Identity Finder (Win) - Taking Action on the Scan Results

This document discusses general considerations evaluating the results of scans. More detailed information can be found in the Identity Finder Help documentation in the Viewing Search Results and Protecting Personal Information Topics. All documentation was performed with Identity Finder version 6.2.0.0. Note: All data shown is false.

Viewing Search Results

After a scan is finished, Identity Finder returns a user back to its Main window.

1.jpg

The main window consists of two parts: a results pane on the left and the preview pane on the right. The purpose of these panes is to assist you in deciding what to do with the possible identity matches found.

The results pane lists all the files, their location on the computer, and other attributes where possible identity data (e.g. SSN, CCN) was found.

If more than one identity match is found in a file, the location can be expanded (using the + sign) to show each individual match found.

As a match within a file is highlighted in the left pane, the preview pane highlights the possible identity match and the file content around the possible match. This allows you to evaluate whether or not the data is a false positive (e.g. looks like identity data: a nine digit number conforming to SSN format, but in fact is not idenitity data) or is truly valid identity data that must be secured.

Taking Action on Scan Results

Across the top of the Main Window, there are buttons that allow for certain actions (e.g. shred, ignore) to be taken on the data highlighted in the results screen.

2.jpg

An action can be taken on a single file or an action can be taken on a multiple files by selecting the check box to the left of the file location and then selecting the action.

Shred:
When a location has sensitive identity match information in it and you wish to remove it from your computer, you should utilize the Shred feature. Shred is great when you no longer need the personal information or any other data in the item.

Scrub:
When a location has sensitive identity match information in it and you wish to keep the item but remove the personal information only, you should utilize the Scrub feature. Scrub is great when you no longer need the personal information but want to keep the original item. Scrub only works for certain file types e.g. text. This feature is also known as Redact.

Secure:
When a location has sensitive identity match information in it and you wish to keep the item and securely keep the personal information, you should utilize the Secure feature. Secure is great when you still need the personal information and original item. This feature is also known as encrypt. By default, we have turned off this feature of Identity Finder. Securing a file with a password, means that if the password is forgotten the data can no longer be accessed. A mechanism for password recovery should be implemented prior to using the secure feature.

Quarantine:
When a file has sensitive identity match information in it and you wish to securely move the file to another location, you should utilize the Quarantine feature. Quarantine will move your file and then shred the original so that it cannot be recovered by anyone who gains access to your computer. It is important that you quarantine files to a location that is highly secure, such as an encrypted drive or a storage device to which unauthorized individuals do not have access.

Recycle:
If a file does not have sensitive identity match information in it, but you no longer have a use for the file, you may wish to Recycle it. This is not recommended for files with identity information in them since the file can be undeleted in some circumstances.

Ignore:
If the match data found within a file location is not valid or is sample data, you can Ignore the file location. This will prevent Identity Finder from identifying that file in subsequent scans and remove it from the result pane.



Keywords:idf pii identity finder data discovery windows   Doc ID:12676
Owner:Allen M.Group:Office of Campus Information Security
Created:2009-11-16 19:00 CDTUpdated:2014-11-18 12:48 CDT
Sites:College of Agricultural & Life Sciences, DoIT Help Desk, Office of Campus Information Security
Feedback:  5   1