Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The centralized console will not be able to view, edit, or delete sensitive data. Instead, the console will only show the location of the sensitive file on the end user's machine. The Information Stewards or their delegates must work with the individual end-users to clean up any files.

Overview

Information Security recommends the following workflow to address users with the largest caches of sensitive information first. Detailed instructions on using the console follow but at a high level:

1. Identify users with the highest number of reported sensitive data matches. There are often false positives in Identity Finder, so these matches may not always be accurate. 

...

The following is a guide to using the Identity Finder Console as well as an example workflow for identifying potential sensitive information and working with users to remove it. If you are an Information Steward and your department would like to opt in to using the system, contact Information Security for more information and log-in credentials. Information Security recommends the following workflow to address users with the largest caches of sensitive information first. Detailed instructions on using the console follow but at a high level:To add end users to the console, they must have the latest edition of Identity Finder (configured for the console) on their computer. Information Stewards or their FSPs can install the software on end-user computers from this file: 
titan.tufts.ad.tufts.edu{color}software$\FSP\IdentityFinder{color}IdentityFinder Endpoint Clients for FSPs.

To begin, navigate to the Identity Finder Console page at https://tftmvmidfind.tufts.ad.tufts.edu/Console/ and log in.

...