Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The following is a guide to using the Identity Finder Console as well as an example workflow for identifying potential sensitive information and working with users to remove it. If you are an Information Steward and your department would like to opt in to using the system, contact Information Security for more information and log-in credentials.

Information Security recommends the following workflow to address users with the largest caches of sensitive information first. Detailed instructions on using the console follow but at a high level:

1. Identify users with the highest number of reported sensitive data matches. There are often false positives in Identity Finder, so these matches may not always be accurate.

2. Review the file locations of search results for the top users you identified. Information Security recommends reviewing the top 5-10 users or reviewing all users with a certain number of matches or above. Use your judgement on whether these files contain University data or personal records. In either case, you should contact the user to inform them that they have this data; however, University data is of a higher priority from an institutional perspective. If you are sure that a file does not contain sensitive data, you can exclude it from the results or add it to the "Global Ignore List."

Navigate to the Identity Finder Console page at https://tftmvmidfind.tufts.ad.tufts.edu/Console/ and log in.

Once you have logged in , select your division from the left hand column. Identity Finder refers to these group names as "Tags." Here you can view all the computers currently reporting Identity Finder results from your group to the console.

Open the "Reports" tab and from the "Reports List" choose "All Findings Grouped By User".

...