Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Once you have logged in select your division from the left hand column. Identity Finder refers to these group names as "Tags." Here you can view all the computers currently reporting Identity Finder results from your group to the console.

The dashboard will display a number of options for quickly viewing scan results. It is recommended that you use the "Unprotected Matches by Endpoint," which will generate a graph on the top 10 users' computers in your group. This option allows you to quickly zero in on those users with the most sensitive information. These are the people you should try to work with to remove the data each quarter.

Image Removed

When opened, the graph will resemble the one below. There will be a key with the computer name - you can find out the owner's details on the next page. You can click on any computer's area of the chart to see a list of all their matches. There is also a key (not shown here) which shows the computer name and number of matches. You can also select a computer from this list to see a detailed list of their results. 

Image Removed

The list of results for the individual computer will open. If there are results you recognize as false positives, you can remove them from the list. This will help you get a better sense of who has sensitive data and if you should be talking to that particular user. Right click to choose "Remove" and then "Exclude Rows".

...