Skip to main content

Non-Compliant File Report

Updated this week

What information does this report provide

This report displays a consolidated view of the file compliance violations to the company policies within a specified period.

How does the report help

This report can help you identify users, data sources, and files that violate your organization’s compliance policy.

The end-user data can be across any of the following data sources:

  • Endpoints such as laptops, desktops, iOS devices, and Android devices

  • OneDrive from Microsoft 365 services

For more information, see About Sensitive Data Governance.

With this information available well in time, you can take corrective actions.

To access the report

You must either be a Druva Cloud Administrator or an administrator with View Reports rights assigned and the Sensitive Data Governance feature enabled.

Go to Druva Cloud Platform Console Global Navigation > Reports > Data Governance > Non-Compliant File Report

Using the report


📝 Note:

By default, the period selected for the report is 18 months from the current date. For example, if today is December 1, 2023, the report displays data from June 1, 2022 to December 01, 2023.


The data in the reports is synced periodically. The report shows the Data last updated details.

The Non-Compliant File Report comprises the following information:

Non-Compliant Files details

Field

Description

File Name

The name of the non-compliant file.

File Path

The file path from the respective endpoint.

File Extension

The file extension of the non-compliant file.

File Modified On

The date and time when the file was last modified.

Policy Violation

The name of the policy that is violated by the file.

Sensitive Data Found

The type of sensitive data that is found in the file.

Severity

The details of the severity of violation.

User Name

The name of the inSync user for whom the violation occurred.

Email

The email ID for which the violation occurred.

Data Source

The name of the data source on which the file resides.

Violation Reported On

The date and time at which the violation is found in the file.

Resolved On

The day and time when the file violation was resolved.

Resolution Details

The details of the resolution of the file violation. For example, Auto Resolved or marked as Acceptable Risk.

Additional Comments

Additional information about the violation.

Pending Actions

Non-Compliant files on which no action is taken.

User Resolution

Details of action taken by the user on the non-compliant file.

User Comments

User comments about the violation.

SHA1 Checksum

The SHA1 Checksum value of the violated files.

Actions

To leverage the report, you can perform the following actions:

  • Manage Reports: Learn how to subscribe to reports, apply filters, email reports, and edit existing subscriptions.

  • Custom Report Creation: Learn how to customize, and manage your own reports.

Did this answer your question?