Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Once you have logged in select your division from the left hand column. Identity Finder refers to these group names as "Tags." Here you can view all the computers currently reporting Identity Finder results from your group to the console.

Image RemovedImage Added

The dashboard will display a number of options for quickly viewing scan results. It is recommended that you use the "Unprotected Matches by Endpoint," which will generate a graph on the top 10 users' computers in your group. This option allows you to quickly zero in on those users with the most sensitive information. These are the people you should try to work with to remove the data each quarter.

...