After you configure Activate and add inventories and data sources, you can analyze the data in your environment for potential risk due to violations (such as which files are missing retention settings) or the presence of personally identifiable information (PII) in your documents.
The following table lists some common methods of risk analysis that you can perform with Activate:
Analysis Goal |
Steps |
---|---|
View high-level information about levels of risk in your environment. |
|
Create a list of the documents with violations or PII. |
|
Discover and resolve files with potential exposure. |