DDC Administration
This document is intended for CipherTrust Data Discovery and Classification (DDC) administrators responsible for configuring Data Stores and running Scans and Reports.
All products manufactured and distributed by Thales Group are designed to be installed, operated, and maintained by personnel who have the knowledge, training, and qualifications required to safely perform the tasks assigned to them. The information, processes, and procedures contained in this document are intended for use by trained and qualified personnel only.
It is assumed that the users of this document are proficient with data security concepts.
Trademarks
Thales CipherTrust Data Discovery and Classification is powered by Groundlabs.
What's in This Document
This guide explains data discovery concepts such as Locations, Classification Profiles, Data Stores and Scans. The document also explains how to generate scan-based reports on the discovered data. Finally, the document describes how to read generated Reports.
Prerequisite
It is assumed, for this document, that you have already configured the CipherTrust Manager appliance. Refer to the CipherTrust Manager product documentation for instructions.
The next step is to activate and install the DDC license. Refer to Licensing for details.
After the license is installed, you can configure DDC Agents. Refer to the Data Discovery and Classification Deployment Guide specific to your platform for details. Installation of the CTE Agents is required for protecting directories and files stored on clients.
Organization
This document contains the following sections:
DDC Overview: Provides a high-level overview of the DDC solution.
Concepts: Describes DDC concepts such as Information Types, Classification Profile, Data Stores, Scans and Reports.
User Groups: Describes all predefined groups of DDC users with their rights to use various product features.
Locations: Describes how to add a Location.
Information Types: Describes how to view, customize and edit a Information Type (infotype).
Classification Profiles: Describes how to view, add and edit a Classification Profile.
Scans: Describes how to view and add a Scan.
Reports: Describes how to view and add a Report.
Agents: How to view the agent list.
Discovering Sensitive Information:Describes how to view, add, edit and scan different Data Store.
Logging: Describes most common log messages from DDC.
Operations: Describes the operations that the DDC Administrator performs on the CipherTrust Manager. In some situations, you must reconfigure DDC Agents with a new hostname, IP address, Agent Memory, CPU, or throughput.
Troubleshooting: Describes how to handle the issues that you might face when using DDC with the CipherTrust Manager.
Appendix: Additional useful information and tools related to system administration, such as system error messages, handy commands.
Deployment Security: Information on system messages related to security of the deployment and tips on how to increase it.