Welcome to
Help Desk

Product Updates
Training
Support
Ideas Contact Support

Secure & Govern Reporting Center

Follow

The Reporting Center contains  all the reports specific to Egnyte Secure & Govern classified into subcategories. Entitled users can view the reporting center and generate reports based on parameters or filters provided by them. The reports will be generated and saved within the reporting center and can be exported or deleted by the user.
The Reporting Center is classified into the following subdivisions: 

  • Permissions Management
    • Duplicate Permissions
    • Unused Permissions
  • Threat Management
    • User Activity Issues

Permissions Management

Permissions management consists of reports governing user access controls, data governance and associated permissions. These reports provide the user the necessary information to ensure that their data is secure, private and accessible by the right users/groups. 

Duplicate Permissions

The Duplicate Permissions report provides insights into the duplicate permissions associated with the users and the groups for the selected folder(s). 

The users can view, export, and delete these reports from Reports -> Permissions Management -> Duplicate Permissions

Duplicate permission report - new report.png

Unused Permissions

The Unused Permissions report under Permissions management provides the users with the ability to determine and manage user permissions that haven’t been used in the selected time frame. 

The report can be created for both individual and group permissions. The users can view, export, and delete the reports from Reports -> Permissions Management -> Unused Permissions

Unused permissons report - New report button.png

Threat Management

Threat management comprises the reports providing details on the security threats. By monitoring and analyzing the issues covered in these reports, the organizations can easily identify and manage potential security threats.

User Activity Issues Report

The User Activity Issues report provides insights into the suspicious activities performed by the users. The report includes the count of every issue type selected along with the deep dive into the issues’ details.

The report can be created from Reports -> Threat Management -> User Activity Issues

User activity issues report - new report button.png

Was this article helpful?
0 out of 0 found this helpful

For technical assistance, please contact us.