Start

Getting Started with Data Protection

Data Protection in the eAuditor system enables IT administrators to create advanced workflows based on triggers, actions, and notifications.

Understanding Core Concepts

  • Trigger - specifies when the automation should be triggered. It can be associated with time (e.g., a daily schedule), an event (e.g., installation of new software), or device status (e.g., low disk space).

  • Action - defines what operation should be performed when the trigger conditions are met, e.g., installing an update, executing a script, or shutting down a device.

  • Notification - feedback sent to the administrator (e.g., email) or to the end user (e.g., an on-screen message).

  • Data Protection Policy - a set of rules composed of triggers, actions, and notifications. Policies can be assigned to user groups or devices, enabling precise management.

On the screenshot, the following are marked in red policies, and in green rules. Rules can appear in multiple policies simultaneously because a policy is a collection of rules.

Policies are assigned to objects (such as computers, servers, or users). Every user or device assigned to a given policy is subject to all rules contained in that policy.

Rules within policies can be independently enabled and disabled, pinned or unpinned. Changes are global — they apply to all users and devices assigned to the given policy.

Main Policy View

Data Protection Policy View

The system's main view contains a list of data protection policies, each of which can be expanded to review detailed rules.

How to use the main view?

  1. Browsing Policies

    • You can expand and collapse the lists of rules assigned to each policy.

    • Policies can be filtered, edited, deleted, or new ones can be created.

  2. Creating New Policies

    • Use the + Add policyoption to begin the configuration process (see: Creating a New Data Protection Policy).

  3. Creating Rules

    • Click + Add Ruleto add new rules to an existing policy (see: Creating a Data Protection Rule).

Summary

Getting started with data protection requires familiarization with the core concepts and functionalities available in the system. The following sections of the documentation will cover in detail creating policies, defining rules, configuring actions, and analyzing system behavior based on logs.

Last updated

Was this helpful?