Community in read only mode June 18 & 19
This community will be set in READ ONLY mode for a while on Tuesday June 18 into Wednesday June 19 while we import content and users from our Micro Focus Forums community site. MORE INFORMATION

New Integration between File Reporter Technology and Identity Governance Enables Access Reviews

buckgashler Absent Member.
Absent Member.
0 0 706

The Challenge of Safeguarding Sensitive Data

Today’s organizations are facing expansive requirements for safeguarding sensitive and confidential information. Whether it’s intellectual property, financial information, or PII (Personal Identifiable Information), there are data access risks that if not addressed properly, can be potentially devastating to an organization.

With the risk of having to pay huge fines for noncompliance, most organizations pay particular attention to privacy regulations such as HIPAA, FERPA, and GDPR by restricting access and certifying that only authorized users can access records containing PII. But these same organizations oftentimes don’t give the same diligence to restricting and certifying that only authorized users have access to other sensitive and confidential information such as legal or financial documents.

Sensitive Information in Stored Data

For most organizations, sensitive and confidential information can be found in data stored both in databases and the network file system. This distinction in data is respectively known as structured and unstructured data.

While conducting access reviews to applications and databases storing structured data is easily accomplished with an identity management or access governance system, these systems generally lack the ability to do so on the network file system.

The Risk of Unauthorized Access to Unstructured Data

As the repository of more than 80 percent of an organization’s data, the network file system is oftentimes the most vulnerable location for unauthorized access to sensitive and confidential files. Today, headline-baring data breaches of sensitive and confidential information accessed from network file systems at large corporations are the new norm.

A New Micro Focus Solution for Access Review of Unstructured Data

With the objective of better safeguarding sensitive and confidential information located in unstructured data, the development teams of Micro Focus File Reporter and Micro Focus Identity Governance began integration work together in 2018 to provide the means of conducting access reviews on network-stored unstructured data. In other words, enabling Identity Governance to perform the same certification and attestation of authorized access to unstructured data as it does to structured data.

The recent releases of Identity Governance 3.5 and File Reporter 3.6 was the fruition of this integration work. Alternatively, there is a version of File Reporter focused almost solely on this integration. An offering named Data Access Governance (DAG) was introduced to include Identity Governance integration and most of the security reporting features of File Reporter without all of the file system reporting or custom-query reporting capabilities. Both File Reporter 3.6 and DAG integrate with Identity Governance 3.5 and provide the means of enabling access reviews for unstructured data. Another way to think about it is that File Reporter 3.6 includes all capabilities of DAG.

How it Works

After File Reporter or DAG conducts a Permissions Scan and performs a permissions abstraction, it can be imported into Identity Governance for access review. You will first have to do some configuration work to get the two applications to communicate (it’s all in the documentation) and you’ll need to do a little bit of initial setup, but after that, integration between the two products is pretty straight forward.


Conducting an access review for a finance folder in the network file system. Similar to application access in Identity Governance, reviewers can keep or change access permissions (Read, Write, or Change Permissions).


The integrated solution between Identity Governance and File Reporter/DAG is almost exclusive in the market today because it uses Active Directory identities as the means of access review and management. For customers using an identity management system such as Micro Focus Identity Manger, this solution is a logical addition engineered to provide certification and attestation of compliance to security regulations and policies.

Part of a Comprehensive Data Access Governance Solution

The ability to conduct access reviews on unstructured data is just part of an overall data access governance solution from Micro Focus. Micro Focus File Dynamics recently introduced Security Notify policies that let you monitor network folders for any changes in access permissions and then notifies designated data owners immediately about these changes. Security Notify policies are just the first in a family of soon-to-be-released security-related policies.

These new policies will protect high-risk targets by enacting automated permissions remediation, protecting network folders from having access permissions changed, and much more.

The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.