Logo Qohash
Qostodian Prime: How to Quarantine and Restore Files with Sensitive Information
Qostodian Product video banner

In today’s digital age, the protection of sensitive information has become more important than ever. With cyber threats constantly on the rise, individuals and organizations need robust security measures to safeguard their data. This is where Qostodian Prime comes in. In this instructional video, we will guide you through the process of using Qostodian Prime’s quarantine and restore feature.

The first step is to identify the files that contain sensitive information. This can include financial documents, personal information, or any other data that you want to protect from unauthorized access. Once you have identified these files, you can easily quarantine them using Qostodian Prime.

Quarantine and Restore

To quarantine a file, simply right-click on it and select the “Quarantine” option from the drop-down menu. Once quarantined, the file will be replaced with a tombstone on your desktop. This tombstone acts as a notification that the file has been quarantined and is temporarily unavailable.

Now, let’s say you need to access the quarantined file again. Qostodian Prime makes it simple to restore the files to their original location. To do this, right-click on the tombstone and select the “Restore” option from the menu. The original file will be instantly restored to your desktop, ready for you to access and use.

The quarantine and restore feature in Qostodian Prime provides an added layer of security for files containing sensitive information. By temporarily removing these files from the desktop and replacing them with tombstones, you can ensure that they are safe from prying eyes.

It’s worth mentioning that Qostodian Prime’s quarantine and restore feature is not a permanent deletion tool. The files are not permanently removed but rather temporarily hidden from view. This means that the files can be easily restored whenever you need them.

In conclusion, Qostodian Prime offers a comprehensive solution for the protection of sensitive information. With its easy-to-use quarantine and restore feature, users can quickly and effectively safeguard their files. By quarantining files with sensitive information, you can ensure that they are kept away from potential threats. And with the ability to restore these files whenever you need them, you have complete control over your data.

A propos de l'auteur

A propos de l'auteur

Recommended for you

A Comprehensive Guide to Sensitive Data Discovery in Unstructured Data
Introduction to Sensitive Data Discovery Sensitive data discovery is a critical process for organizations aiming to safeguard their in...
Data Security Harnessing the Power of Data Classification in Management Strategies
As technology continues to advance at an unprecedented pace, the importance of data security has become increasingly critical. With the r...
Data Security Posture Management in 2024
Data security has always been a top priority for organizations, but as we enter the year 2024, the industry is witnessing a significant s...
ISO27001 Certification
Qohash, a leading data security posture management company, is pleased to announce that it has recently obtained the prestigious ISO 2700...
Qohash - top100wfa
Qohash, a leading innovator in data security posture management, has been selected as one of the Top 100 Next-Generation Companies by the...
BLOG - Qohash (4)
Insider threats pose a significant risk to organizations of all sizes and industries. These threats can arise from current or former empl...
Logo Qohash
By initiative
Regulatory compliance:
Find, classify and inventory all sensitive data, across every data source
Data breach prevention:
Monitor sensitive data 24/7, track data lineage, and enforce policies at endpoints
Microsoft 365
One easy-to-use platform to secure sensitive data on Windows workstations and M365
By regulation
Law 25
Why Qohash
Defy legacy limitations
What our customers say about us

Contact us​