The details related to email compliance violations to the company policies. The report lets you identify the emails, user, and data sources that violate your organization’s compliance policy. The email data can be the emails that are backed up from MAPI and Exchange Online.
For more information, see About Sensitive Data Governance.
The following table lists the fields in the Non-Compliant Email Report.
|Subject||The latest subject of the email violation.|
The email ID of the sender of the email.
|To||The email ID of the recipient of the email.|
|Email Path||The location where the email is stored.|
|Email Sent/Received Time||The date and time of sending or receiving the email.|
|Policy Violation||The name of the policy that is violated by the email.|
|Sensitive Data Found||The type of sensitive data that is found in the email.|
|User Name||The name of the inSync user for whom the violation occurred. In the case of EML files, the username that is configured on the device from where the EML files were backed up.|
|User Id||The ID of the inSync user for whom the violation occurred. In the case of EML files, the user's email ID that is configured on the device from where the EML files were backed up.|
The name of the data source on which the file resides.
|Client OS||The operating system of the device.|
|Violation Reported On||The date and time at which the violation was found in the file.|
|Resolved On||The day and time when the email violation was resolved.|
|Resolution Details||The details of the resolution of the email violation. For example, Auto Resolved or marked as Acceptable Risk.|
|Additional Comments||Any additional info added by the administrator.|