Identity Finder Client

Slides:



Advertisements
Similar presentations
MY NCBI (module 4.5).
Advertisements

Expense Report Training
Welcome to SpyEye Front-end interface called “CN 1” or “Main Access Panel.”
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Network Printing. Printer sharing Saves money by only needing one printer Increases efficiency of managing resources.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
Remote Assistance  Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission  The other.
Penn State University College Of Education Understanding College of Education Resources.
Tutorial Introduction Fidelity NTSConnect is an innovative Web-based software solution designed for use by customers of Fidelity National Title Insurance.
Installing Windows Vista Lesson 2. Skills Matrix Technology SkillObjective DomainObjective # Performing a Clean Installation Set up Windows Vista as the.
Ch 8-3 Working with domains and Active Directory.
Microsoft ® Official Course Module 9 Configuring Applications.
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
VIA Visitor Internet Access at the Baylor University Libraries.
What is the big idea behind the 12/3 Identity Finder scan? The system-wide scan on 12/3 is intended to permanently remove all PII and anything looking.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
1 Enterprise How to access your from the web.
Installing Ricoh Printers There are two basic steps: 1. Acquire the drivers. 2. Use the Windows Add Printer Wizard to install the drivers within the operating.
Managing User Desktops with Group Policy
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 24 Managing and Reporting Database Information 1 Morrison / Wells / Ruffolo.
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Microsoft Office XP Illustrated Introductory, Enhanced Started with Outlook 2002 Getting.
Installing a Network Printer. Network printers work much like any other printer except the data flow is through a network. This means the printer must.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Online Catalog Tutorial. Introduction Welcome to the Online Catalog Tutorial. This is the place to find answers to all of your online shopping questions.
How Your Customers Will Pay Online & by Phone
Optimizing Windows Vista Performance Lesson 10. Skills Matrix Technology SkillObjective DomainObjective # Introducing ReadyBoostTroubleshoot performance.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
Procedures Manual 1.Removing sensitive informationRemoving sensitive information.
IDENTITY FINDER TRAINING. What is Identity Finder?  Identity Finder is a program that is installed on your desktop, laptop, or server to locate personally.
Steps for Symantec PGP Standalone install with Please use the following steps and screenshots to step your way through a standalone install of PGP.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Installation Instruction for BRB-ArrayTools You need to have the administrative or elevated administrative right in current account to install BRB-ArrayTools.
CACI Proprietary Information | Date 1 PD² SR13 Client Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead Date: December 8, 2011.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
ICAICT201A USE COMPUTER OPERATING SYSTEM. USING THE CONTROL PANEL The Control Panel contains many options for configuring your computer, including: adding.
 There are three things to get Trend Micro software for your PC. They are Download, Installation and Activation of the software license. Trend Micro.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
ClickOnce Deployment (One-click Deployment)
(Required for DTCs, Recommended for STCs)
Chapter Objectives In this chapter, you will learn:
Data Virtualization Demoette… ODBC Clients
The Login Page is the first page your customers
Outlook Mobile App for Android
NetApp Online Ordering User Tutorial
Getting Started with Windows 10
Expense Report Training
Lesson 9 Sharing Documents
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Fix Windows 10 Activation Error 0x80072ee2
Installing the HP LaserJet Pro 500 color MFP M570 printer software in Windows on a Wireless Network & Wired Network.
User Guide Portman Concur
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
CONFIGURING HARDWARE DEVICE & START UP PROCESS
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
Expense Report Training
Online Purchase :- Purchase MS Office 365 online as it is an easy procedure which merely takes a few minutes. You just need to visit.
Expense Report Training
Connecting Remotely Winter 2014.
Welcome to WebCRD.
ClickOnce Deployment (One-click Deployment)
How Enterprise Agents can be installed remotely on protected objects
Microsoft Windows 7 Basics
Presentation transcript:

Identity Finder Client Peseng Yu IT Security Analyst Peseng.Yu@rice.edu

Agenda Goal of Identity Finder Identity Finder Policy Settings Client Overview

Goal of Identity Finder Data discovery See if computers are storing Personally Identifiable Information Minimize or eliminate the amount of sensitive data stored in unneeded locations. Depending on the incident, this could help prevent the amount of data leakage. Protect data-at-rest By finding where sensitive data is stored, each user can help ensure that it is properly encrypted or stored in an acceptable area (e.g. specified network folders for your department or group). User awareness/training Representative from your group will review and tell you to take action on your findings on an ongoing basis (e.g. Monthly).

Identity Finder Policy Settings Monthly Scans e.g. 1st day of each month at 1:00am Periodically (e.g. every 5-10 minutes) the clients report back to the central console to report status and download policy updates What is Identity Finder configured to scan via policy settings? Social Security Numbers Credit Card Numbers Bank Account Numbers Drivers License

Client Overview Identity Finder Client uses the “Ribbon” interface (similar to Microsoft Office 2007 and newer) Starting Identity Finder Starting a Scan Address Findings Deleting Temporary Files Securely Deleting Files

Starting Identity Finder After starting the Identity Finder program  All Programs  Identity Finder  You may press “Skip” when asked to specify a “Identity Finder Profile Password” You do not have to create an Identity Finder profile password. You may use the "Guest Profile". However, creating an Identity Finder Profile may be convenient to help you store previous search results for easier reference amongst other features

Starting a Scan Press the “Start Search Now” button. The interface should look like one of the screenshots below:

Addressing Findings After the search completes you will see the Identity Finder Search Summary: Choose either “Wizard” or “Advanced”

Addressing Findings (Cont.)

Addressing Findings (Cont.) You can preview the file by selecting/clicking a specific Identity Match. The Wizard prompt will help guide you on what actions you would like to take on the files. You can also Right-Click a Finding and select the appropriate option you would like to take. Shred – Securely deletes the file Secure – Utilize Identity Finder to encrypt the file

Deleting Temporary Files Review the Tutorial on the docs.rice.edu website on how to securely delete temporary files using Identity Finder https://docs.rice.edu/confluence/display/ITTUT/How+to+Secur ely+Clean+Up+Temporary+Files+using+Identity+Finder+- +Windows

Securely Delete Files Review the Tutorial on the docs.rice.edu website on how to securely delete files using Identity Finder https://docs.rice.edu/confluence/display/ITTUT/How+to+Secur ely+Delete+Files+using+Identity+Finder+-+Windows

Helpful References Identity Finder Client User Guides Windows User Guide: https://www.identityfinder.com/Help/Client_Mac/ Mac User Guide: https://www.identityfinder.com/Help/Client_Win/ Identity Finder FAQ https://docs.rice.edu/confluence/display/ITTUT/Identity+Finder+FAQ s How to clean up temporary files using Identity Finder https://docs.rice.edu/confluence/display/ITTUT/How+to+Securely+Cl ean+Up+Temporary+Files+using+Identity+Finder+-+Windows How to securely delete files using Identity Finder https://docs.rice.edu/confluence/display/ITTUT/How+to+Securely+D elete+Files+using+Identity+Finder+-+Windows

Questions or Comments? Questions?