Reference Guide

Navigate Dell Security Center
66
events
Add
A protected file or email was shared with a user or a group. This applies
to pre
-share.
Remove
Data Guardian Access to a protected file or email has been revoked from
a user or a group.
Request
A user had to request access to a protected file or email because they
did not have access.
Examples of Map Visualization and Column Filters
You can alternate between drilling in at the map level and drilling in at the filter and search level. For
example:
Endpoint or endpoint group - If geolocation is enabled, the map displays the location of the
events for each endpoint's .xen and protected Office files. If the map indicates protected files in
an unexpected location, you can use the audit data to identify who modified the file. If several
users modified the file, you can filter the time stamp column to determine the last person who
modified it.
User - You can audit a users' file activities. For example, in Columns, if you select Action, the
protected Office files for that column can list Created or Modified. If you also select Data
Guardian Action, the column lists the reason for a user modifying files, such as Updated or
Swept. For information on Action and Data Guardian Action, see
Options_in_the_Columns_menu, Cloud Encryption audit events
, and
Protected_Office_Document_or_Basic_File_Protection_audit_events.
Example of drilling in at the map level
1. In the global view, drill in to a marker cluster and select a blue marker.
2. Select the Show only visible check box for the columns to list only the files for that audit event.
3. Click
next to a device, user, file name, or key ID.
For example, click
next to a user name, then click next to a file name to zoom to the map
location of the specified user when a specified file was accessed.
4. Clear Search and press Enter to return to the global map view.
Return to Data Guardian
policies.
Get Started with Data Guardian Audit Events
Before you begin, navigate to Populations > Global > Settings and select the Data Guardian Audit
Data Enabled policy for these policy groups:
Audit Control Policies (for Windows or Mac)
Web Portal Audit Policies
Mobile Audit Control Policies
In the Dell Security Center > Reporting > Audit Events, use these examples to get started.
For detailed information about column options, see Data Guardian and Audit Events.
Audit Protected Office Documents