Viewing governance details about the data stored in your organization
Contributors Download PDF of this page
Gain control of the costs related to the data on your organizations' storage resources. Cloud Data Sense identifies the amount of stale data, non-business data, duplicate files, and very large files in your systems so you can decide whether you want to remove or tier some files to less expensive object storage.
Additionally, if you are planning to migrate data from on-premises locations to the cloud, you can view the size of the data and whether any of the data contains sensitive information prior to moving it.
The Governance dashboard
The Governance dashboard provides information so that you can increase the efficiency and control the costs related to the data stored on your storage resources.
You may want to investigate the items in the Saving Opportunities area to see if there is any data you should delete or tier to less expensive object storage. Click each item to view the filtered results in the Investigation page.
Stale Data - Data that was last modified over 3 years ago.
Non-Business Data - Data considered not to be business related, based on their Category or File Type. This includes:
Miscellaneous (general "other" category)
Duplicate Files - Files that are duplicated in other locations in the data sources you are scanning. See what types of duplicate files are displayed.
A quick overview of all the data that is being scanned. Click the button to download a full data mapping report that includes Usage Capacity, Age of Data, Size of Data, and File Types for all working environments and data sources. See Data Mapping Report for complete details.
Policies with the largest number of results
Click the name of a Policy in the Policy area to display the results in the Investigation page. Click View All to view the list of all available Policies.
Click here to learn more about Policies.
Top data repositories listed by data sensitivity
The Top Data Repositories by Sensitivity Level area lists up to the top four data repositories (working environments and data sources) that contain the most sensitive items. The bar chart for each working environment is divided into:
Sensitive Personal data
You can hover over each section to see the total number of items in each category.
Data listed by types of Open Permissions
The Open Permissions area shows the percentage for each type of permissions that exist for all files that are being scanned. The chart shows the following types of permissions:
No Open Access
Open to Organization
Open to Public
You can hover over each section to see the total number of files in each category. Click each area to view the filtered results in the Investigation page so that you can investigate further.
|Files in OneDrive accounts and in databases are not represented in this chart.|
Age of Data and Size of Data graphs
You may want to investigate the items in the Age and Size graphs to see if there is any data you should delete or tier to less expensive object storage.
You can hover over a point in the charts to see details about the age or size of the data in that category. Click to view all the files filtered by that age or size range.
Age of Data graph - Categorizes data based on the time it was created, the last time it was accessed, or the last time it was modified.
Size of Data graph - Categorizes data based on size.
Most identified data Classifications
Categories can help you understand what’s happening with your data by showing you the types of information that you have. For example, a category like "resumes" or "employee contracts" can include sensitive data. When you investigate the results, you might find that employee contracts are stored in an insecure location. You can then correct that issue.
See Viewing files by categories for more information.
Reviewing your file types can help you control your sensitive data because you might find that certain file types are not stored correctly.
See Viewing file types for more information.
If you have subscribed to Azure Information Protection (AIP), you can classify and protect documents and files by applying labels to content. Reviewing the most used AIP labels that are assigned to files enables you to see which labels are most used in your files.
See AIP Labels for more information.