Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
piidiscovery [2018_04_05 15:55] – [Configuration] steven | piidiscovery [2018_04_06 18:37] – v2.0 updates part 1 steven | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | # PII Discovery | + | # PII Scanning and Detection |
(available in v1803) | (available in v1803) | ||
This page covers the identification and classification of PII (Personally Identifiable Information). | This page covers the identification and classification of PII (Personally Identifiable Information). | ||
- | The Enterprise File Fabric' | + | The Enterprise File Fabric' |
[[https:// | [[https:// | ||
Line 14: | Line 14: | ||
### Scanning | ### Scanning | ||
- | The PII Discovery | + | The PII Scanning and Detection |
{{ : | {{ : | ||
Line 20: | Line 20: | ||
### Tagging | ### Tagging | ||
- | Files in which personal information is found are classified as PII with the types of PII data that they contain: | + | Files in which personal information is found are classified as PII with the types of PII data that they contain. Users with appropriate permissions can see the PII that has been found in a document on the “info” tab for that document: |
{{ : | {{ : | ||
Line 32: | Line 32: | ||
{{ : | {{ : | ||
- | The file owner, the user who uploaded the file, receives an email and a message: | + | The file owner, |
{{ : | {{ : | ||
Line 44: | Line 44: | ||
{{ : | {{ : | ||
- | Look under the “info” tab for specific PII information a document contains: | ||
- | |||
- | {{ : | ||
- | }} | ||
## Workflow | ## Workflow | ||
### Uploading | ### Uploading | ||
- | When a file or object | + | When a file is uploaded, updated or synchronized the File Fabric recognizes it as containing new content; it is a candidate for being scanned |
To be scanned the file must be located on a storage provider that has content search enabled (this is set set when the provider is created). | To be scanned the file must be located on a storage provider that has content search enabled (this is set set when the provider is created). | ||
Line 72: | Line 68: | ||
### Tagging of PII Files | ### Tagging of PII Files | ||
- | When PII is detected in a file, a tag is added to the file indicating the type of PII that was detected. | + | When PII is detected in a file, a tag is added to the file indicating the type of PII that was detected. |
{{ : | {{ : | ||
- | |||
Line 81: | Line 76: | ||
Administrators and users with PII permission are notified when a file that matches the PII rules has been detected. | Administrators and users with PII permission are notified when a file that matches the PII rules has been detected. | ||
- | |||
Users with PII permission, including administrators, | Users with PII permission, including administrators, | ||
Line 88: | Line 82: | ||
{{ : | {{ : | ||
- | The file owner, the user who uploaded the file, receives both an email and a message. | + | The file owner (the user who uploaded the file), receives both an email and a message. |
{{ : | {{ : | ||
Line 129: | Line 123: | ||
### File Information | ### File Information | ||
- | Available to uIf a file contains PII, a “Show PII matches” button is displayed on the File Manager Info tab for the file. This is available to users with PII or administration permissions. | + | If a file contains PII, a “Show PII matches” button is displayed on the File Manager Info tab for the file. This is available to users with PII or administration permissions. |
{{ : | {{ : | ||
Line 159: | Line 153: | ||
* Add Storage Providers with Content Search | * Add Storage Providers with Content Search | ||
* Give Users PII Authorization | * Give Users PII Authorization | ||
- | | + | |
* Change the Name of the PII Classification (optional) | * Change the Name of the PII Classification (optional) | ||
### 1. Enabling the Content Search Engine | ### 1. Enabling the Content Search Engine | ||
- | Content search must be enabled for PII scanning and detection to work. The content search engine scans documents for PII as they are uploaded or synchronized. The search engine is available only with the appliance and must be explicitly enabled. | + | Content search must be enabled for PII scanning and detection to work. The content search engine scans documents for PII as they are uploaded or synchronized. The search engine is available only with the Enterprise File Fabric |
Here is a link to instructions for configuring the content search engine: | Here is a link to instructions for configuring the content search engine: | ||
Line 170: | Line 164: | ||
### 2. Enabling PII Scanning and Detection in User Packages | ### 2. Enabling PII Scanning and Detection in User Packages | ||
- | PII scanning | + | PII Scanning |
* choosing “User Packages” from the hamburger menu; | * choosing “User Packages” from the hamburger menu; | ||
Line 182: | Line 176: | ||
### 3. Enable the Policy “PII Scanning & Detection” | ### 3. Enable the Policy “PII Scanning & Detection” | ||
- | An administrator can enable this features | + | An administrator can enable this feature |
{{ : | {{ : | ||
Line 192: | Line 186: | ||
{{ : | {{ : | ||
- | Files that existed before are indexes | + | Files that existed before |
Search cannot be enabled for an existing provider data source. To verify that content search is enabled for a provider, as an organizational administrator go to the Dashboard. Select the Setting gear icon to go to see the data source provider detail. The //Content index// for search setting must be set to //Yes//. | Search cannot be enabled for an existing provider data source. To verify that content search is enabled for a provider, as an organizational administrator go to the Dashboard. Select the Setting gear icon to go to see the data source provider detail. The //Content index// for search setting must be set to //Yes//. | ||
Line 214: | Line 208: | ||
Another way to give a user PII authorization is to assign the Admin role. Assigning the Admin role to a user gives several other administrative privileges and should not be done without a complete understanding of the implications. | Another way to give a user PII authorization is to assign the Admin role. Assigning the Admin role to a user gives several other administrative privileges and should not be done without a complete understanding of the implications. | ||
- | ### 6. Editing the PII Detection Rules | + | ### 6. Configuring |
A set of rules for detecting different kinds of PII is provided with the Enterprise File Fabric. These rules can be used as provided, or the administrator can remove or change rules to meet the organization’s specific requirements. | A set of rules for detecting different kinds of PII is provided with the Enterprise File Fabric. These rules can be used as provided, or the administrator can remove or change rules to meet the organization’s specific requirements. |