Identity Finder - Getting Started with Identity Finder for IT Administrators

This page contains video training along with links to supplemental KnowledgeBase articles for IT administrators using the Identity Finder Console.

The Restricted Data Management policy requires all campus departments to report the number of computing devices storing Social Security Numbers to the Chief Information Security Officer.

Identity Finder is a tool used across campus to scan workstations and servers for the existence of restricted data, like Social Security Numbers. Identity Finder is a very powerful tool that can look complex at first glance, but IT Security has created a five part training series to help you become a successful Identity Finder administrator.

Each part in the series includes a video walkthrough along with a KnowledgeBase article describing the relevant content. You will first learn how to access the Identity Finder Console and get a brief overview of its major functions. You will then explore Policies, Scheduled Tasks and the actual process of scanning your environment. Once your scans have completed, remediation strategies, should you choose to perform remediation, will be discussed. A guide to completing the required Restricted Data Management report is the final part of the series.

For additional training resources, please consult the IT Security KnowledgeBase. The KnowledgeBase contains many more documents than what you see listed here, for a wide variety of Identity Finder topics. If you do not find answers to your questions there, please do not hesitate to contact the Help Desk.

NOTE:

If you experience problems using the embedded playlist, please use the links below to view the individual videos. We apologize for the inconvenience.

  1. An Introduction
  2. The Console
  3. Policies, Scheduled Tasks and Scans
  4. Scan Remediation
  5. Reporting Restricted Data




The following KnowledgeBase articles correspond to each of the five parts of the above video series.
  1. Identity Finder (Win) - Installing Identity Finder Enterprise Client
  2. Identity Finder (Win) - How Console Data is Generated
  3. Identity Finder - Creating and Using Policies
  4. Identity Finder - Effective Remediation Strategies with Identity Finder
  5. Reporting Restricted Data
Finally, if you are experiencing problems or have questions about using the Identity Finder Console or client, please consult Identity Finder - Administrator FAQ or contact the DoIT Help Desk.



Keywords:identity finder "getting started" idf administrator rdd restricted data discovery pii policy   Doc ID:49577
Owner:Andy S.Group:Office of Campus Information Security
Created:2015-03-25 16:12 CDTUpdated:2015-05-14 16:42 CDT
Sites:DoIT Help Desk, Office of Campus Information Security
Feedback:  0   0