After setting up content classification policies, Egnyte Secure & Govern will start surfacing locations matching these policies in the Sensitive Content tab. Users can filter results, allow sensitive content, or remediate it by moving or deleting it from unpermitted locations.
Skip Ahead To...
Filter the Locations List
Export the Locations List
Permit Sensitive Content
Remediate Unpermitted Sensitive Content
View Detected Content and Associated Actions
Filter the Locations List
Users can narrow down the list of sensitive locations using filters from the collapsible Filters pane. After applying these filters, only locations matching all the filters will be displayed.
The available filters in the Sensitive Content tab are:
- Unpermitted content
- Last updated
- Confidence
- Policies
- Source
- Risk
- Comments
Use the Reset or Reset All options to remove the selected filter or all filters that have been applied.
Export the Locations List
Users can export the list of sensitive locations shown in the Sensitive Content tab as a CSV file. Click on the Export locations drop-down and either export all locations, currently filtered locations, or all files in filtered locations.
Permit Sensitive Content
While a user can permit an entire folder tree to contain sensitive content from the Source settings page, Egnyte recommends that they permit individual folders from the Sensitive Content tab. For example, a user can permit a folder to contain files with PCI-DSS content but not permit any of its sub-folders to do so.
-
In the filter options, select Unpermitted content -> Show only locations with unpermitted Sensitive Content. This option is selected by default.
-
Click on the location to bring up the folder's details. The user can see the sensitive items, total risk, and updated details for the policies selected.
-
By default, no sensitive content is permitted in the location. If a user wants to permit content matching a policy, they can look at the details, expand the matched policies section and turn the toggle on for the respective policy.
After permitting a policy for this location, any new files matching this policy are considered permitted in the location.
If a user has permitted all the detected policies for a location, it will be hidden from their view as the location now only contains permitted content. Any new files matching the currently permitted policies will not bring the location back. However, if content matching some new unpermitted policy is found in the location, the location will come back to the view.
- To view all locations with sensitive content, regardless of whether the content is permitted or not, select Show all locations and click on Apply.
Using the above actions, a user can reduce the risk of sensitive content exposure in their sources. The Sensitive Content tab is also periodically refreshed to reflect any changes you make in your sources. When certain actions are taken outside of Secure & Govern, such as moving identified sensitive content to more secure folders, the list of locations with unpermitted sensitive content will get automatically shrunk down.
Remediate Unpermitted Sensitive Content
Users can also choose to shrink the footprint of unpermitted sensitive content in an Egnyte Connect source. For example, files with sensitive employee information that belong in the Human Resources folder may have been accidentally copied to several publicly shared folders. To avoid a potential leak of this information, a user may choose to either delete these files or move them to a location within the Human Resources folder.
- In the Sensitive Content tab, select the filter to display only those locations with unpermitted content.
- Click on a folder location that needs that needs to be remediated. Users can also select multiple folders in list view.
-
To remediate all the contents of a location, click on the Manage dropdown in the Details pane. Actions available are:
- Move File - allows the user to move the file(s) to another location on the same source
- Delete file - allows the user to delete the file(s)
-
Request Review - allows the user to request that Data Owners for that location review the sensitive content
To allow reviews, the following permissions must be enabled in Settings -> Roles:
- Data Owner Role -> Sensitive Content -> Users can Fix Sensitive Locations
- Data Owner Role -> Data Owners -> Request Sensitive Content reviews from Data Owners
-
When moving or deleting content in the Sensitive Content View, users can specify which files in that location should be acted on. Options are:
- Files that match only the currently filtered policies: This will only move/delete files that ONLY match the current filter
- Files that match the currently filtered and any other policies: This will move/delete files that match the current filter or any other policies
- All files in the location: This will move or delete all files in the location, even if they do not have sensitive content.
- Additionally, the user will have the option to customize the message in the stub file if that option is selected.
Clicking on the filtered policies or other matched policies link will show which policies are included.
Requesting a review of the sensitive content will send an email to all Data Owners assigned to that location. They will be able to mark the review as completed under the Reviews section on the right side of the window.
-
When moving or deleting content in the Sensitive Content View, users can specify which files in that location should be acted on. Options are:
View Detected Content and Associated Actions
-
Click on Show Detected Content view.
-
Click the menu button on the line of the file to remediate and select the desired option.
-
View matches: Click on View matches to view the matching files.
-
Move file: To move a file, click on select location and select the location to move a file to and click on Move file. The user may choose to leave behind stub files explaining the remediation.
The folder the user selects will be automatically permitted to contain the type of content in these files. For example, if they choose to move files matched by the PCI-DSS policy, the destination folder will be now automatically permitted to contain PCI-DSS content.
-
Delete file: To delete a file, click on Delete file and confirm the remediation to move the unpermitted content to trash and click Delete.
The user may choose to leave stub files behind in the folders to explain the missing content. These stubs are text files with the same names as the deleted files, but with just a simple message indicating the remediation.
Once the user confirms either move or delete action, the unpermitted content will be removed from the selected locations. These locations will be removed from their view as they now only contain permitted sensitive content, if any. However, if some unpermitted content is found again in any of these locations, such locations will come back to the view. -
Report incorrect match: Click on Report incorrect match and confirm the action.
- Open file: Click on Open file to open the file in Web UI’s file preview.
-
View matches: Click on View matches to view the matching files.