Manage, locate, and take action on assets with sensitive data with Data Inventory.
               Assets with sensitive data are defined by the data policies created for your organization.
               The Data Inventory list updates automatically when data policies are created or updated,
               and when assets are added or removed to the network locations specified in the data
               policies.
NoteYou must enable Endpoint Sensor in Endpoint Security Policies to send activity data for state-of-the-art threat detections and alerts (required
                              for advanced XDR detections and Workbench alerts). This setting requires credits to
                              enable. For more information, see Endpoint Sensor. 
 | 
The following table lists the actions available in Data Inventory:
| 
 Actions 
 | 
 Descriptions 
 | 
| 
 Investigate files with sensitive data 
 | 
 Do any of the following: 
  | 
| 
 Investigate local devices with sensitive data 
 | 
 Click the Local devices link and then do any of the following: 
  | 
| 
 Investigate cloud assets with sensitive data 
 | 
 Click the Cloud assets link, and then click an asset name to view details in Attack Surface Discovery. For
                              more information, see Attack Surface Discovery. 
 | 
| 
 Additional actions 
 | 
  | 
		