The details related to file compliance violations to the company policies. The report lets you identify the user, data sources, and files that violate your organization’s compliance policy.
The end-user data can be across any of the following data sources:
- Endpoints such as laptops, desktops, iOS devices, and Android devices
- OneDrive from Microsoft 365 services
For more information, see About Sensitive Data Governance.
The following table lists the fields in the Non-Compliant File Report.
The name of the non-compliant file.
The file path from the respective endpoint.
|File Type||The type of non-compliant file.|
|File Modified On||The date and time when the file was last modified.|
|Policy Violation||The name of the policy that is violated by the file.|
|Sensitive Data Found||The type of sensitive data that is found in the file.|
|User Name||The name of the inSync user for whom the violation occurred.|
|User Id||The ID of the inSync user for whom the violation occurred.|
The name of the data source on which the file resides.
|Match Found Timestamp||The date and time at which the violation is found in the file.|
|Resolved On||The day and time when the file violation was resolved.|
|Resolution Details||The details of the resolution of the file violation. For example, Auto Resolved or marked as Acceptable Risk.|