This instructional video on Qostodian Recon explains how to discover sensitive data and migrate it using filters. It starts by showing how to sort classifications and sensitive information categories in the settings. Next, the video demonstrates how to add targets for scanning and view the details of the scan results. It then explains how to use the migration tool to move sensitive information based on certain criteria, such as last modification date. Lastly, it mentions the option to create a report and export the files.
Data security is a paramount concern for organizations of all sizes, and one critical aspect of maintaining this security is identifying and migrating sensitive information. Qostodian Recon is a powerful tool that helps users discover and move sensitive data based on various criteria. In this article, we will outline the step-by-step process of using Qostodian Recon to identify and migrate sensitive information.
Firstly, users can customize the settings in Qostodian Recon to sort classifications and sensitive information categories. By doing so, users can easily identify and locate the precise data they are looking for. This feature allows for efficient and targeted scanning of sensitive information.
Once the settings are configured, users can add targets for scanning in Qostodian Recon. These targets can be specific folders or directories where sensitive data is expected. The tool will then scan these targets and provide detailed results on the identified sensitive information.
Users can view the scan results to gain insights into the discovered sensitive data. The details of the scan, such as file names, locations, and associated classifications, can help users make informed decisions regarding the migration process.
The next step is to utilize the migration tool in Qostodian Recon. This tool allows users to move sensitive information based on specific criteria. For example, users can migrate files based on the last modification date, ensuring that only the most relevant and up-to-date information is moved.
It is important to note that Qostodian Recon also offers the option to create a report of the migration process. This report can include detailed information on the files moved, their locations, and any associated classifications. Users can export this report for future reference or compliance purposes, ensuring that all the necessary documentation is maintained.
Before initiating the migration process, it is crucial to have the necessary access rights. Without appropriate permissions, users may encounter obstacles or be unable to complete the migration successfully. Therefore, it is vital to ensure that the user has the required privileges to access and move the sensitive data.
Qostodian Recon provides a robust solution for discovering and migrating sensitive data. By customizing the settings, adding targets, and utilizing the migration tool, users can efficiently identify and move sensitive information based on various criteria. The ability to create reports and export files adds an additional layer of documentation and compliance to the migration process. Remember that having the necessary access rights is essential to successfully perform the migration. Taking these steps will help organizations maintain data security and ensure that sensitive information is handled appropriately.