Skip to main content

How can we help you?

Druva Documentation

Compliance page

License editions: To understand the applicable license editions, see Plans & Pricing.

Overview

This page displays the information about the compliance policies that you have configured with inSync Sensitive Data Governance.

Access path

Click the G_Bar1.jpg icon to access the Global Navigation Panel and select Sensitive Data Governance. The Compliance page is displayed.

Compliance Summary

Compliance summary.png

A compliance violation within inSync is occurrence of sensitive data in a file or email. To know about inSyncSensitive Data Governance, read About inSyncSensitive Data Governance.

The following table lists the fields in the Compliance Summary area.

Field Description
Active Violations The sum of the active violations of files and emails, including the sum of the different versions of the current compliance configuration.
Quarantined Violations The sum of the quarantined violations of the files and emails, including the different versions count for the current compliance configuration.
Non-Compliant Users The sum of the active violations of all the files and emails reported for the user, including the versions count for current compliance configurations.
Users Under Compliance File and email violation for the active policy of a customer based on the data type and profile of the policy.

Top Non-Compliant Policies

top non compliant policies.png

If there are more than 5 policy violations, then the Top Non-Compliant Policies area specifies that out of all the configured compliance policies, top 5 policies that have the most number of violations across all profiles, all sensitive data, and all policy templates.

If there are less than 5 policy violations, then the Top Non-Compliant Policies area specifies all the policies that are violated. inSync calculates the count displayed against each non-compliant policy as follows:

  1. Fetches all the compliance policies configured for the customer.
  2. Fetches the file and email violation count per compliance policy for the profile ID and sensitive data type ID combination, as every policy is mapped to a profile and multiple sensitive data type.
  3. Displays the top 5 policies.

Top Non-Compliant Users

top non compliant users1.png

The following table lists the fields in the Top Non-Compliant Users area.

Field Description
Name The username of the user who violated the compliance policy.

File Violations

file violations.png

Click the File Violations tab to view the file violations. The following table lists the fields in the File Violations area. The violations list is sorted by the modification time of the file that violates the policy.

Field Description
Active Displays the list of active violations. This tab opens by default.
File Name Displays the name of the violated file. critical violation icon.png icon beside the file name denotes that it is a critical violation.
Modified On The date and time when the file was last modified.
User Name of the user who owns the file. user on leagal hold.png icon beside the user name denotes that the user is on legal hold. 
Sensitive Data Matched The sensitive data which was identified in the file.
Policy Violated The policies that were violated.
Resolved Displays the list of resolved violations.
Quarantined Displays the list of Quarantined violations.
File name The name of the file that violated the compliance policy.
Modified On The date and time when the file was last modified.
User Email The email ID of the user who violated the compliance policy.
Sensitive Data Matched The sensitive data which was identified in the file.
Policy Violated The policy that was violated.
Resolved On The date and time when the violation was resolved. This column is displayed only on the Resolved tab.
Resolution Details The option that was selected to resolve the violation. This column is displayed only on the Resolved tab.
Quarantined On The date and time when the violation was quarantined. This column is displayed only on the Quarantined tab.

For information about features that are provided by inSyncSensitive Data Governance, see About inSyncSensitive Data Governance.

Violation Details for a file

Click a file violation to view the violation details.

file violation preview2.png

The following table lists the field on the details page.

Field Description
Details section
Username The name of the inSync user on whose device or cloud app account the violation was reported.
Device Name The data source where the violation was reported.
Modified On The date and time when the file was last modified.
Path The location of the file on the data source.
User email Email of the user on whose data source the violation was found.
Type The type of the violated file.
Size The size of the violated file.
Files in Violation The count of violated files in the archive. This field is only displayed for archive files.
Download Details  Click to download a list of the violated files in CSV format. The CSV contains the file name, file path, file size in bytes, the sensitive data that is violated by the file, and the severity of the violation. This field is only displayed for archive files.
Violations section
File name The name and size of the violated file. This field is only displayed for archive files. Mouse-over the file path icon.png icon to view the path of the file. 
Sensitive Data Matched The sensitive data that was found in the file.  Click to view more details of the sensitive data. critical violation icon.png icon beside the name denotes that it is a critical violation.
Policy Violated A comma-separated list of compliance policies that are violated.
Violation Preview

Displays a preview of the content that violates the sensitive data and its surrounding text. The violated text is highlighted in bold with the surrounding content to help you quickly view and locate the violation.

By default, inSync provides a preview of 3 violations for the sensitive data. Click Show more to view more occurrences of the violation in that file.  

  • inSync displays a maximum of 15 violation previews.
  • inSync does not display violation previews for users with privacy settings enabled.

Email Violations

email violation listing.png

Click the Email Violations tab to view the email violations. The following table lists the fields in the Email Violations area. The violations list is sorted by the modification time of the file that violates the policy.

Field Description
Active Displays the list of active violations. This tab opens by default.
Subject Displays the name of the violated file. critical violation icon.png icon beside the subject denotes that it is a critical violation.
Sent/Received On The date and time when the email was sent or received.
From The user who sent or received the email.
Sensitive Data Matched The sensitive data which was identified in the email.
Policy Violated The policies that were violated.
Resolved Displays the list of resolved violations.
Quarantined Displays the list of Quarantined violations.
Resolved On The date and time when the violation was resolved. This column is displayed only on the Resolved tab.
Resolution Details The option that was selected to resolve the violation. This column is displayed only on the Resolved tab.
Quarantined On The date and time when the violation was quarantined. This column is displayed only on the Quarantined tab.

Violation Details for an email

Click an email violation to view the violation details.

email violation details2.png

The following table lists the field on the details page.

Field Description
Metadata section
Sent/Received On The date and time when the email was sent or received.
Participants The users who were marked in the violated email. This list includes users from From, ToCC, and BCC fields. 
From The name of the user who sent the email.
Attachments The list of attachments in the email.
Size The size of the violated file.
Files in Violation The count of violated files in the archive. This field is only displayed for archive files.
Download Details  Click to download a list of the violated files in CSV format. The CSV contains the file name, file path, file size in bytes, the sensitive data that is violated by the file, and the severity of the violation. This field is only displayed for archive files.
Violations section
Sensitive Data Matched The sensitive data that was found in the email.  Click to view more details of the sensitive data. 
Policy Violated A comma-separated list of compliance policies that are violated.
Violation Preview

Displays a preview of the content that violates the sensitive data and its surrounding text. The violated text is highlighted in bold with the surrounding content to help you quickly view and locate the violation.

By default, inSync provides a preview of 3 violations for the sensitive data. Click Show more to view more occurrences of the violation in that file.  

  • inSync displays a maximum of 15 violation previews.
  • inSync does not display violation previews for users with privacy settings enabled.