Logo Qohash
Qostodian Recon - Data Discovery and Migration
Qostodian Product video banner

This instructional video on Qostodian Recon explains how to discover sensitive data and migrate it using filters. It starts by showing how to sort classifications and sensitive information categories in the settings. Next, the video demonstrates how to add targets for scanning and view the details of the scan results. It then explains how to use the migration tool to move sensitive information based on certain criteria, such as last modification date. Lastly, it mentions the option to create a report and export the files.

Data security is a paramount concern for organizations of all sizes, and one critical aspect of maintaining this security is identifying and migrating sensitive information. Qostodian Recon is a powerful tool that helps users discover and move sensitive data based on various criteria. In this article, we will outline the step-by-step process of using Qostodian Recon to identify and migrate sensitive information.

Firstly, users can customize the settings in Qostodian Recon to sort classifications and sensitive information categories. By doing so, users can easily identify and locate the precise data they are looking for. This feature allows for efficient and targeted scanning of sensitive information.

Once the settings are configured, users can add targets for scanning in Qostodian Recon. These targets can be specific folders or directories where sensitive data is expected. The tool will then scan these targets and provide detailed results on the identified sensitive information.

Users can view the scan results to gain insights into the discovered sensitive data. The details of the scan, such as file names, locations, and associated classifications, can help users make informed decisions regarding the migration process.

The next step is to utilize the migration tool in Qostodian Recon. This tool allows users to move sensitive information based on specific criteria. For example, users can migrate files based on the last modification date, ensuring that only the most relevant and up-to-date information is moved.

It is important to note that Qostodian Recon also offers the option to create a report of the migration process. This report can include detailed information on the files moved, their locations, and any associated classifications. Users can export this report for future reference or compliance purposes, ensuring that all the necessary documentation is maintained.

Before initiating the migration process, it is crucial to have the necessary access rights. Without appropriate permissions, users may encounter obstacles or be unable to complete the migration successfully. Therefore, it is vital to ensure that the user has the required privileges to access and move the sensitive data.

Qostodian Recon provides a robust solution for discovering and migrating sensitive data. By customizing the settings, adding targets, and utilizing the migration tool, users can efficiently identify and move sensitive information based on various criteria. The ability to create reports and export files adds an additional layer of documentation and compliance to the migration process. Remember that having the necessary access rights is essential to successfully perform the migration. Taking these steps will help organizations maintain data security and ensure that sensitive information is handled appropriately.

A propos de l'auteur

A propos de l'auteur

Recommended for you

Sans titre (3)
News
The AI-powered platform provides visibility and control over files in high-risk data sources, helping enterprises proactively identify ri...
A Comprehensive Guide to Sensitive Data Discovery in Unstructured Data
Blog
Introduction to Sensitive Data Discovery Sensitive data discovery is a critical process for organizations aiming to safeguard their in...
Data Security Harnessing the Power of Data Classification in Management Strategies
Blog
As technology continues to advance at an unprecedented pace, the importance of data security has become increasingly critical. With the r...
Data Security Posture Management in 2024
Blog
Data security has always been a top priority for organizations, but as we enter the year 2024, the industry is witnessing a significant s...
ISO27001 Certification
News
Qohash, a leading data security posture management company, is pleased to announce that it has recently obtained the prestigious ISO 2700...
Qohash - top100wfa
News
Qohash, a leading innovator in data security posture management, has been selected as one of the Top 100 Next-Generation Companies by the...
Logo Qohash
By initiative
Regulatory compliance:
Find, classify and inventory all sensitive data, across every data source
Data breach prevention:
Monitor sensitive data 24/7, track data lineage, and enforce policies at endpoints
Microsoft 365
One easy-to-use platform to secure sensitive data on Windows workstations and M365
By regulation
GDPR
CCPA
GLBA
VCDPA
NYCRR
UCPA
PCI-DSS
CPA
Law 25
Why Qohash
Defy legacy limitations
What our customers say about us

Contact us​