The details related to file compliance violations to the company policies. The report lets you identify the user, data sources, and files that violate your organization’s compliance policy.
The end-user data can be across any of the following data sources:
- Endpoints such as laptops, desktops, iOS devices, and Android devices
- OneDrive from Microsoft 365 services
For more information, see About Sensitive Data Governance.
The following table lists the fields in the Non-Compliant File Report.
The name of the non-compliant file.
The file path from the respective endpoint.
|The type of non-compliant file.
|File Modified On
|The date and time when the file was last modified.
|The name of the policy that is violated by the file.
|Sensitive Data Found
|The type of sensitive data that is found in the file.
|The name of the inSync user for whom the violation occurred.
|The ID of the inSync user for whom the violation occurred.
The name of the data source on which the file resides.
|Match Found Timestamp
|The date and time at which the violation is found in the file.
|The day and time when the file violation was resolved.
|The details of the resolution of the file violation. For example, Auto Resolved or marked as Acceptable Risk.