Once you reach this point, you may find only 5 to 20 percent of your network shares remain, so it might not be worth the effort to go further. With ROT and sensitive data addressed, you can move on to addressing records … or not. Related Article: Do You Know What's In Your File Shares? Step 3: Address Records It’s quite time intensive, even with out of the box rules, because the goal is to find the sweet spot between too broad and too narrow, and that can take many iterations. But suffice it to say, you’ll use a combination of out of the box and customized rules for identifying sensitive data using pattern matching (e.g., #-#-# as a pattern suggests a social security number may be present).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |