The Restricted Data Management policy requires all campus departments to report the number of computing devices storing Social Security Numbers to the Chief Information Security Officer.
Identity Finder is a tool used across campus to scan workstations and servers for the existence of restricted data, like Social Security Numbers. Identity Finder is a very powerful tool that can look complex at first glance, but IT Security has created a five part training series to help you become a successful Identity Finder administrator.
Each part in the series includes a video walkthrough along with a KnowledgeBase article describing the relevant content. You will first learn how to access the Identity Finder Console and get a brief overview of its major functions. You will then explore Policies, Scheduled Tasks and the actual process of scanning your environment. Once your scans have completed, remediation strategies, should you choose to perform remediation, will be discussed. A guide to completing the required Restricted Data Management report is the final part of the series.
For additional training resources, please consult the IT Security KnowledgeBase. The KnowledgeBase contains many more documents than what you see listed here, for a wide variety of Identity Finder topics. If you do not find answers to your questions there, please do not hesitate to contact the Help Desk.
If you experience problems using the embedded playlist, please use the links below to view the individual videos. We apologize for the inconvenience.
- An Introduction
- The Console
- Policies, Scheduled Tasks and Scans
- Scan Remediation
- Reporting Restricted Data