Reference Guide

Navigate the Dell Server
108
Audit - If a rule in the Categories list has a priority of two and higher, audit events are
created.
Encrypt - If the Encrypt check box is selected for a rule in the Categories list, the file was
encrypted based on the rules set.
Public rule has no actions.
Content Rule Triggers
The rules that cause the actions to occur.
Column options for Protected Email only (Windows)
Audit Event - Column options
Description
Email Keyid
The Key ID used to protect the email.
Email Subject
Subject line from the email.
Email From
The email address of the person who sent the email.
Email To
Email addresses of recipients.
Email Cc
Email addresses of those copied.
Email Bcc
Email addresses of those blind-copied.
Email Attachment
Names of attachments added to the email.
Email Action
What the user did with the action. In
Protected_Office_Document_or_Basic_File_Protection_audit_events , see Opened, Sent, Reply, and
Forwarded.
Column options for Share only (Windows)
In Column_options_for_all_audit_events
, see User, Logged in User, Client Type, Action. You can
also select File, Email, Group, and Status.
Actions for Share are listed here.
Actions
for Share
audit
events
Description Windows
Add
A protected file or email was shared with a user or a group. This applies
to pre
-share.
Remove
Data Guardian Access to a protected file or email has been revoked from
a user or a group.
Request
A user had to request access to a protected file or email because they
did not have access.
Examples of Map Visualization and Column Filters
You can alternate between drilling in at the map level and drilling in at the filter and search level. For
example:
Endpoint or endpoint group - If geolocation is enabled, the map displays the location of the
events for each endpoint's .xen and protected Office files. If the map indicates protected files in
an unexpected location, you can use the audit data to identify who modified the file. If several
users modified the file, you can filter the time stamp column to determine the last person who
modified it.
User - You can audit a users' file activities. For example, in Columns, if you select Action, the
protected Office files for that column can list Created or Modified. If you also select Data
Guardian Action, the column lists the reason for a user modifying files, such as Updated or
Swept. For information on Action and Data Guardian Action, see