Manage, locate, and take action on assets with sensitive data with Data Inventory.
Assets with sensitive data are defined by the data policies created for your organization. The Data Inventory list updates automatically when
data policies are created or updated, and when assets are added or removed to the
managed endpoint groups or network locations specified in the data policies.
NoteYou must enable the Data Security Sensor and Browser Extension settings on an endpoint security policy to send activity data for state-of-the-art
threat detections and alerts (required for advanced XDR detections and Workbench alerts).
This setting requires credits to enable. For more information, see Enable Data Security sensors on managed endpoints.
|
The following table lists the actions available in Data Inventory:
|
Actions
|
Descriptions
|
|
Investigate all files with sensitive data
|
Do any of the following:
|
|
Investigate local devices with sensitive data
|
Click the Local devices link and then do any of the following:
|
|
Investigate cloud assets with sensitive data
|
Click the Cloud assets link and then do any of the following:
|
|
Additional actions
|
|
