OVERVIEW

With Micro Focus Data Access Governance (Powered by File Reporter), organizations have the ability to identify access permissions to the largest and oftentimes most vulnerable data segment—unstructured data. Through integration with Micro Focus Identity Governance, these same organizations can also expand the capabilities of access reviews so that folders containing potentially confidential, sensitive, or regulated files can be easily reviewed to see user access permissions and if those permissions need to be kept, removed, or changed.

  • Integrates with Identity Governance: Conduct access reviews for applications and unstructured data in the same interface.
  • Extends access review capabilities: Access reviews can now include user access to high-value targets on the network.
  • Permissions by Path reports: Identifies all users who can access a specific network share or folder.
  • Permissions by Identity reports: Specifies all of the network shares and folders a user can access.
  • Historic Comparison reports: Specifies the differences in permissions of the same target path between two points in time.
Tech Specs
Database
Microsoft SQL Server or PostgreSQL
Engine
Windows Server 2012 R2 or greater
Windows agent
Windows Server 2008 R2 SP1 or greater
HIGHLIGHTS
Enables unstructured data repositories for access review

Through Data Access Governance, you specify the target paths for review. The paths then appear in the Identity Governance interface and can be reviewed the same way you perform an application review.

Enables unstructured data repositories for access review
Determines quickly who has access to high-value targets

Through the Permissions by Path report, determine who can access a specific folder, the effective NTFS permissions enabling that access, and how those permissions are derived.

Determines quickly who has access to high-value targets
Identifies all of the network folders where a user has access

Through the Permissions by Identity report, identify all of the network folders a specific user has access to and the explicit NTFS permissions of that user.

Identifies all of the network folders where a user has access
Compares permissions between two points in time

Historic Comparison reports specify the differences in permissions of the same target path between two points in time.

Compares permissions between two points in time
Sign up for updates