Spirion Identity Finder Performing a Scan. Introduction. Conducting a Scan

Similar documents
WebEx Downloading and Using Productivity Tools. Introduction. Downloading WebEx Productivity Tools. From the Software Center on Windows 7

Faculty/staff can request a maildrop by creating a techhelp ticket. Use the steps below to enter the ticket:

Adobe Creative Cloud Using the Desktop App (PC) Introduction. Installation Requirements. Installation

Accessing the Telephone Directory Department Rep Module

Author: Information Security Office Date Last Revised: 01/18/2012. Identity Finder User Guide

Once a USB drive has been inserted into an encrypted machine, the Dell Data Protection software will recognize the unencrypted device.

WebEx Converting.ARF to.mp4. Introduction. Installing the WebEx ARF Player

Duo Multi-Factor Authentication Enrolling an ipad. Introduction

Duo Multi-Factor Authentication Enrolling an iphone. Introduction. Enrolling an iphone

Microsoft Office SharePoint Reference Guide for Site Owners

Virtual Workspace Reference Guide for End Users

User Guide: Sensitive Data Clean-up - Employee-initiated Scans

List Service List Ownership Basics. Introduction. Navigating the Web Interface

Microsoft Office SharePoint. Reference Guide for Contributors

Office 365: Forms for Excel Reference Guide

Cisco Phone Self Care Portal Reference Guide

You will receive a message in your Inbox inviting you to the training session.

5. Click the Start Meeting button. You will enter your personal meeting room and an Audio and Video Connection window will appear.

Outlook App Downloading on an Android. Introduction. Downloading the Outlook App

OneDrive for Business

Identity Finder: Managing Your Results

Panopto. End-User Guide

What is purpose of today s training?

Office 365: The Basics Reference Guide for End Users

Events at Towson University Submission Guide. Introduction. Logging In

Office 365 Outlook Web App Room Scheduling Options & Settings. Introduction. Open the Resource Calendar Settings

ModeChanger

Handling Spirion Results

The app launcher gives quick access to all available apps. The tiles are the quick launcher for each Microsoft online app.

Virtual Desktop Infrastructure Setup for MacOS

Virtual Desktop Infrastructure Setup for MacOS

Multi-factor Authentication Instructions

Multi-factor Authentication Instructions

Adobe Creative Cloud Installation for MacOS

Symantec Encryption (PGP) Installation Guide

Windows 10 First Login Guide (Laptops) Version 1.0

DEPOSITPARTNER INSTALLATION GUIDE Desktop Application

Practice and Review Activities Software

Reno A & E, 4655 Aircenter Circle, Reno, NV (775) Release Date: February 5, 2008 All Reno A&E monitors. All versions of RaeComM.

Identity Finder User Guide

ZAVANTA Standalone Installation

Identity Finder Quick Start Guide for Mac

Procedure to Upgrade Verizon FiOS Router and Configure Xbox 360 to connect with Microsoft USB WiFi Adapter

VMware Plugin Installation for Windows 8.1 or newer

Connecting to the NJITSecure wireless network.

Switched-On Schoolhouse 2014 User Guide Reports & Application Functions

Users Guide for Orb Control Panel Orb Networks, Inc.

Digidoc Icon Camera Installation

Verifying a Restore Repository

Computer Setup Guide for SEC301

ThinkPrint a User Guide for Staff. The Latest Print Management System

A0. Special Considerations for Windows Vista a) Consideration during installation b) Runtime considerations

EnGenius Mesh AP Reset Tool Quick Guide

USING IDENTITY FINDER

System Requirements. Package Contents

Welcome to State Bank of Herscher s Online Banking!

Media Writer. Installation Guide LX-DOC-MW5.1.9-IN-EN-REVB. Version 5.1.9

BitLocker to Go: Encryption for personal USB

Version S Cincinnati, Suite 105 Tulsa, OK (918) Fax (918)

zspace 300 Windows 8.1 Configuration

8 MANAGING SHARED FOLDERS & DATA

The tool can also be accessed by clicking the Self Service Password Manager icon on your desktop, or by visiting:

Standalone Installation Instructions for GastroPlus v9.5

QuickBooks for Mac Conversion Instructions

INSIGHT Installation Instructions

Skype for Business information at-a-glance. 1. Go to .wustl.edu and login to Office 365 using your WUSTL Key;

Macintosh PC vs. Mac Common Commands. Introduction. Common Commands. Dock. Finder

Setting up your PC to sync your CSCU OneDrive for Business

a. Send Me a Push A DUO MOBILE Login request will appear on your Smartphone or Tablet. To authenticate:

Web Intelligence Rich Client Getting Started Business Objects 4.1

Tint Tek 20/20 Cloud Software Installation Guide

What can I do in the settings menu of my WL-330 (which settings are there and what can I change)?

Network DK2 DESkey Installation Guide

SAS Installation Instructions Windows 2003, XP, 2000, NT. Workstation Installation Guidelines

Maya Windows. Software Installation

Installing the WinSCP Secure FTP Client

1 Overview. 2 Installation. exacqvision-entrapass Installation Guide.

Virtual Desktop Infrastructure Setup for Windows 7

HOWTO Make an Initial Connection to the Office Anywhere Desktop using a Windows 7 based PC v1

Deposit Wizard TellerScan Installation Guide

Version 11. NOVASTOR CORPORATION NovaBACKUP

Virtual Desktop Infrastructure Setup for Windows 10

BankLink Books Clients

Portal/Extranet User Guide for Clients

How to Install and Configure Microsoft Outlook as Your Client in ACT! by Sage Premium for Web

Events at Towson University: Editor s Guide

PC-ACE Upgrade Instructions

Double click the downloaded installation file (MPMLink.exe) to initiate the installation.

Setting up VT Wireless connection Mac OSX

Using Expressions Web to Edit an FCNet Department Web Site

PST for Outlook Admin Guide

3.1 Getting Software and Certificates

PWS-100RX1/ PWS-110RX1

Using OnBase15 (Document Imaging System) for Advising.

User pages for RM Portico

MyAccount. leasehold. Happy living for the years ahead

[Type here] ID Capture V1.0

Go to SQA Academy the website address is

Using OnBase (Document Imaging System) for Advising

Cisco AMP for Endpoints Installation Guide

Transcription:

Spirion Identity Finder Performing a Scan Introduction Because data breaches are so prevalent and can be costly to the University, TU has made Spirion Identify Finder available to all faculty and staff. Spirion is a software program that scans both laptops and desktop computers for the purpose of identifying personally identifiable information (PII). This may include information like social security, credit card, driver s license, passport or an individual s bank account numbers. This self-help document will step you through how to run a self-scan. Conducting a Scan 1. Double-click the Spirion icon on your desktop. Figure 1 2. The first time using this application, the Spirion Profile Password dialog box appear. You will be prompted to create a Profile password that will be used to login from this day forward. Use a memorable password that is not your Towson login password. This password is used to save the scan results so that you can come back to them later and to speed up subsequent scans. The software will not re-scan anything that has been previously scanned and has not been modified. Note: The profile password is not stored anywhere and therefore if it is lost or forgotten, all the information in the profile will be lost. For further information on how to reset a profile password, please refer to the Identity Finder s FAQ. 3. Enter and Confirm your password in the designated boxes and click Next. Note: Never use your Towson password for any login other than NetID. Figure 2 OTS Publication: idf01 02/01/2018 Training@Towson.edu Office of Technology Services 2018 Towson University This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs License. Details available at http://www.towson.edu/otstraining

4. A Spirion Profile Password Set window will appear. Click the OK button. Figure 3 5. The Spirion Search Wizard box will appear. Click the Continue Search Wizard button. Figure 4 6. In the following screen, click the Configure Search button. Figure 5 2

7. The Automatic Search Using AnyFind box will appear. Make sure to select Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Driver Licenses, and Passport Numbers. 8. Click the Next button. Figure 6 9. The Locations box will appear. Make sure Files and Compressed Files, Browsers and E-Mails and Attachments are chosen under Locations. By default, My Computer is chosen under File Locations. This will scan your hard drive, CD s, DVD s; and any USB that is connected to your machine (this is the recommended setting). 10. Click the Next button. Figure 7 3

11. The Confirmation box will appear with a summary of your search selections. Click the Finish button. Figure 8 12. The scan will begin. A Status box will appear which will track the progress. Figure 9 Note: Spirion can take an extended period of time to complete a scan. This has potential to affect your computer s normal performance. We advise performing scans with this in mind. 4

Scan Results After running the security scan, the Search Summary dialog box will appear. You must now decide what to do with the files found to be a security risk. 1. From the Search Summary box, click the Wizard icon to walk you through the search summary results. Figure 10 2. The next screen will explain how identified files will be displayed. As you move from page to page, Identify Finder will display files in different locations on the computer that are a security risk. Identity Finder will show you files found in E-mail first and then in Folders. 3. Click Next. Figure 11 5

E-Mail 1. First, E-mail files are shown. The Wizard gives you the option to Shred or Ignore the results. If the Wizard did find PII than you need to remove them from your computer. If no E-Mail files were found, skip to the Folders section on page 7. 2. Select the files by clicking in the check box beside the file and click Shred Selected. 3. Click Next. Figure 12 4. The Spirion dialog box will appear to let you know that this item will be disposed of properly. The example below is the identity matches found in Outlook email. Click Yes. Figure 13 Note: Spirion searches email bodies and attachments. If PII is found as an attachment, the entire body of the email will be shredded. 5. A message will appear confirming the item was shredded. The email will be removed from Outlook. 6. Click OK. Figure 14 6

Folders 1. Second, folders are evaluated. If PII is found in folders, you have an additional option to Quarantine Selected. This option is only recommended if you are currently a secure share owner. If you do not have a secure share, skip to step 6 on page 8. 2. Select the files by clicking in the check box beside the file and click Quarantine Selected. 3. Click Next and you will be prompted to either enter a location for the quarantined file or shred the file. Figure 15 4. In the Quarantine window, click the more ( ) button to select a secure share (this is the only secure location for a PII). The Browse for Folder window will appear. If you have been given access to a secure share, its location will appear here. Figure 16 7

5. Choose the location and click the OK button. The file has been quarantined. Figure 17 6. If you do not have a secure share and you have PII that you need to remove, you should choose the Shred Selected option, select the files and then click the Next button. Figure 18 7. A warning will populate to allow you a second chance to review what is about to be shredded. Click the Yes button. Figure 19 8

8. A message will appear confirming the item was shredded. Click the OK button. Figure 20 9. A box will appear with instructions about scheduling periodic searches. If you would like to perform future searches manually instead of automatically, uncheck the box beside Schedule a weekly search and then click the Finish button. Figure 21 9