Ticket types for Endpoint Data Governance
Coro detects unauthorized exposure of privacy-sensitive data on endpoint devices. When an admin user configures sensitive data settings, Coro flags unauthorized exposure and creates one of the following user data governance tickets to alert them, based on the sensitive data types detected:
- Endpoint drive with Credit Card Data
- Endpoint drive with Health Data
- Endpoint drive with Non-Public Data
- Endpoint drive with Personal Data
note
Use the Type filter in the Ticket Log to find sensitive data ticket types.
Important
Coro renamed the following ticket types in version 3.4.2:
Previous ticket type (deprecated) | Current ticket type |
---|---|
Endpoint drive with PCI | Endpoint drive with Credit Card Data |
Endpoint drive with PHI | Endpoint drive with Health Data |
Endpoint drive with NPI | Endpoint drive with Non-Public Data |
Endpoint drive with PII | Endpoint drive with Personal Data |
Coro does not use deprecated ticket types for new tickets.
Coro shows both deprecated and current ticket types in the left pane of the Ticket Log when you use the Type filter.
To learn more about what information constitutes these sensitive data types, see Regulatory sensitive information types.
Data compliance officers might need to review privacy-sensitive tickets to meet regulatory standards, such as GDPR and HIPAA. Coro classifies these tickets as suggested for review and automatically closes them after two weeks.
Privacy-sensitive data tickets include the following actions:
Action | Outcomes |
---|---|
Close ticket | Close this ticket as considered remediated and take no further action. Note: When a device is removed from protection, all open tickets associated with the device are automatically closed. |
Encrypt drive | Encrypts the hard drive of the device. A record is added to the Activity Log: "Drive encryption was requested on <device name> of user <user> (drive: '<drive >')" When drive encryption is complete, a further record is added to the Activity Log: "Drive was encrypted on <device name> by <user>" Encryption keys are stored on both the device (by BitLocker) and on Coro's secure servers. |
For further information on how Coro protects an organization's device data, see Introducing Endpoint Data Governance.
For further information on data governance ticket management, see Ticket management.