The data source Review page shows information related to the metadata in the data source.
What You Can Do
You can perform the following actions on the review page:
User Goal |
Steps |
---|---|
Search for specific files, email messages, or database columns. |
Above the table, in the search box, type the keyword. |
Export the list in the review dashboard to a CSV file. |
In the upper-left area of the page, click the button with three dots and then select Save as csv. |
Review the risks found in files or email messages. |
|
Preview a file or an email message. |
Click the name of the file or the email message. A preview of the object appears. The preview includes information about any PII discovered in the object. |
Information
The information on the data source review page is specific to the type of data source.
File System, OneDrive, and SharePoint
Name |
Description |
---|---|
File name |
The name of the file. |
File path |
The path to the file on the server. |
Tag |
The name of the tag associated with the file or folder. |
Classifiers |
The name of the classifier associated with data classification plan of the data source. |
Full Control Access |
The type of access permission on the file or folder. |
Modify Access |
The type of access permission on the file or folder. |
Write Access |
The type of access permission on the file or folder. |
Risks |
A tool to investigate and resolve risks. Information in the Risks section is organized by the degree of risk and the type of risk. |
Sensitivity |
A tool to investigate the values and specific instances of PII discovered in the data source. Information in the Sensitivity section is organized by the degree of sensitivity and the type entity found. |
Exchange
Name |
Description |
---|---|
Subject |
The subject of the email message. |
From |
The user who sent the email message. |
Mailbox |
The name of the mailbox. |
Received time |
The time the email message was received. |
To |
The user who received the email message. |
Folder |
The name of the folder that contains emails. |
Size |
The size of the email. |
Risks |
A tool to investigate and resolve risks. Information in the Risks section is organized by the degree of risk and the type of risk. |
Sensitivity |
A tool to investigate the values and specific instances of PII discovered in the data source. Information in the Sensitivity section is organized by the degree of sensitivity and the type entity found. |
Database
Name |
Description |
---|---|
Column |
The name of the database column. |
Table |
The name of the database table. |
Schema |
The name of the database schema. |
Database |
The name of the database. |
Server |
The name of the server. |
Risks |
A tool to investigate and resolve risks. Information in the Risks section is organized by the degree of risk and the type of risk. |
Sensitivity |
A tool to investigate the values and specific instances of PII discovered in the data source. Information in the Sensitivity section is organized by the degree of sensitivity and the type entity found. |
Object Storage
Name |
Description |
---|---|
File name |
The name of the file. |
File path |
The path to the file on the server. |
Storage class |
The access tier associated with the data source where the file is located. |
User tag |
The tags associated with the file. |
User metadata |
The user-defined metadata associated with the file. |
Server side encryption |
Indicates whether the file is encrypted. |
Risks |
A tool to investigate and resolve risks. Information in the Risks section is organized by the degree of risk and the type of risk. |
Sensitivity |
A tool to investigate the values and specific instances of PII discovered in the data source. Information in the Sensitivity section is organized by the degree of sensitivity and the type entity found. |