The details related to file compliance violations to the company policies. The report lets you identify the user, data sources, and files that violate your organization’s compliance policy.
The end-user data can be across any of the following data sources:
Endpoints such as laptops, desktops, iOS devices, and Android devices
OneDrive from Microsoft 365 services
For more information, see About Sensitive Data Governance.
The following table lists the fields in the Non-Compliant File Report.
Field | Description |
File Name | The name of the non-compliant file. |
File Path | The file path from the respective endpoint. |
File Type | The type of non-compliant file. |
File Modified On | The date and time when the file was last modified. |
Policy Violation | The name of the policy that is violated by the file. |
Sensitive Data Found | The type of sensitive data that is found in the file. |
User Name | The name of the inSync user for whom the violation occurred. |
User Id | The ID of the inSync user for whom the violation occurred. |
Data Source | The name of the data source on which the file resides. |
Match Found Timestamp | The date and time at which the violation is found in the file. |
Resolved On | The day and time when the file violation was resolved. |
Resolution Details | The details of the resolution of the file violation. For example, Auto Resolved or marked as Acceptable Risk. |