Data Scan History
Discover the importance of monitoring and analyzing data scan history for efficient data management and cybersecurity protection.
- User Manual
- Agents
- The Cyber Risk Assessment Process
- API Documents
- General Questions and Troubleshooting
- The Cyber Risk Assessment Process (Video Tutorials)
- Sales and Prospecting Articles
- CYRISMA Partner Portal Access
- Glossary
- CYRISMA Change Log
- Support Ticket SLA
- Onboarding Framework
- PSA Integrations
- Billing Questions
- Self Onboarding Guide
Table of Contents
Data Scan History
The Data Scan History page provides a comprehensive overview of all existing data scans, including completed and canceled scans. This page allows you to view scan details, filter or search scans, and take actions such as re-scanning or creating mitigation plans.

Scan History Display and Filtering
As a default, the Data Scan History table displays five results at a time, showing key scan information such as:
- Scan Name – Name assigned to the scan.
- Issued By – User who initiated the scan.
- Locations – Number of data locations scanned.
- Start Date/End Date – Start and end timestamps for each scan.
- # Items (Files) – Total items/files scanned.
- % Sensitive Items – Percentage of sensitive data identified in each scan.
- Mitigations – Indicates any existing mitigation plans associated with the scan.
To efficiently locate a specific scan, the table includes options to:
- Increase displayed results – Adjust the number of results shown by selecting a higher value from the drop-down menu.
- Search by scan name – Use the search box to find specific scans by entering keywords or names.
Available Actions for Each Scan
Each row in the table includes an Action Menu (three dots), allowing you to:
- Scan Again – Re-run the selected scan.
- Create Mitigation – Begin building a mitigation plan based on the scan’s findings.
- Show In Reports – Include the scan’s data in reports for further analysis.
- Export as CSV – Download scan results as a CSV file for offline analysis.
Note: The "Delete" option is hidden for scans with existing mitigation plans. Likewise, "Create Mitigation" will only be available if sensitive items were found and no pre-existing mitigation plan covers those items.
Expanding Individual Scans for Detailed Analysis
Clicking on a scan row expands it to show additional details, including:
Data Scan Summary – A graphical summary of sensitive vs. non-sensitive data in a doughnut chart format, highlighting:
- Sensitive Data – Proportion of sensitive items discovered.
- Non-Sensitive Data – Proportion of non-sensitive items.
- Number of Files Scanned
- Total Bytes Scanned
- Scan Risk Grade – Based on the sensitivity of data identified.
Top 5 Locations with Sensitive Data – Lists the top locations where sensitive data was found, including:
- Locations – Path to the files containing sensitive data.
- Targets – Device or server names where the data resides.
- # Item Scanned – Number of items in each location.
- # Sensitive Items – Number of sensitive items in each location.
- Location Grade – Sensitivity rating assigned to each location.
Breakdown of Sensitive Data Found – A graphical bar chart of sensitive data categories discovered, allowing further drill-down. Each category (e.g., Social Security Numbers) can be clicked to reveal additional details such as:
- Item Names – Specific files or records found within the category.
- Location – Path and target device for each item.
- Discovery Date – When each sensitive item was identified.