How to Configure DDR Rules
Create Scan Configuration
To configure DDR rules, follow these steps:
Access the Getvisibility DDR dashboard using your credentials.
Under the DDR tab, select Create Scan Configuration to connect to the data sources to be monitored.

Define Scopes: Specify the data sources that will be connect to.
Verify Configuration: Ensure that at least one data source is successfully connected. A green checkmark will confirm the completion.
Check for Incoming Events
Once the scan configuration is complete:
Go to Administration > Live Events Streaming to view real-time events.

Monitor Event Activity: Filter events by source, user name, action type (create, update, delete), and event type.
Overview Page
The Overview Page provides a comprehensive view of DDR's performance:
Event Statistics: Displays the number of events by source, such as Google Drive, SharePoint, OneDrive, and Box.
Data Source Activity: Visualizes active data sources and the volume of events generated by each.
Event Timeline: Shows when events occurred, helping identify peak activity periods and anomalies.

Open Risks
The Open Risks section highlights detected threats, categorised by risk type:
Public Exposure: Identifies sensitive files accessible to external users via public links.
External Sharing: Detects files shared outside the organisation, potentially exposing sensitive information.
Internal Over-Sharing: Flags data with excessive permissions within the organisation.


For each risk, DDR provides detailed insights, including the file path, user activity, and recommended remediation steps.
Last updated
Was this helpful?