Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The dashboard will display a number of options for quickly viewing scan results. It is recommended that you use the matches "Unprotected Matches by userEndpoint," which will generate a graph on the top 10 users' computers in your group. This option allows you to quickly zero in on those users with the most sensitive information. These are the people you should try to work with to remove the data each quarter.

...

When opened, the graph will resemble the one below. There will be a key with the UTLN and number of matches for each user (not shown here)the computer name - you can find out the owner's details on the next page. You can click on any UTLN computer's area of the chart to see a list of all their matches. 

...

The list of results for the individual user computer will open. If there are results you recognize as false positives, you can remove them from the list. This will help you get a better sense of who has sensitive data and if you should be talking to that particular user. Right click to choose "Remove" and then "Exclude Rows".

...