Data leaked to unauthorized entities
In this scenario, an organization is alerted that sensitive data was leaked to unauthorized entities within the organization or to external parties.
Objective
To solve the problem in these investigations, the organization has these objectives:
- Determine the nature and the amount of leaked data.
- Understand the techniques that were employed.
- Uncover the perpetrators.
- Identify the source of the leak.
Investigation
Use the tools on the Forensics tab to help you investigate.

- Use free-form search to search for identifiers of data that was leaked.
- Examine suspect content that is flagged by the product.
- Review the full extent of leaked or leaking data by reviewing data reconstruction.
- Use Digital Impression and visualizations to explore all involved entity relationships.
- Use Surveyor to see a timeline of activities so that you can retrace an attack.
- Use free-form search to discover the motivations for the data leak.
- Use data-pivoting to find linkages to other data that was possibly leaked.