User Operations on Files with Personally Identifiable Information (PII)

Applies To: WatchGuard Advanced Reporting Tool and Data Control

The User Operations on PII dashboard shows the types of operations run on personal data files in your organization, as well as the type of device that contained the data (fixed or mobile device).

To open the Operations on PII Files dashboard, from the WatchGuard EPDR or WatchGuard EDR web UI:

  1. From the top navigation bar, select Status.
  2. From left pane, select Advanced Visualization Tool.

    A new browser tab opens.
  3. From the left pane, select Data Control > User Operations on PII Files.
  4. Select a time period to filter the data on.

Screen shot of Advanced Visualization Tool date selector

  1. Click Refresh.
    The dashboard shows information for the time period selected.

The dashboard includes two tabs:

User Operations

The User Operations tab shows the types of operations performed on personal data files and the device type.

Screen shot of Advanced Visualization Tool, Data Control > User Operations tab

The User Operations section shows the types of operations performed on personal data files, and the users involved in data exfiltration or infiltration operations.

The Types of Operations section shows the types of operations performed on personal data files, as well as the type of device that contained the data (fixed or removable device).

Most Active Users

The Most Active Users tab shows users who are most likely to be responsible for a data breach, based on the number of operations they perform on personal data files and the malware run on their devices.

Screen shot of Advanced Visualization Tool, Data Control > Most Active Users tab

The Active Users by Type of Operation section shows the users that have performed the most operations on files with PII.

The Top Users Running Malware section shows the users that have run the most processes classified as malware.

Screen shot of Advanced Visualization Tool, Most Active Users tab

The Top 10 Users with Attachments that Include PII section shows the number of attachments with PII sent and received by users as a percentage of the total number of attachments with PII sent and received by all users on the network.

See Also

About Data Control Advanced Visualization

About Personally Identifiable Information (PII) in Data Control

User Operations on Files with Personally Identifiable Information (PII)

Risk of PII Exfiltration

User Monitored Files