delete Files option. Confirm the remediation to move the unpermitted content to trash and click Delete.


    Note: You may choose to leave stub files behind in the folders to explain the missing content. These stubs are text files with the same names as the deleted files, but with just a simple message indicating the remediation.
  6. Alternatively, you may choose the option to move these files with unpermitted content to another location. In this case, click Select location so you can select the destination folder for these files.



    Note: The folder you select will be automatically permitted to contain the type of content in these files. For example, if you choose to move files matched by the PCI-DSS policy, the destination folder will be now automatically permitted to contain PCI-DSS content.
  7. Confirm the remediation to move the files to the selected destination and click Move files. Again, you may choose to leave behind stub files explaining the remediation.


  8. Once you confirm either action, the unpermitted content will be removed from the selected locations. These locations will be removed from your view as they now only contain permitted sensitive content, if any. However, if some unpermitted content is found again in any of these locations, such locations will come back to the view.
  9. Requesting a review of the sensitive content will send an email to all Data Owners assigned to that location. They will be able to mark the review as completed under the Reviews section on the right side of the window.


Was this article helpful?
0 out of 0 found this helpful

For technical assistance, please contact us.