Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • User Manual
  • Data Scan

Data Scan History

Discover the importance of monitoring and analyzing data scan history for efficient data management and cybersecurity protection.

Written by Chris Zator

Updated at November 15th, 2024

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More

Table of Contents

Data Scan History Scan History Display and Filtering Available Actions for Each Scan Expanding Individual Scans for Detailed Analysis

Data Scan History

The Data Scan History page provides a comprehensive overview of all existing data scans, including completed and canceled scans. This page allows you to view scan details, filter or search scans, and take actions such as re-scanning or creating mitigation plans.

Scan History Display and Filtering

As a default, the Data Scan History table displays five results at a time, showing key scan information such as:

  • Scan Name – Name assigned to the scan.
  • Issued By – User who initiated the scan.
  • Locations – Number of data locations scanned.
  • Start Date/End Date – Start and end timestamps for each scan.
  • # Items (Files) – Total items/files scanned.
  • % Sensitive Items – Percentage of sensitive data identified in each scan.
  • Mitigations – Indicates any existing mitigation plans associated with the scan.

To efficiently locate a specific scan, the table includes options to:

  • Increase displayed results – Adjust the number of results shown by selecting a higher value from the drop-down menu.
  • Search by scan name – Use the search box to find specific scans by entering keywords or names.

Available Actions for Each Scan

Each row in the table includes an Action Menu (three dots), allowing you to:

  • Scan Again – Re-run the selected scan.
  • Create Mitigation – Begin building a mitigation plan based on the scan’s findings.
  • Show In Reports – Include the scan’s data in reports for further analysis.
  • Export as CSV – Download scan results as a CSV file for offline analysis.

Note: The "Delete" option is hidden for scans with existing mitigation plans. Likewise, "Create Mitigation" will only be available if sensitive items were found and no pre-existing mitigation plan covers those items.

Expanding Individual Scans for Detailed Analysis

Clicking on a scan row expands it to show additional details, including:

Data Scan Summary – A graphical summary of sensitive vs. non-sensitive data in a doughnut chart format, highlighting:

  • Sensitive Data – Proportion of sensitive items discovered.
  • Non-Sensitive Data – Proportion of non-sensitive items.
  • Number of Files Scanned
  • Total Bytes Scanned
  • Scan Risk Grade – Based on the sensitivity of data identified.

Top 5 Locations with Sensitive Data – Lists the top locations where sensitive data was found, including:

  • Locations – Path to the files containing sensitive data.
  • Targets – Device or server names where the data resides.
  • # Item Scanned – Number of items in each location.
  • # Sensitive Items – Number of sensitive items in each location.
  • Location Grade – Sensitivity rating assigned to each location.

Breakdown of Sensitive Data Found – A graphical bar chart of sensitive data categories discovered, allowing further drill-down. Each category (e.g., Social Security Numbers) can be clicked to reveal additional details such as:

  • Item Names – Specific files or records found within the category.
  • Location – Path and target device for each item.
  • Discovery Date – When each sensitive item was identified.
search archives scan records data scan data scan history scan name

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How to Create a Data Scan
  • How To Create an External IP Scan
  • How to Remove Agent Configurations from the CYRISMA Web Platform

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand