Quickstart: Find what sensitive information you have in files stored on-premises
Applies to: Azure Information Protection
In this quickstart, you'll permission SharePoint to allow scanning, and install and configure the Azure Information Protection scanner to find what sensitive information you have in files that are stored in an on-premises data store. For example, a local folder, network share, or SharePoint Server.
You can use this quickstart with the current general availability version of the Azure Information Protection client (classic), or the current general availability version of the Azure Information Protection unified labeling client that includes a preview version of the scanner.
Not sure of the difference between these clients? See this FAQ.
You can finish this configuration in less than 15 minutes.
To complete this quickstart, you need:
A subscription that includes Azure Information Protection Plan 1 or Plan 2.
If you don't have one of these subscriptions, you can create a free account for your organization.
One of the following Azure Information Protection clients is installed on your computer:
The classic client: To install this client, go to the Microsoft download center and download AzInfoProtection.exe from the Azure Information Protection page.
The unified labeling client: To install this client, go the Microsoft download center and download AzInfoProtection_UL.exe from the Azure Information Protection page.
SQL Server Express is also installed on your computer.
If this SQL Server edition isn't already installed, you can download it from the Microsoft Download Center and select a Basic installation.
Your domain account is synchronized to Azure AD.
For a full list of prerequisites to use Azure Information Protection, see Requirements for Azure Information Protection.
- SharePoint policy permissions access if you choose to permissions a SharePoint scan.
Prepare a test folder and file
For an initial test to confirm that the scanner is working:
Create a local folder on your computer. For example, TestScanner on your local C drive.
Create and save a Word document in that folder, which has the text Credit card: 4242-4242-4242-4242.
Permission users to scan SharePoint repositories
You can use the scanner across SharePoint repositories by specifying the site url and Azure Information Protection will discover all sites under that url and scan them.
To enable scans across repositories, add the following SharePoint permissions for the user you intend to use to scan:
Open SharePoint, and select Permission Policy and select Add Permission Policy Level.
Under Site Collection Permissions select the Site Collector Auditor option.
Under Permissions, select Grant for the View Application Pages option and Save your changes.
After confirming your changes, click OK in the Policy for Web Application notice that opens,
In the Add Users page, add the user you intend to use for scanning in the Choose users field. Under Choose Permissions, select the site collection option and then click Finish to apply the permissions you created to the user you added or selected.
Configure a profile for the scanner
Before you install the scanner, create a profile for it in the Azure portal. This profile contains scanner settings and locations of the data repositories to scan.
Open a new browser window and sign in to the Azure portal. Then navigate to the Azure Information Protection pane.
For example, in the search box for resources, services, and docs: Start typing Information and select Azure Information Protection.
Locate the Scanner options from the left pane, and select Profiles.
On the Azure Information Protection - Profiles pane, select Add:
On the Add a new profile pane, specify a name for the scanner that is used to identify its configuration settings and data repositories to scan. For example, for this quickstart, you might specify Quickstart. When you later install the scanner, you will need to specify the same profile name.
Optionally, specify a description for administrative purposes, to help you identify the scanner's profile name.
Locate the Policy enforcement section, where for this quickstart, select just one setting: For Enforce, select Off. Then select Save but do not close the pane.
The settings configure the scanner to do a one-time discovery of all files in your specified data repositories. This scan looks for all known sensitive information types, and doesn't require you to first configure your Azure Information Protection labels or policy settings.
Now that the profile is created and saved, you're ready to return to the Configure repositories option to specify your local folder as the data store to be scanned.
Still on the Add a new profile pane, select Configure repositories to open the Repositories pane:
On the Repositories pane, select Add:
On the Repository pane, specify your local folder that you created in the very first step. For example:
For the remaining settings on this pane, do not change them but keep them as Profile default. This means that the data repository inherits the settings from the scanner profile.
Back on the Azure Information Protection - Profiles pane, you now see your profile listed, together with the SCHEDULE column showing Manual and the ENFORCE column is blank.
The NODES column shows 0 because you haven't yet installed the scanner for this profile.
You're now ready to install the scanner with the scanner profile that you've just created.
Install the scanner
Open a PowerShell session with the Run as an administrator option.
Use the following command to install the scanner, specifying your own computer name, and the profile name that you saved in the Azure portal:
Install-AIPScanner -SqlServerInstance <your computer name>\SQLEXPRESS -Profile <profile name>
When you're prompted, provide your own credentials for the scanner by using the <domain\user name> format, and then your password.
Start the scan and confirm it finished
Back in the Azure portal, refresh the Azure Information Protection - Profiles pane, and you should see the NODES column now display 1.
Select your profile name, and then the Scan now option:
If this option is not available after selecting your profile, the scanner is not connected to Azure Information Protection. Review your configuration and internet connectivity.
There's only one small file to inspect, so this initial test scan will be very quick:
Wait until you see values displayed for the LAST SCAN RESULTS and LAST SCAN (END TIME) columns.
Alternatively, for the scanner from the classic client only: Check the local Windows Applications and Services event log, Azure Information Protection. Confirm the informational event ID 911 for the MSIP.Scanner process. The event log entry also has a summary of results from the scan.
See detailed results
Using File Explorer, locate the scanner reports in %localappdata%\Microsoft\MSIP\Scanner\Reports. Open the detailed report file that has a .csv file format.
In Excel, the first two columns display your data store repository and file name. As you look through the columns, you'll see one named Information Type Name, which is the column you're most interested in. For our initial test, it displays Credit Card Number, one of many sensitive information types that the scanner can find.
Scan your own data
Edit your scanner profile and add a new data repository, this time specifying your own on-premises data store that you want to scan for sensitive information.
You can specify a local folder, a network share (UNC path), or a SharePoint Server URL for a SharePoint site or library.
Example for a local folder:
Example for a network share
Example for a SharePoint folder:
Restart the scanner again: From the Azure Information Protection - Profiles pane, make sure your profile is selected, and then select the Scan now option:
View the new results when the scan is complete.
How long this scan takes depends on how many files there are in your data store, how large those files are, and the type of file.
Clean up resources
In a production environment, you would run the scanner on a Windows Server, using a service account that silently authenticates to the Azure Information Protection service. You would also use an enterprise-grade version of SQL Server, and likely specify several data repositories.
To clean up resources, ready for that production deployment, in your PowerShell session, run the following command to uninstall the scanner:
Then restart your computer.
This command doesn't remove the following items and you must manually remove them if you don't want them after this quickstart:
The SQL Server database that was created by running the Install-AIPScanner cmdlet when the Azure Information Protection scanner was installed:
- For the classic client: AIPScanner_<profile>
- For the unified labeling client: AIPScannerUL_<profile_name>
The scanner reports located in %localappdata%\Microsoft\MSIP\Scanner\Reports.
The Log on as a service user right assignment that your domain account was granted for your local computer.
This quickstart includes the minimum configuration so that you can quickly see how the scanner can find sensitive information in on-premises data stores. If you're ready to install the scanner in a production environment, see Deploying the Azure Information Protection scanner to automatically classify and protect files.
If you want to classify and protect the files that contain sensitive information, you must configure labels for automatic classification and protection:
For the classic client:
For the unified labeling client: