Views:
Manage, locate, and take action on assets with sensitive data with Data Inventory. Assets with sensitive data are defined by the data policies created for your organization. The Data Inventory list updates automatically when data policies are created or updated, and when assets are added or removed to the managed endpoint groups or network locations specified in the data policies.
Note
Note
You must enable the Data Security Sensor and Browser Extension settings on an endpoint security policy to send activity data for state-of-the-art threat detections and alerts (required for advanced XDR detections and Workbench alerts). This setting requires credits to enable. For more information, see Enable Data Security sensors on managed endpoints.
The following table lists the actions available in Data Inventory:
Actions
Descriptions
Investigate all files with sensitive data
Do any of the following:
  • Click All files in the top left of the Data Inventory page to display a list of all files with sensitive data.
  • In the asset list, click a file name to open the Data Lineage screen to track the file's movements in your organization. For more information, see Track data lineage.
  • Expand a file to view the following information:
    • Original sensitive data: The name of the sensitive file before any renaming or formatting changes, for example being compressed into zip file. If multiple files are compressed into a zip file, their original names are also listed here.
    • The name, type, and risk score of the asset where the file was found.
Investigate local devices with sensitive data
Click the Local devices link and then do any of the following:
  • Click an asset name to view details about the asset in Attack Surface Discovery. For more information, see Attack Surface Discovery.
  • Click the number link in the Sensitive files column to view a list of sensitive files on the device.
  • Search for an asset by name.
  • Filter search results by risk score (All, High, Medium, or Low).
Investigate cloud assets with sensitive data
Click the Cloud assets link and then do any of the following:
  • Click an asset name to view details in Attack Surface Discovery. For more information, see Attack Surface Discovery.
  • Click the number in the 3rd party tags column to view the 3rd party tags applied to the asset.
Additional actions
  • Search for files by asset name, accessed by, file name, and location.
  • Click Add Filter to filter results.
  • Click Export to export all assets to a CSV file, based on the current filters set in the current view.
  • Click Customize Columns (columnDisplayIcon=20230614105421.jpg) to choose which columns display in the list.