Manage, locate, and take action on assets with sensitive data with Data Inventory.
Assets with sensitive data are defined by the data policies created for your organization.
The Data Inventory list updates automatically when data policies are created or updated,
and when assets are added or removed to the network locations specified in the data
policies.
![]() |
NoteYou must enable the Endpoint sensor detection and response setting in Endpoint Security to send activity data for state-of-the-art threat detections and alerts (required
for advanced XDR detections and Workbench alerts). This setting requires credits to
enable. For more information, see Configuring endpoint security policies.
|
The following table lists the actions available in Data Inventory:
Actions
|
Descriptions
|
Investigate files with sensitive data
|
Do any of the following:
|
Investigate local devices with sensitive data
|
Click the Local devices link and then do any of the following:
|
Investigate cloud assets with sensitive data
|
Click the Cloud assets link, and then click an asset name to view details in Attack Surface Discovery. For
more information, see Attack Surface Discovery.
|
Additional actions
|
|