Skip Navigation

View the file inventory to identify sensitive files

is installed on your device, the endpoint trawling process will automatically begin to discover all the files on the device that contain the sensitive data types as specified in the information protection policies. The files that get flagged as containing sensitive organizational documents are added to the file inventory. The file inventory lets you see the number and type of sensitive documents in your environment, as well as what users and devices have access to sensitive data for risk assessment. You can also group the File Inventory list by users, devices, and data types.
The trawling process may take several hours to fully complete after
is installed.
The following permissions are required in order to view the file inventory:
  • Read file summary
  • List and read policies
  1. In the management console, on the menu bar, click
    CylanceAVERT > File Inventory
    file inventory is a list of all the files that contain sensitive data types, as specified in the information protection policies, that were discovered during the file trawling process. The supported file types are .pdf, .ooxml (
    Microsoft Word
    , and
    ), .txt, .rtf, .zip,  and .csv. The following table explains the information that is displayed in the file inventory list.
    File name
    This is the name of the file.
    File size
    This is the size of the file in KB
    Info types
    This is the information type that the file belongs to.
    Data types
    This is the number of sensitives data types that were found in the file.
    This is the number of users that have access to the file.
    This is the number of devices that have access to the file.
    This is the policy or policies that this file is a part of.
    This is the file type. The supported file types are .pdf, .ooxml (
    Microsoft Word
    , and
    ), .txt, .rtf, .zip,  and .csv.
    There is no pagination for this list, you can scroll to load more results or use the filter options.
    Once the initial trawling process is competed,
    will regularly poll to check for new sensitive data. If a file is only partially scored and sensitive information was detected, an icon displays beside the file in the table and detailed views with an alert stating that the file was only partially analyzed.
  2. Do any of the following:
    • To filter the file name or info types columns, click The Column filter icon in the column heading.
    • To change which columns are displayed, click The Column change icon on the right of the column headings.
    • To group the data by users, devices, or data types, select the grouping from the drop-down menu. From the group file inventory view, you can click on an item to display detailed information for that group.
    You can view the file name and attributes in the file inventory, but file snippets and full file access are not supported.
  3. You can click on an item in the file inventory to display the file details menu. From this menu, you can see the file details, the users with access to the file, the devices with access to the file, the data types found in the file, and the policies that the file violates.