
- Filelocator pro search for folder how to#
- Filelocator pro search for folder mac os#
- Filelocator pro search for folder Offline#
- Filelocator pro search for folder zip#
It does not require indexing, is fast, and uses very little memory. uses Boolean logic, multi-thread searching, relative date/time searches, search tab navigation, etc.įinds files and folders by name or content using advanced Boolean operators, wildcards, and phrases.
Filelocator pro search for folder zip#
Sophisticated grep tool for Windows that allows the user to configure the search tool with regular expressions. Works only on a per-seat basis, no network/enterprise level application, no developer options.Ĭapability to search hundreds of file formats, including PDFs, zip files, PSTs, etc.
Filelocator pro search for folder mac os#
Can be used for any type of data searching.Īpplicability: Windows, UNIX, Mac OS (Beta)

NET, Java, and C++ SDKs for many platforms are available. Enterprise and developer products are available for purchase.

Filelocator pro search for folder Offline#
Reduced Internet2 pricing is available.Īpplicability: Windows, Mac OS, Linux DTSearchĬommercial product for searching of text in a wide range of on and offline data types both desktop and network searching capabilities using the Spider engine. Kellogg School of Management is a current user on campus. Discovers and classifies data, custom reporting, roll based access control, real-time discovery, etc. Further, plan for at least a day to collect and examine data on a loaded machine.Ĭan be run both on a single target and on a central management system (agent based). The following PII data search tools have been tested by NUIT, and may provide preventative and remedial measures for locating PII on University desktop computers.įor every tool, make sure that it checks all possible files that may contain sensitive data, and be aware that PDFs and ZIP files may cause problems, though these formats may contain PII data.

These measures may be especially relevant for users who frequently come in contact with social security and credit card numbers, such as business managers, lead administrative personnel, and accounts receivables staff. If your department is interested in conducting a search for sensitive data, NUIT's Distributed Support Services can provide guidance in this process. Tools should be used by technical support staff only. A short reference about character string searching is available from the IT Information Security Office.
Filelocator pro search for folder how to#
Technical support staff should also have knowledge of how to create searches with wildcard and other character strings for SSNs and credit card numbers. In addition, use of these tools is often time and CPU-intensive, requiring a day or more of processing time. No single vendor provided a comprehensive solution, and the best results were achieved when products were used in combination with others. NUIT has reviewed several open source and vendor supported applications that are designed to identify occurrences of Social Security Numbers (SSNs) and other types of sensitive data. The programs and processes outlined within this guideline may be able to identify and protect PII that resides on personal computers and servers. Though complete data security relies on a multitude of factors, technology-oriented tools can be used to reduce the risk of exposure. The critical importance of securing sensitive data and personally identifiable information (PII) on University desktop computers calls for technical support staff to be aware of possible preventative and remedial measures. Guideline for Using Sensitive Data Search Tools Learn Moreĭirect access to essential campus systems. Protecting University and Personal Data Get Secureīuilding innovative technological environments for the Northwestern community. Providing technical IT support for members of the University Get Support Getting access to Northwestern services Get Connected Providing academic, research, and administrative IT resources for the University.
