Skip to main content

 

Druva Documentation

Compliance page

inSync Cloud Editions: File:/tick.png Elite Plus File:/cross.png Elite File:/cross.png Enterprise File:/cross.png Business

Overview

This page displays the information about the compliance policies that you have configured with inSync Compliance.

Filter violations by compliance policy

You can filter the violations for a compliance policy, by selecting the policy name from the list beside the Compliance Dashboard.

Search User

You can search for user information in inSync by typing the email address in the Search box located at the top-right corner of the Compliance page.

Compliance Summary

A compliance violation within inSync is occurrence of  sensitive data in a file or email. To know about inSync Compliance, read About inSync Compliance.

The following table lists the fields in the Compliance Summary area.

Field Description
Active Violations The sum of the active violations of files and emails, including the sum of the different versions of the current compliance configuration.
Quarantined Violations The sum of the quarantined violations of the files and emails, including the different versions count for the current compliance configuration.
Non-Compliant Users The sum of the active violations  of all the files and emails reported for the user, including the versions count for current compliance configurations.
Users Under Compliance File and email violation for the active policy of a customer based on the data type and profile of the policy.

Top Non-Compliant Policies

Non-compliant policies area.png

If there are more than 5 policy violations, then the Top Non-Compliant Policies area specifies that out of all the configured compliance policies, top 5 policies that have the most number of violations across all profiles, all sensitive data, and all policy templates.

If there are less than 5 policy violations, then the Top Non-Compliant Policies area specifies all the policies that are violated. inSync calculates the count displayed against each non-compliant policy as follows:

  1. Fetches all the compliance policies configured for the customer.
  2. Fetches the file and email violation count per compliance policy for the profile ID and sensitive data type ID combination, as every policy is mapped to a profile and multiple sensitive data type.
  3. Displays the top 5 policies.

Top Non-Compliant Users

Non-compliant users area.png

The following table lists the fields in the Top Non-Compliant Users area.

Field Description
Name The username of the user who violated the compliance policy.

Violations

The following table lists the fields in the Violations area. The violations list is sorted by the modification time of the file that violates the policy.

Field Description
File Violations The violations are sorted based on file violations and email violations. To see the list of non-compliant files, click File Violations.
Email Violations To see the list of non-compliant emails, click Email Violations.
Active Displays the list of active violations.
Resolved Displays the  list of resolved violations.
Quarantined Displays the list of Quarantined violations.
File name The name of the file that violated the compliance policy.
Modified On The date and time when the file was last modified.
User Email The email ID of the user who violated the compliance policy.
Sensitive Data Matched The sensitive data which was identified in the file.
Policy Violated The policy that was violated.
Severity  The severity of the compliance violation. For example, Normal.
Download To download the violations for offline review, select the email or file violations and click Download.

For information about features that are provided by inSync Compliance, see About inSync Compliance.

Violation Details for a file

Click a file violation to view the violation details.

The following table lists the fields in the Violation Details dialog box.

Field Description
Date and time Total number of active violation for the file version.
File name The name and size of the of the violation file.
File Modified The date and time when the file was modified.
File Type The type of the file. For example, text file.
Path The location of the file on the endpoint.
User name The name of the inSync user on whose device or cloud app account the violation was reported. The information also includes the user's email ID and device details.
Sensitive Data Matched A comma-separated list of sensitive data that are reported.
Policy Violated A comma-separated list of compliance policies that are violated.
Severity

Severity of the violation which can be either Normal or Critical.

A file is marked as critical if the sensitive data is equal to or greater than the threshold value that is specified for a sensitive data when creating a compliance template.

Download File Click to download the file for offline review. You can also download a previous version of the file.
Resolve Click to resolve the file violation. You can resolve only the latest reported violation for the file.

Violation Details for an email

Click an email violation to view the violation details.

The following table lists the fields in the Violation Details dialog box.

Field Description
Name The subject of the email.
Sent/Received On The date and the time when the file was sent or received by the user.
From The sender of the email.
Participants List of all the participants present in a conversation in all the versions, that is, users who are marked in To, CC, and BCC fields.
Attachments Files that are attached in the entire email conversation. 
Sensitive Data Matched A comma-separated list of sensitive data that are reported.
Policy Violated A comma-separated list of compliance policies that are violated.
Severity

Severity of the violation which can be either Normal or Critical.

An email is marked as critical if the sensitive data is equal to or greater than the threshold value that is specified for a sensitive data when creating a compliance template.

Download Email  Click to download the email for offline review. 
Resolve Click to resolve the email violation. You can resolve only the latest reported violation for the email.