Logo Qohash
Qostodian Recon - Data Discovery and Migration
Qostodian Product video banner

This instructional video on Qostodian Recon explains how to discover sensitive data and migrate it using filters. It starts by showing how to sort classifications and sensitive information categories in the settings. Next, the video demonstrates how to add targets for scanning and view the details of the scan results. It then explains how to use the migration tool to move sensitive information based on certain criteria, such as last modification date. Lastly, it mentions the option to create a report and export the files.

Data security is a paramount concern for organizations of all sizes, and one critical aspect of maintaining this security is identifying and migrating sensitive information. Qostodian Recon is a powerful tool that helps users discover and move sensitive data based on various criteria. In this article, we will outline the step-by-step process of using Qostodian Recon to identify and migrate sensitive information.

Firstly, users can customize the settings in Qostodian Recon to sort classifications and sensitive information categories. By doing so, users can easily identify and locate the precise data they are looking for. This feature allows for efficient and targeted scanning of sensitive information.

Once the settings are configured, users can add targets for scanning in Qostodian Recon. These targets can be specific folders or directories where sensitive data is expected. The tool will then scan these targets and provide detailed results on the identified sensitive information.

Users can view the scan results to gain insights into the discovered sensitive data. The details of the scan, such as file names, locations, and associated classifications, can help users make informed decisions regarding the migration process.

The next step is to utilize the migration tool in Qostodian Recon. This tool allows users to move sensitive information based on specific criteria. For example, users can migrate files based on the last modification date, ensuring that only the most relevant and up-to-date information is moved.

It is important to note that Qostodian Recon also offers the option to create a report of the migration process. This report can include detailed information on the files moved, their locations, and any associated classifications. Users can export this report for future reference or compliance purposes, ensuring that all the necessary documentation is maintained.

Before initiating the migration process, it is crucial to have the necessary access rights. Without appropriate permissions, users may encounter obstacles or be unable to complete the migration successfully. Therefore, it is vital to ensure that the user has the required privileges to access and move the sensitive data.

Qostodian Recon provides a robust solution for discovering and migrating sensitive data. By customizing the settings, adding targets, and utilizing the migration tool, users can efficiently identify and move sensitive information based on various criteria. The ability to create reports and export files adds an additional layer of documentation and compliance to the migration process. Remember that having the necessary access rights is essential to successfully perform the migration. Taking these steps will help organizations maintain data security and ensure that sensitive information is handled appropriately.

A propos de l'auteur

A propos de l'auteur

Recommended for you

proactive incident management
Proactive incident management is a lot like having an umbrella ready at your door just in case it rains. It’s all about being prepared be...
machine learning for computer security
Machine learning might sound a little like a concept from a science fiction movie, but it’s actually quite similar to how humans learn an...
which scenario might indicate a reportable insider threat
Contrary to what you might think, insider threats are often more challenging to detect and manage than external threats because of their ...
data classification software
Handling vast amounts of data can be complex. Categorizing according to its sensitivity and importance alone can take days or even weeks ...
Sans titre (3)
The AI-powered platform provides visibility and control over files in high-risk data sources, helping enterprises proactively identify ri...
A Comprehensive Guide to Sensitive Data Discovery in Unstructured Data
Introduction to Sensitive Data Discovery Sensitive data discovery is a critical process for organizations aiming to safeguard their in...
Logo Qohash
By initiative
Regulatory compliance:
Find, classify and inventory all sensitive data, across every data source
Data breach prevention:
Monitor sensitive data 24/7, track data lineage, and enforce policies at endpoints
Microsoft 365
One easy-to-use platform to secure sensitive data on Windows workstations and M365
By regulation
Law 25
Why Qohash
Defy legacy limitations
What our customers say about us

Contact us​