User Docs
PlatformProduct updates
  • Getting started
    • What is DSPM?
    • Use DSPM in your company
    • Choose how to run DSPM
  • Quick start
  • Deployment guide
    • Sizing
    • Installation
      • Understand installation requirements
        • K3S installation
        • Configuring a HA K3s cluster
        • Configuring Rancher and Fleet agent to run behind an HTTP proxy
        • Install Synergy/Focus/Enterprise using Helm without Rancher
        • Install Synergy/Focus/Enterprise using Rancher
        • Air Gap Installation
        • Uploads to Rancher
      • Upgrade K3s
        • K3s - Upgrade
      • Troubleshooting
        • K3s on RHEL/CentOS/Oracle Linux
        • Networking
        • Configuring Rancher and Fleet agent to run behind a HTTP proxy if cluster was previously registered
    • Estimate hardware capacity needs
  • Administration guide
    • Customer Support Portal
    • Pattern matching
    • Data Controls
    • Analytics
    • Detectors
    • Import custom TLS certificate
    • GQL Quick Guide
    • Critical & Sensitive Classification Attribute Modification
    • How to Check AI Mesh Version
    • Webhooks
    • AI Mesh Overview
    • Is Customer Data Saved by Getvisibility?
  • Enterprise setup
    • Authentication
      • Keycloak configuration
      • Single Sign-on (SSO)
        • Using Azure AD as Keycloak Identity Provider
      • Keycloak User Federation Configuration (LDAP/AD)
      • Enable 2FA
      • Role-Based Access Control (RBAC)
      • Keycloak User Federation using LDAP over SSL
  • Implementation
    • Configuring Taxonomies & Labels
  • Integrations
    • GQL
    • Template Language
    • Multi-Language Machine Learning
    • SIEM Integration
    • Google Drive Auto-labelling
  • Scan with Getvisibility
    • Configure detectors
    • Configure data sources
      • Scan Configuration Fields
      • AWS IAM
      • AWS S3
      • Azure AD
      • Azure Blob
      • Azure Files
      • OneDrive
      • SharePoint Online
      • SharePoint on-premise
      • Box
      • Confluence Cloud
      • LDAP
      • SMB
      • Google IAM
      • Google Drive
      • ChatGPT
      • iManage
      • Dropbox
    • Scanning
      • Data Source Permissions
      • Scan Scheduler
      • Types of Scan
      • Scan History
      • Scan Analytics
      • Supported Languages for ML Classifiers
      • Rescan Files
    • Streaming
      • What is DDR?
      • How to Configure DDR Rules
      • Import Data Controls
      • Monitoring New Files via DDR Streaming
      • DDR Supported Events
      • Lineage
      • Supported Data Sources
      • Azure Blob Streaming Configuration
      • Azure Files Streaming Configuration
      • Confluence Cloud Streaming Configuration
      • Sharepoint Online Streaming Configuration
      • SMB Streaming Configuration
      • OneDrive Streaming Configuration
      • Azure AD Streaming Configuration
      • AWS S3 Streaming Configuration
      • Google Drive Streaming Configuration
      • Google IAM Streaming Configuration
      • AWS IAM Streaming Configuration
      • Box Streaming Configuration
      • Dropbox Streaming Configuration
    • Enterprise Search columns meaning
    • Supported File Types
  • Glossary
  • FAQ
  • EDC - All Documents
    • Deployment - Onboarding
      • EDC-Server Installation Guide
      • EDC-Deployment Flow Guide
        • EDC-installerConfig.json and CLI config Details
      • Deploying the agent using ManageEngine
      • EDC-Mac Agent - Installation Guide
      • Windows Agent Precheck Script
    • Functionality - Guides
      • EDC - Admin Guide - v4
      • EDC -Guide for writing Visual Labels
      • EDC- Guide for Header Footer Options
      • EDC-Metadata Details
      • EDC Supported File Types
      • Agent V4 - Configuration Options for Expert Mode
      • File Lineage - Agent Activities
      • Endpoint Data Discovery
    • Troubleshooting Documents
      • Preventing Users From Disabling Agent
      • Generate Installation Logs
      • Troubleshooting Agent for Windows
      • Guide for missing suggestions
      • Reseller Keycloak Quick Installation Guide
      • Alternative authentication methods for agent
  • EDC - All Documents
Powered by GitBook
On this page
  • Use Cases
  • Pre-Requisites to See Lineage
  • Navigation to Lineage
  • Lineage UI Explanation
  • Description of the Lineage Screen
  • List of Events Supported by Each Data Source
  • Use Case for Lineage
  • How to Access Lineage
  • Hover and Export Options

Was this helpful?

Export as PDF
  1. Scan with Getvisibility
  2. Streaming

Lineage

Overview of Lineage

Data Lineage in Getvisibility provides a comprehensive view of a file's lifecycle, tracking its origin, movement, transformation, and usage. This enhances security, compliance, and forensic investigations by offering end-to-end visibility into data activities.

Traditional data monitoring provides static snapshots, which quickly become outdated, especially for large datasets. Real-time lineage addresses this by:

  1. Reducing Dependency on Rescans: Once streaming is enabled, changes are captured instantly.

  2. Improving Visibility: Organizations can see data movements in near real-time.

  3. Enabling Faster Incident Response: Security teams can quickly assess and respond to threats.

Use Cases

Data Lineage was developed to enable forensic investigations, ensuring organisations can:

  1. Investigate Incidents: Identify the root cause of security incidents, such as data breaches or unauthorised sharing.

  2. Enhance Compliance: Maintain audit trails for regulatory requirements.

  3. Support Risk Mitigation: Quickly respond to suspicious activities and apply appropriate remediation actions.

Pre-Requisites to See Lineage

  1. Connection to Each Data Source: Ensure that each Data Source to be monitored has been configured in Getvisibility.

  2. Enabling Streaming: Activate real-time event streaming for each connector.

Navigation to Lineage

  1. From Enterprise Search: Select a file and click on "Lineage" in the dropdown.

  1. From Open Risks: Identify a flagged file and expand the side menu.

Lineage UI Explanation

Filters:

  • Event Type (Create, Modify, Delete, Share, Move, etc.)

  • Data Source

  • User Activity

Export:

  • Export lineage details to CSV for auditing and reporting.

Color Scheme:

  • Green: Normal activity

  • Yellow: Medium-risk events (e.g., permission changes)

  • Red: High-risk events (e.g., external sharing)

Description of the Lineage Screen

Lifecycle: Displays the complete lifecycle of a file from creation to current state.

Event Timeline: Chronological list of all file-related actions.

User & Device: Shows which users and devices interacted with the file.

File Path: Original and current locations of the file.

List of Events Supported by Each Data Source

Common Events:

  • Create

  • Modify

  • Delete

Extended Events (via Audit Logs)

  • Change Permissions

  • Share

  • Move

  • Copy

  • Rename

  • Upload

  • Download

Data Source Specifics:

  • Google Drive: Audit log events available.

  • Azure (SharePoint Online, OneDrive, Blob, Files): Audit log events supported.

  • Box & Confluence: Extended events available in regular logs.

  • AWS S3, SMB, Dropbox: Limited to Create, Modify, and Delete.

Use Case for Lineage

Lineage supports forensic investigations, such as:

  1. External Sharing Investigation: When a file is shared externally, security analysts can trace its history to determine if the action was intentional or accidental.

  2. Suspicious Activity Investigation: If a user accesses and downloads sensitive information after a password reset, lineage provides detailed insights.

  3. Incident Response: Analysts can determine what actions to take, such as revoking access, quarantining files, or addressing user behaviour.

How to Access Lineage

  1. Enterprise Search: Select the file, click the dropdown, and choose "Lineage."

  2. File View: Expand the file details and navigate to the "Lineage" tab.

Hover and Export Options

  1. Event Description: Hovering over event icons shows a brief description.

  2. Export: Export the entire lineage history, including metadata, to CSV for audit trails and reporting.

Data Lineage empowers organisations with real-time visibility, advanced threat detection, and comprehensive forensic capabilities, ensuring sensitive data remains secure and traceable.

PreviousDDR Supported EventsNextSupported Data Sources

Last updated 3 months ago

Was this helpful?