
VMware, Inc. 103
Chapter 8 vShield Data Security Configuration
<fileName>C:\TruePositives\SocialSecurityNumbersTP1.05.txt</fileName>
<fileExtension />
<fileLastModifiedTime class="sql-timestamp">2011-02-01
15:02:00.0</fileLastModifiedTime>
<vm>
<name>jim-xp32-dlp1</name>
<revision>0</revision>
</vm>
<cluster>
<name>JimCluster</name>
<revision>0</revision>
</cluster> \
<dataCenter>
<name>jkiryakoza</name>
<revision>0</revision>
</dataCenter>
<violations>
<ViolationInfo>
<identifier>99</identifier>
<revision>0</revision>
<regulation>
<objectId>152</objectId>
<name>California SB-1386</name>
<description>Identifies documents and transmissions that contain
personally identifiable information (PII) as regulated by
California SB-1386 (Civil Code 1798). Businesses that own
or license computerized PII about California residents
are required to maintain security procedures and
practices to protect it from unauthorized access,
destruction, use, modification, or disclosure. Any
business that operates in California and owns or licenses
computerized PII data for California residents,
regardless of the physical location of the business, is
required to comply with this law. This policy detects US
Social Security numbers, credit card numbers and
California drivers license numbers. This regulation has
been amended to protect health and medical information
that can be found in California AB-1298. </description>
<revision>0</revision> </regulation>
<firstViolationReportedTime class="sql-timestamp">2012-01-26
12:56:42.0</firstViolationReportedTime>
<lastViolationReportedTime class="sql-timestamp">2012-01-26
12:56:42.0</lastViolationReportedTime>
<cumulativeViolationCount>1</cumulativeViolationCount>
<violationCount>0</violationCount>
</ViolationInfo>
</violations>
</ViolatingFile>
</dataPage>
</ViolatingFiles>
Where:
context_IDistheMOIDofadatacenter,cluster ,folder,resourcepool,orvirtualmachine..
pagesizeisthenumberofresultstoview.
startindexisthepagenumberfromwhichtheresultsshouldbedisplayed.
Get List of Violating Files in CSV Format
YoucanviewareportthatdisplaystheviolatingfilesandtheregulationseachfileviolatedinaCSVformat.
Example 8-29. Get list of violating files in CSV format
Request:
Komentáře k této Příručce