What information does this report provide
This report displays a consolidated view of the file compliance violations to the company policies within a specified period.
How does the report help
This report can help you identify users, data sources, and files that violate your organization’s compliance policy.
The end-user data can be across any of the following data sources:
Endpoints such as laptops, desktops, iOS devices, and Android devices
OneDrive from Microsoft 365 services
For more information, see About Sensitive Data Governance.
With this information available well in time, you can take corrective actions.
To access the report
You must either be a Druva Cloud Administrator or an administrator with View Reports rights assigned and the Sensitive Data Governance feature enabled.
Go to Druva Cloud Platform Console Global Navigation > Reports > Data Governance > Non-Compliant File Report
Using the report
📝 Note:
By default, the period selected for the report is 18 months from the current date. For example, if today is December 1, 2023, the report displays data from June 1, 2022 to December 01, 2023.
The data in the reports is synced periodically. The report shows the Data last updated details.
The Non-Compliant File Report comprises the following information:
Non-Compliant Files details
Field | Description |
File Name | The name of the non-compliant file. |
File Path | The file path from the respective endpoint. |
File Extension | The file extension of the non-compliant file. |
File Modified On | The date and time when the file was last modified. |
Policy Violation | The name of the policy that is violated by the file. |
Sensitive Data Found | The type of sensitive data that is found in the file. |
Severity | The details of the severity of violation. |
User Name | The name of the inSync user for whom the violation occurred. |
The email ID for which the violation occurred. | |
Data Source | The name of the data source on which the file resides. |
Violation Reported On | The date and time at which the violation is found in the file. |
Resolved On | The day and time when the file violation was resolved. |
Resolution Details | The details of the resolution of the file violation. For example, Auto Resolved or marked as Acceptable Risk. |
Additional Comments | Additional information about the violation. |
Pending Actions | Non-Compliant files on which no action is taken. |
User Resolution | Details of action taken by the user on the non-compliant file. |
User Comments | User comments about the violation. |
SHA1 Checksum | The SHA1 Checksum value of the violated files. |
Actions
To leverage the report, you can perform the following actions:
Manage Reports: Learn how to subscribe to reports, apply filters, email reports, and edit existing subscriptions.
Custom Report Creation: Learn how to customize, and manage your own reports.