View the file inventory to identify sensitive files
When
CylanceAVERT
is installed on your device, the endpoint trawling process will automatically begin to discover all the files on the device that contain the sensitive data types as specified in the information protection policies. The files that get flagged as containing sensitive organizational documents are added to the file inventory. The file inventory lets you see the number and type of sensitive documents in your environment, as well as what users and devices have access to sensitive data for risk assessment. You can also group the File Inventory list by users, devices, and data types.
The trawling process may take several hours to fully complete after
CylanceAVERT
is installed.The following permissions are required in order to view the file inventory:
- Read file summary
- List and read policies
- In the management console, on the menu bar, clickCylanceAVERT > File Inventory.TheCylanceAVERTfile inventory is a list of all the files that contain sensitive data types, as specified in the information protection policies, that were discovered during the file trawling process. The supported file types are .pdf, .ooxml (Microsoft Word,Excel, andPowerPoint), .txt, .rtf, .zip, and .csv. The following table explains the information that is displayed in the file inventory list.ItemDescriptionFile nameThis is the name of the file.File sizeThis is the size of the file in KBInfo typesThis is the information type that the file belongs to.Data typesThis is the number of sensitives data types that were found in the file.UsersThis is the number of users that have access to the file.DevicesThis is the number of devices that have access to the file.PoliciesThis is the policy or policies that this file is a part of.TypeThis is the file type. The supported file types are .pdf, .ooxml (Microsoft Word,Excel, andPowerPoint), .txt, .rtf, .zip, and .csv.There is no pagination for this list, you can scroll to load more results or use the filter options.Once the initial trawling process is competed,CylanceAVERTwill regularly poll to check for new sensitive data. If a file is only partially scored and sensitive information was detected, an icon displays beside the file in the table and detailed views with an alert stating that the file was only partially analyzed.
- Do any of the following:
- To filter the file name or info types columns, click in the column heading.
- To change which columns are displayed, click on the right of the column headings.
- To group the data by users, devices, or data types, select the grouping from the drop-down menu. From the group file inventory view, you can click on an item to display detailed information for that group.
You can view the file name and attributes in the file inventory, but file snippets and full file access are not supported. - You can click on an item in the file inventory to display the file details menu. From this menu, you can see the file details, the users with access to the file, the devices with access to the file, the data types found in the file, and the policies that the file violates.