Configuration guide: Shadow IT and data loss visibility

The configuration options on this page are only accessible to administrators.

Refer to the Usage guide: Shadow IT and data exfiltration prevention to use library content as a standard user.

Prerequisites

This library pack contains content from the following required expansion products:

  • Employee Engagement – Campaigns

Some of these products offer default access to their respective content and can still be used without expansion products

Content list and dependency

This library pack contains the following content and dependencies:

Type
Name
Description
Dependencies

Shadow IT and data exfiltration prevention

Helps to find and monitor non-compliant applications and web services that could put corporate security at risk or show that the IT setup is not suitable for certain tasks.

Non-compliant application access warning

Informs users about the use of non-compliant applications and offers compliant alternatives

Configuration guide

To effectively use this library pack, the content must be installed and configured appropriately. Below are some suggested steps to install and configure the content properly before use.

Step 1 - Install library pack content

Go to the Nexthink Library and install all required content.

Step 2 - Edit campaigns

Navigate to the manage campaigns administration page to review and edit your campaigns.

For each installed campaign, please ensure to:

  • Customize the sender name and image.

  • Review and adjust questions.

  • Publish the campaign when you are ready to use it.

We recommend the following configurations for this campaign:

Name
Trigger
Priority

Non-compliant application access warning

Manual

Urgent


RELATED TOPICS

Last updated

Was this helpful?