Skip to main content

Who is this article for?

Incydr
Code42 for Enterprise
CrashPlan for Enterprise
CrashPlan for Small Business

Incydr, yes.

CrashPlan for Enterprise, no.

Code42 for Enterprise, yes.

CrashPlan for Small Business, no.

This article applies to Code42 cloud environments.

HOME
GETTING STARTED
RELEASE NOTES
FAQS
SYSTEM STATUS
Code42 Support

Data Preferences reference

Who is this article for?

Incydr
Code42 for Enterprise
CrashPlan for Enterprise
CrashPlan for Small Business

Incydr, yes.

CrashPlan for Enterprise, no.

Code42 for Enterprise, yes.

CrashPlan for Small Business, no.

This article applies to Code42 cloud environments.

Overview

Data Preferences settings enable you to exclude file activity from IP addresses and domains you trust from dashboard visualizations, alerts, and search results in Forensic Search.

Considerations

This functionality is available only when supported by your product plan. Contact your Customer Success Manager (CSM) for assistance with licensing, or to upgrade to the Incydr Advanced product plan for a free trial​​​. If you don't know who your CSM is, email csmsupport@code42.com

Trusted domains

To view and edit trusted domains:

  1. Sign in to the Code42 console.
  2. Navigate to Administration > Settings > Data Preferences.
  3. Select the Trusted domains tab.

Configure trusted domains

Item Description
a Domain list

List of domains you trust. File events from domains in this list are excluded from:

b Edit

Click Edit to add or remove domains.

  • To add multiple domains, enter a comma-separated list.
  • File activity on a specific domain is only considered trusted starting the date the domain was added to this list. File activity that occurred before the domain was added is considered untrusted.
  • Use the asterisk (*) character as a wildcard for partial domain names. For example, enter *.corp.example.com to trust any domain ending with ".corp.example.com."
Trailing wildcard introduces risk
Using a wildcard character at the end of a trusted domain may lead to unintentionally trusting unknown or malicious domains. For example, a trusted domain value of corp* would trust not only your corporate domain, but any domain starting with corp, such as corp.fake.com
  Trusted Domains for OneDrive

Determines whether files shared outside your domain via OneDrive are included in dashboard visualizations, alerts, and Forensic Search results when you specify the Exposure Type is Outside trusted domain

  • On: All files shared externally via OneDrive appear in dashboard visualizations, alerts, and Forensic Search results when you specify the Exposure Type is Outside trusted domain.
  • Off: All files shared externally via OneDrive are considered to be shared with a trusted domain, and do not appear in dashboard visualizations, alerts, and Forensic Search results when you specify the Exposure Type is Outside trusted domain.

Domain-specific exceptions cannot be applied to OneDrive because Code42 cannot detect the email addresses the file was shared with. This means the only domain you can configure to “trust” is your internal OneDrive instance.

 

Only appears if you are licensed for the OneDrive cloud data source.

IP addresses

Listing your in-network IP addresses enables Code42 to label activity from any IP address not on this list as Remote activity. Many areas throughout the Code42 console use this list of IP addresses to identify remote file activity. Listing your in-network IP addresses enables you to customize search results and dashboards to include in-network activity, remote activity, or both.

To view and edit IP addresses:

  1. Sign in to the Code42 console.
  2. Navigate to Administration > Settings > Data Preferences.
  3. Select the IP addresses tab.

Configure IP Addresses

Item Description
a Add

Click to add a new IP address or range.

b IP addresses

The in-network IP address or range.

 

For example, add the public IP addresses used by your devices, such as the NAT IP ranges for your corporate offices.

 

Supported formats:

  • A single IPv4 or IPv6 address. For example: 192.0.2.0.
  • A range of addresses using CIDR block notation format. For example: 192.0.2.0/24.
VPN activity
If you consider file activity from devices connecting over a VPN to be “in-network,” add the IP addresses of your VPN network here. To consider VPN traffic as remote activity, do not include IP addresses for your VPN.
c Description The description entered for this IP address or range. Descriptions are limited to 50 characters.
d Created

Indicates when this entry was added to the list of in-network IP addresses.

 

Date and time are reported in Coordinated Universal Time (UTC).

e IP last modified

Indicates when the IP addresses value was last updated. Updating only the Description does not affect this timestamp. 

 

File activity from an IP address is identified as in-network beginning the date it is added to this list. File activity from an IP address that occurred before it was added to this list is considered remote activity.

 

Date and time are reported in Coordinated Universal Time (UTC).

f Edit Click to edit the IP addresses or Description for this entry.
g Delete Click to delete this entry from the list of in-network IP addresses.
  • Was this article helpful?