Compliance page
- Last updated
- Save as PDF
Overview
This page displays the information about the compliance policies that you have configured with inSync Sensitive Data Governance.
Access path
Click the icon to access the Global Navigation Panel and select Sensitive Data Governance. The Compliance page is displayed.
Compliance Summary
A compliance violation within inSync is occurrence of sensitive data in a file or email. To know about inSyncSensitive Data Governance, read About inSyncSensitive Data Governance.
The following table lists the fields in the Compliance Summary area.
Field | Description |
---|---|
Active Violations | The sum of the active violations of files and emails, including the sum of the different versions of the current compliance configuration. |
Quarantined Violations | The sum of the quarantined violations of the files and emails, including the different versions count for the current compliance configuration. |
Non-Compliant Users | The sum of the active violations of all the files and emails reported for the user, including the versions count for current compliance configurations. |
Users Under Compliance | File and email violation for the active policy of a customer based on the data type and profile of the policy. |
Top Non-Compliant Policies
If there are more than 5 policy violations, then the Top Non-Compliant Policies area specifies that out of all the configured compliance policies, top 5 policies that have the most number of violations across all profiles, all sensitive data, and all policy templates.
If there are less than 5 policy violations, then the Top Non-Compliant Policies area specifies all the policies that are violated. inSync calculates the count displayed against each non-compliant policy as follows:
- Fetches all the compliance policies configured for the customer.
- Fetches the file and email violation count per compliance policy for the profile ID and sensitive data type ID combination, as every policy is mapped to a profile and multiple sensitive data type.
- Displays the top 5 policies.
Top Non-Compliant Users
The following table lists the fields in the Top Non-Compliant Users area.
Field | Description |
---|---|
Name | The username of the user who violated the compliance policy. |
File Violations
Click the File Violations tab to view the file violations. The following table lists the fields in the File Violations area. The violations list is sorted by the modification time of the file that violates the policy.
Field | Description |
---|---|
Active | Displays the list of active violations. This tab opens by default. |
File Name | Displays the name of the violated file. ![]() |
Modified On | The date and time when the file was last modified. |
User | Name of the user who owns the file. ![]() |
Sensitive Data Matched | The sensitive data which was identified in the file. |
Policy Violated | The policies that were violated. |
Resolved | Displays the list of resolved violations. |
Quarantined | Displays the list of Quarantined violations. |
The name of the file that violated the compliance policy. | |
Modified On | The date and time when the file was last modified. |
User Email | The email ID of the user who violated the compliance policy. |
Sensitive Data Matched | The sensitive data which was identified in the file. |
Policy Violated | The policy that was violated. |
Resolved On | The date and time when the violation was resolved. This column is displayed only on the Resolved tab. |
Resolution Details | The option that was selected to resolve the violation. This column is displayed only on the Resolved tab. |
Quarantined On | The date and time when the violation was quarantined. This column is displayed only on the |
For information about features that are provided by inSyncSensitive Data Governance, see About inSyncSensitive Data Governance.
Violation Details for a file
Click a file violation to view the violation details.
The following table lists the field on the details page.
Field | Description |
---|---|
Details section | |
Username | The name of the inSync user on whose device or cloud app account the violation was reported. |
Device Name | The data source where the violation was reported. |
Modified On | The date and time when the file was last modified. |
Path | The location of the file on the data source. |
User email | Email of the user on whose data source the violation was found. |
Type | The type of the violated file. |
Size | The size of the violated file. |
Files in Violation | The count of violated files in the archive. This field is only displayed for archive files. |
Download Details | Click to download a list of the violated files in CSV format. The CSV contains the file name, file path, file size in bytes, the sensitive data that is violated by the file, and the severity of the violation. This field is only displayed for archive files. |
Violations section | |
The name and size of the violated file. This field is only displayed for archive files. Mouse-over ![]() |
|
Sensitive Data Matched | The sensitive data that was found in the file. Click to view more details of the sensitive data. ![]() |
Policy Violated | A comma-separated list of compliance policies that are violated. |
Violation Preview |
Displays a preview of the content that violates the sensitive data and its surrounding text. The violated text is highlighted in bold with the surrounding content to help you quickly view and locate the violation. By default, inSync provides a preview of 3 violations for the sensitive data. Click Show more to view more occurrences of the violation in that file.
|
Email Violations
Click the Email Violations tab to view the email violations. The following table lists the fields in the Email Violations area. The violations list is sorted by the modification time of the file that violates the policy.
Field | Description |
---|---|
Active | Displays the list of active violations. This tab opens by default. |
Subject | Displays the name of the violated file. ![]() |
Sent/Received On | The date and time when the email was sent or received. |
From | The user who sent or received the email. |
Sensitive Data Matched | The sensitive data which was identified in the email. |
Policy Violated | The policies that were violated. |
Resolved | Displays the list of resolved violations. |
Quarantined | Displays the list of Quarantined violations. |
Resolved On | The date and time when the violation was resolved. This column is displayed only on the Resolved tab. |
Resolution Details | The option that was selected to resolve the violation. This column is displayed only on the Resolved tab. |
Quarantined On | The date and time when the violation was quarantined. This column is displayed only on the |
Violation Details for an email
Click an email violation to view the violation details.
The following table lists the field on the details page.
Field | Description |
---|---|
Metadata section | |
Sent/Received On | The date and time when the email was sent or received. |
Participants | The users who were marked in the violated email. This list includes users from From, To, CC, and BCC fields. |
From | The name of the user who sent the email. |
Attachments | The list of attachments in the email. |
Size | The size of the violated file. |
Files in Violation | The count of violated files in the archive. This field is only displayed for archive files. |
Download Details | Click to download a list of the violated files in CSV format. The CSV contains the file name, file path, file size in bytes, the sensitive data that is violated by the file, and the severity of the violation. This field is only displayed for archive files. |
Violations section | |
Sensitive Data Matched | The sensitive data that was found in the email. Click to view more details of the sensitive data. |
Policy Violated | A comma-separated list of compliance policies that are violated. |
Violation Preview |
Displays a preview of the content that violates the sensitive data and its surrounding text. The violated text is highlighted in bold with the surrounding content to help you quickly view and locate the violation. By default, inSync provides a preview of 3 violations for the sensitive data. Click Show more to view more occurrences of the violation in that file.
|