Table of Contents
**This is an old revision of the document!**
Data Automation Rules
Introduction
The Enterprise File Fabric's Data Automation Rules deliver (https://en.wikipedia.org/wiki/IFTTT)[IFTT] functionality for taking automated actions when events happen on your multi-cloud file system.
Data Automation Rules configured in the Enterprise File Fabric consist of an Event Trigger (e.g. File is uploaded) , tied with a set of configurable Actions (e.g. Transcode video and Media Info).
Data Automation Rules are configured a Organization Administrator.
Applies to:
- Enterprise File Fabric Appliance [Add-On] (since v1808)
See Also:
For data automation rules to be enabled the Content Discovery module must be enabled, and providers configured for content search. For more information see Content Discovery Administration.
The Data Automation Rules configuration page is accessed from the Organization menu by users with the Administrator role.
Event Types
This section outlines the available Event Types that the Enterprise File Fabric supports.
1. File is uploaded through this platform
Description: This event is triggered when a file is uploaded by a user directly on the Enterprise File Fabric. The scope of this upload can be narrowed using the Folder selector.
Available since: 2106.00
2. File is discovered on storage
Description: This event is triggered when a file is discovered directly on a storage platform under the management of the Enterprise File Fabric. A file will be discovered when a Provider Resync, Cloud Refresh or Deep Cloud Refresh is performed. This event type does not provide the 'automatic discovery' of files or folders. The scope of this upload can be narrowed using the Folder selector.
Available since: 2106.00
3. File is discovered on storage or uploaded
Description: This event is a superset of Event #1 and Event #2. Available since: 2106.00
4. File contains matches against Content Discovery Rules
Description: This event is triggered when a file has been scanned using the Content Discovery rules, and the files results contain matches against the Content Discovery rules. The scope of the type of Content Discovery classification must be selected. Available since: 2106.00
Action Types
Content Discovery
Automation rules work with Content Discovery and DLP detectors and categories. Content Detectors trigger Content Detection Categories, which raise events that trigger rules which execute actions:
Creating an Automation Rule
An automation rule consists of an event, a condition and one or more actions.
Event
Choose “Create Rule” to create an automation rule.
The only event currently supported is “Content is detected in a file”. It’s triggered when content of interest is detected in a file that is uploaded or moved.
You may create multiple automation rules with the same event type. Typically they will have different conditions but this is not required.
Condition
For a content detection event the condition is a Content Detection Category. For example “GDPR” or “North America - National Identifiers”. The condition is true (and the action will be executed) if content has been detected by a content detector that is included in the selected Content Detection Category.
Select Create Rule to begin adding actions.
Action
You may create many actions for each automation rule.
The following actions are supported:
- Email members of a role
- Send an email to an email address
- Disable file url creation
- Move the file to another folder
Actions
Email Members of a Role
This action immediately sends a notification by email to members of a role.
Configuration
- Choose one role (drop-down)
- Choose to only send to members to have access to the file
An email like the following will be sent when matching content is detected:
Send an Email to an Email Address
Disable file url creation
This action prevents the file being shared through the creation of shared links.
Configuration
- Optionally disable shared links that have already been created.
Move the file to another folder
This action moves the matched file to a nominated folder. This could be used to quarantine files that may contain sensitive data, or classify files based on specific content. Only one move to folder action is allowed per Content Detection Category.
Configuration
- Choose folder from dialog (folder must exist or can be created from dialog)
- Optionally disable shared links that have already been created.
A suffix is added to the file as it is moved which includes the date and time. This prevents subsequent updates overwriting the quarantined version. An additional optional suffix may also be added. File extensions are preserved.
For example, with an provided suffix of “_ContainsSSN” the new name for:
CreditApplication.pdf
would be:
CreditApplication_ContainsSSN_2018-08-20_22-08-24.pdf
Email notifications use the new generated file name and folder location.