Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

By reviewing the top 5 to 10 highest users every quarter, you will quickly eliminate the majority of unnecessary sensitive data in your division. The highest user typically holds over 50% of the sensitive data, so by removing or white listing those files, you can reduce your risk by half almost immediately. The 10 top users should change each quarter as you work with the members of your division to remove sensitive data. 

Navigate To begin, navigate to the Identity Finder Console page at https://tftmvmidfind.tufts.ad.tufts.edu/Console/ and log in.

...

The dashboard will display a number of options for quickly viewing scan results. It is recommended that you use the matches by user, which will generate a graph on the top 10 users in your group. This option allows you to quickly zero in on those users with the most sensitive information. These are the people you should try to work with to remove the data each quarter.

When opened, the graph will resemble the one below. There will be a key with the UTLN and number of matches for each user (not shown here). You can click on any UTLN to see a list of all their matches. 

...

The list of results for the individual user will open. If there are results you recognize as false positives, you can remove them from the list. This will help you get a better sense of who has sensitive data and if you should be talking to that particular user. Right click to choose "Remove" and then "Exclude Rows".

...