Reference Guide

Navigate the Dell Server
102
Protected Office (Windows, Mac, mobile, and web portal) - also applies to
Cloud_Access_Security_Broker
System - Populates the user logged into or logged out of the device that has Data
Guardian installed.
Content Based Protection - previously Data Classification (Windows)
Protected Email (Windows) - Relates to files other than protected Office
documents.
Share (Windows) - Lists events when a user shares one or more files or attaches
an encrypted file to an email.
Beacon - (protected Office documents) Indicates a device without Data Guardian
installed that tried to access a protected file. These audit events may have limited
data. For example, the location where the file was accessed but without the name
of the user of the device.
Time stamp - Select the amount of past time for audit events to display - 1, 7, 14, 30, 60, or 90
days.
More - If you set filters and create a query, you can select the filter options in More to modify
the query. As you select an option, it displays as a menu. Some actions apply to Windows,
Mac, and mobile devices. Some are specific to one or more.
Action - The default is All. Select one or more check boxes to display specific actions
associated with the payload file. See Action
and the tables below for details and to
determine the operating system.
Cloud Action - The default is All. Select one or more check boxes to display the
reason for an Action. See Cloud_Encryption_audit events
and the tables below for
details and to determine the operating system.
Data Guardian Action - The default is All. Select one or more check boxes to display
the reason for an Action. See
Protected_Office_Document_or_Basic_File_Protection_audit_events
and the tables
below for details and to determine the operating system.
Net Action - (Windows and Data Guardian v2.7 and earlier)
Grouping - Allows you to select one option. The default is None. For example:
Moniker - Groups by moniker if you have more than one selected.
Device or User - Allows you to determine the activity of specific devices or users.
File Name, File Path or File Key ID - With device and user columns added, allows you
to see which users or devices accessed a file.
Columns - Filter the amount of data by selecting one or multiple columns to display. If you
clear all column check boxes, audit events are listed for all endpoints and all users. Some filters
apply to all monikers and some to specific monikers. For a description of column filters, see
Options_in_the_Columns_menu
.
Search - Hover to view columns for performing a search (device, user, file name, and file key
ID), then enter specific text for those columns. Use a wildcard (*) to search on .docx, .pptx,
.xlsx, .docm, .pptm, .xlsm, or .pdf.
Export File - Export to Excel or a .csv file.
Options in the Columns Menu