Skip to main content

18 docs tagged with "reference"

View all tags

About the Product

Overview of Data Security Essentials - A comprehensive solution for protecting unstructured data with quotas, blocking, auditing, and automated management

Alarms

Comprehensive alarm management in Data Security Essentials - Monitor system health, security events, and connection status

Alerts Handling

Comprehensive guide for managing security alerts in Data Security Essentials - Email notifications and Windows Event Log integration

Audit Tasks

Complete guide for configuring audit tasks in Data Security Essentials - Monitor file access and security events

Configuration

Configuration guide for Data Security Essentials - Storage system integration, inventory management, licensing, and system settings

Data Security Essentials

Official Data Security Essentials documentation - Complete guides for ransomware protection, threat detection, and security monitoring for unstructured data

Installation Guides

Complete installation guides for Data Security Essentials - Step-by-step instructions for DSE and Smart Policy Manager deployment

Inventory & Licensing

Complete guide for managing device inventory and licensing in Data Security Essentials - Device management and license administration

Policy Triggers

Complete guide for configuring security policy triggers in Data Security Essentials - Automated detection and response to ransomware and suspicious activities

Prerequisites

Comprehensive prerequisites for Data Security Essentials - Hardware, software, and storage system requirements for successful deployment

Release Notes

Data Security Essentials 1.3.0 release notes - Fixed issues, enhancements, and known issues

Storage Integration

Complete guide for integrating storage systems with Data Security Essentials - FlashBlade, FlashArray, and other platforms

System Settings

Complete guide for configuring system settings in Data Security Essentials - Database management and email notifications setup

Threat Detection

Advanced threat detection capabilities in Data Security Essentials - Ransomware monitoring, audit tasks, and security alert management

Threat Review

Comprehensive guide for reviewing and responding to security threats in Data Security Essentials - Investigation and remediation workflows