How to Configure DDR Rules
Last updated
Was this helpful?
Last updated
Was this helpful?
To configure DDR rules, follow these steps:
Access the Getvisibility DDR dashboard using your credentials.
Under the DDR tab, select Create Scan Configuration to connect to the data sources to be monitored.
Define Scopes: Specify the data sources that will be connect to.
Verify Configuration: Ensure that at least one data source is successfully connected. A green checkmark will confirm the completion.
Once the scan configuration is complete:
Go to Administration > Live Events Streaming to view real-time events.
Monitor Event Activity: Filter events by source, user name, action type (create, update, delete), and event type.
The Overview Page provides a comprehensive view of DDR's performance:
Event Statistics: Displays the number of events by source, such as Google Drive, SharePoint, OneDrive, and Box.
Data Source Activity: Visualizes active data sources and the volume of events generated by each.
Event Timeline: Shows when events occurred, helping identify peak activity periods and anomalies.
The Open Risks section highlights detected threats, categorised by risk type:
Public Exposure: Identifies sensitive files accessible to external users via public links.
External Sharing: Detects files shared outside the organisation, potentially exposing sensitive information.
Internal Over-Sharing: Flags data with excessive permissions within the organisation.
For each risk, DDR provides detailed insights, including the file path, user activity, and recommended remediation steps.