Skip to content

Application Main Screen

The Applications page enables a user to view, add, modify, or delete applications. The Applications main page is located at Admin > Applications.

The Applications grid provides the following columns:

  • Name – Name of application
  • Description – Additional information about the application
  • Type – Common search or grouping criteria
  • Tags – Allows users to group applications together
  • Actions - Provides multiple options for the user, including editing or deleting the application

The amount of rows displaying applications can be changed with the Rows per page drop down at the bottom left of the page. The user can also click through pages with the left and right arrows at the bottom right of the page.

Within the Applications main page, a user can perform any of the following actions:

  • Add New - This options allows the user to add a new application.
  • Filters - Allows the user to have a more defined search. Searchable items are Name, Type, and Tags.
  • Edit - Allows various details about the application to be edited.
  • Delete - Allows the user to delete the chosen application. The deleted application will not be available on the grid and a task will be created to clean the application references and data. This deletion task can be monitored on the Tasks screen.
  • Exclude Top Level Resources - Function allowing the user to exclude top level resources from being retrieved by a crawler action. This feature is only available after the crawl.
  • Manage Resources - Browse and manage all resources within the application. This action moves the user to the Resource Explorer.

Managed Normalized Resources isn’t supported by all the application types and there are specific settings which should be defined during creation of the application in order to see this option.

Adding Applications to Data Access Security

An application is a component that represents the monitored system, such as, Microsoft Outlook, Active Directory, MS Windows file servers.

All active applications can be seen in Admin > Applications. You can add tags to applications in order to better group them.

In order to integrate with a component, an application entry needs to be created first. This entry includes the identification, connection details, and other parameters necessary to create the link. To add a standard application, use the New Application Wizard.

Important

The actual configuration pages and fields vary according to the application type you are adding. For a detailed description, see the relevant connector installation guide in Compass or on the Data Access Security connector website.

Note

For bulk application loading, use the Bulk Application Wizard. See the connector installation guide. For example, Adding New Bulk Application (CIFS only).

Note

When onboarding a new application, do not use a backslash in the name of the application.

  1. Navigate to Admin > Applications.
  2. Select Add New to open the wizard.
  3. Select Standard Application.
  4. Select Next to open the General Details page.

    • Application Type - Select the application type from the dropdown list
    • Application Name - Logical name of the application
    • Description - Description of the application
    • Tags - Select tags for the application from the dropdown menu, and / or type a new name, and press Enter to create a new tag. The dropdown list of tags filters out matching tags as you type and displays up to 50 tags.
    • Identity Collector - Select the appropriate identity collector

The following configuration pages include all or part of the following:

  • Connection Details - Server and user credentials to connect to the remote system. The application ID needs to be provided as well as an uploaded assigned certificate. The supported file formats are either pfx or p12.
  • Crawler and Permission Collection - Associate an application with a Central Permission Collector Service. This service is responsible for running the Permission Collector and Crawler tasks. You also can set a schedule for both tasks as well. See Scheduling a Task for more information.

Note

The Crawler task progress bar will progress based on the number of resources scanned.

  • Data Classification - Associate the application with a Data Access Security Data Classification Collection Cluster. This service is responsible for running the Data Classification data collection tasks on dedicated virtual appliances.