Logo Qohash
Qostodian Recon - Data Discovery and Migration
Qostodian Product video banner

This instructional video on Qostodian Recon explains how to discover sensitive data and migrate it using filters. It starts by showing how to sort classifications and sensitive information categories in the settings. Next, the video demonstrates how to add targets for scanning and view the details of the scan results. It then explains how to use the migration tool to move sensitive information based on certain criteria, such as last modification date. Lastly, it mentions the option to create a report and export the files.

Data security is a paramount concern for organizations of all sizes, and one critical aspect of maintaining this security is identifying and migrating sensitive information. Qostodian Recon is a powerful tool that helps users discover and move sensitive data based on various criteria. In this article, we will outline the step-by-step process of using Qostodian Recon to identify and migrate sensitive information.

Firstly, users can customize the settings in Qostodian Recon to sort classifications and sensitive information categories. By doing so, users can easily identify and locate the precise data they are looking for. This feature allows for efficient and targeted scanning of sensitive information.

Once the settings are configured, users can add targets for scanning in Qostodian Recon. These targets can be specific folders or directories where sensitive data is expected. The tool will then scan these targets and provide detailed results on the identified sensitive information.

Users can view the scan results to gain insights into the discovered sensitive data. The details of the scan, such as file names, locations, and associated classifications, can help users make informed decisions regarding the migration process.

The next step is to utilize the migration tool in Qostodian Recon. This tool allows users to move sensitive information based on specific criteria. For example, users can migrate files based on the last modification date, ensuring that only the most relevant and up-to-date information is moved.

It is important to note that Qostodian Recon also offers the option to create a report of the migration process. This report can include detailed information on the files moved, their locations, and any associated classifications. Users can export this report for future reference or compliance purposes, ensuring that all the necessary documentation is maintained.

Before initiating the migration process, it is crucial to have the necessary access rights. Without appropriate permissions, users may encounter obstacles or be unable to complete the migration successfully. Therefore, it is vital to ensure that the user has the required privileges to access and move the sensitive data.

Qostodian Recon provides a robust solution for discovering and migrating sensitive data. By customizing the settings, adding targets, and utilizing the migration tool, users can efficiently identify and move sensitive information based on various criteria. The ability to create reports and export files adds an additional layer of documentation and compliance to the migration process. Remember that having the necessary access rights is essential to successfully perform the migration. Taking these steps will help organizations maintain data security and ensure that sensitive information is handled appropriately.

A propos de l'auteur

A propos de l'auteur

Recommended for you

BLOG - Qohash (4)
Insider threats pose a significant risk to organizations of all sizes and industries. These threats can arise from current or former empl...
Qostodian Product video banner
In today’s digital age, the protection of sensitive information has become more important than ever. With cyber threats constantly ...
BLOG - Qohash (3)
Leading data security posture management (DSPM) provider, Qohash, introduces data remediation features to bolster organizations’ se...
Remediation (1)
In today’s digital landscape, organizations face an ever-increasing need to protect their sensitive information from potential secu...
BLOG - Qohash (1)
In today’s digital age, protecting sensitive data has become a top priority for organizations across various industries. With the s...
Qostodian Product video banner
In this instructional video, the Qostodian Recon tool is shown to help find specific information within a file server using the custom se...
Logo Qohash
By initiative
Regulatory compliance:
Find, classify and inventory all sensitive data, across every data source
Data breach prevention:
Monitor sensitive data 24/7, track data lineage, and enforce policies at endpoints
Microsoft 365
One easy-to-use platform to secure sensitive data on Windows workstations and M365
By regulation
Law 25
Why Qohash
Defy legacy limitations
What our customers say about us

Contact us​