SHSU Technology Tutorials | Identity Finder
You will be taken to the “Identity Finder Wizard” screen. Choose the “Continue in Wizard Mode” Radio Button and click “Next”
Choose The Personal Information you would like to search for and click “Next”:
You will be asked if you want to provide personal information to search for. Choose the “No” radio button and click “Next”
You will be asked where you would like to search.
Click “All Files”, “E-Mails and Attachments” and “Windows Registry”. In the “File Locations” section, choose either “My Documents and Settings”, “My Computer” or “Custom Location”.
The recommended setting would be “My Computer” or “Custom Location” for scanning your S:\ Drive or departmental share on T:\
A screen will be displayed verifying your options. If these are incorrect, click “Back” and correct them. If they are correct, click “Finish” to begin searching.
A screen displaying the current status will be displayed. If you wish to continue working while the search runs, you can click the “Hide” button and minimize the window.
Once the scan is complete, you will be prompted on what actions you would like to take. Select the “Advanced” Radio Button and click “OK”
The Identity Finder Screen will display the files containing Personal Information on the Left, and a preview of the file on the right.
Select a file containing Personal Information on the Left and verify that it does contain Personal Information. Identity Finder provides multiple actions in the toolbar located at the top of the window.
The “Secure” button will encrypt or obfuscate the personal information using the built in mechanisms of the associated application such as Adobe Acrobat or Microsoft Word.
The “Shred” function will delete the file and overwrite it to ensure no recovery is possible. The “Recycle” option will move the file to the Recycle Bin,
and the “Quarantine” option will move the file to a separate location for later processing.
The preferred option is to “Shred” the file if the data is no longer necessary. If the file should be kept, the “Secure” option should be used to encrypt the file.
Ensure the file was successfully deleted or encrypted.
Continue through the list of files on the left until all files have been Shredded or Encrypted. Once completed, press the green “Start” button on the upper left to perform a follow-up search to verify all files containing personal information were remediated.