Logo Qohash
Qostodian Recon - Scheduling and Automated Reports
Qostodian Product video banner

This instructional video explains how to schedule scans and automate reports using Qostodian Recon. Analysts can set up regular scans to track trends and control threats on a file server. There are two ways to schedule scans: when adding a new scan or editing an existing scan. Schedules can be set to run at a specific date and time or at a set frequency. Analysts can also schedule two types of reports: “Matches” which provides a complete extract of scan results, and “Scan” which generates statistics and high-level information.

Qostodian Recon is a powerful tool that allows analysts to schedule scans and automate reports to ensure the ongoing security of a file server. By setting up regular scans, analysts can effectively track trends, identify potential threats, and take necessary actions to mitigate any risks.

There are two ways to schedule scans using Qostodian Recon. The first is when adding a new scan, and the second is when editing an existing scan. By selecting the desired option, analysts can customize the scan schedule to meet their specific requirements.

Scans can be scheduled to run at a specific date and time or at a set frequency. This flexibility allows analysts to choose the most convenient time for the scan, ensuring minimal disruption to daily operations. By automating the scanning process, analysts can ensure that the system remains constantly vigilant against potential threats.

In addition to scheduling scans, Qostodian Recon also allows analysts to schedule reports. There are two types of reports that can be scheduled: “Matches” and “Scan Reports.”

The “Matches” report provides a comprehensive extract of scan results, highlighting any matches found during the scan. This report is crucial as it enables analysts to identify specific files or documents that may be potential threats or instances of unauthorized access. By automating this report, analysts can proactively address any security issues before they escalate.

The “Scan” report is a more high-level report that generates statistics and other key information about the scanning process. This report provides an overview of the scan’s findings and helps analysts gain insights into the overall security health of the file server. By scheduling this report, analysts can receive regular updates on the status of their security system and take appropriate actions as needed.

Both types of reports can be saved in a designated folder, ensuring easy accessibility and organization. This feature allows analysts to efficiently manage and review reports, share them with relevant stakeholders, and take necessary actions based on the findings.

Qostodian Recon is an invaluable tool for analysts looking to enhance the security of their file servers. By scheduling scans and automating reports, analysts can effectively track trends, identify potential threats, and take swift action to prevent security breaches. The flexibility and convenience offered by Qostodian Recon make it a must-have for businesses and organizations looking to reinforce their cybersecurity measures.

A propos de l'auteur

A propos de l'auteur

Recommended for you

proactive incident management
Proactive incident management is a lot like having an umbrella ready at your door just in case it rains. It’s all about being prepared be...
machine learning for computer security
Machine learning might sound a little like a concept from a science fiction movie, but it’s actually quite similar to how humans learn an...
which scenario might indicate a reportable insider threat
Contrary to what you might think, insider threats are often more challenging to detect and manage than external threats because of their ...
data classification software
Handling vast amounts of data can be complex. Categorizing according to its sensitivity and importance alone can take days or even weeks ...
Sans titre (3)
The AI-powered platform provides visibility and control over files in high-risk data sources, helping enterprises proactively identify ri...
A Comprehensive Guide to Sensitive Data Discovery in Unstructured Data
Introduction to Sensitive Data Discovery Sensitive data discovery is a critical process for organizations aiming to safeguard their in...
Logo Qohash
By initiative
Regulatory compliance:
Find, classify and inventory all sensitive data, across every data source
Data breach prevention:
Monitor sensitive data 24/7, track data lineage, and enforce policies at endpoints
Microsoft 365
One easy-to-use platform to secure sensitive data on Windows workstations and M365
By regulation
Law 25
Why Qohash
Defy legacy limitations
What our customers say about us

Contact us​