The details related to file compliance violations to the company policies. The report lets you identify the user, data sources, and files that violate your organization’s compliance policy.
The end-user data can be across any of the following data sources:
Endpoints such as laptops, desktops, iOS devices, and Android devices
OneDrive from Microsoft 365 services
The following table lists the fields in the Non-Compliant File Report.
Field | Description |
File Name | The name of the non-compliant file. |
File Path | The file path from the respective endpoint. |
File Type | The type of non-compliant file. |
File Modified On | The date and time when the file was last modified. |
Policy Violation | The name of the policy that is violated by the file. |
Sensitive Data Found | The type of sensitive data that is found in the file. |
User Name | The name of the inSync user for whom the violation occurred. |
User Id | The ID of the inSync user for whom the violation occurred. |
Data Source | The name of the data source on which the file resides. |
Match Found Timestamp | The date and time at which the violation is found in the file. |
Resolved On | The day and time when the file violation was resolved. |
Resolution Details | The details of the resolution of the file violation. For example, Auto Resolved or marked as Acceptable Risk. |