Overview of Endpoint Data Discovery configuration
To configure an Endpoint Data Discovery (EDD) policy you need to complete four main tasks:

EDD rules define which types of information to detect. The files on a device's hard drive are scanned for information based on the rules set for the policy. You can update the rule selection at any time to scan for different information. You can select one, some, or all of the following rules:

Set the day and time to scan each device, based on the defined rules.
You can configure two types of scans:
Best practice is to set a schedule that uses a combination of full and delta scans. For example, you may want to use one of the following scan schedules:
- Monthly full scans and twice weekly delta scans
- Quarterly full scans and weekly delta scans
The system retains data from the last two full scans and all subsequent delta scans. All prior data is discarded. You may want to take this into consideration when you set the full scan schedule. For example, if you set the full scan frequency to Quarterly, you can view up to six months of historical data on a device's EDD History page in Device Details, but if you set it to monthly, you can view only two months of data.

Specify whether you want a device's available battery power to determine when an EDD scan runs.
You can select one of the following options:

The Scan Level defines which file types and file locations to scan for confidential or at-risk content.

You can select one of the following levels:
Scan Level |
Description |
---|---|
Targeted (default) |
This level is associated with the narrowest scan scope. When this option is selected, the following Internet Media Type Similar to a MIME type, an Internet Media Type is a standard identifier to indicate the type of content contained in a file on the Internet. The format of the identifier is type name/subtype name (for example, application/zip or text/plain).s are scanned, if they are stored on a device in a directory typically used to store user data. Directories that are typically used to store program files and system files are not scanned. ![]()
Due to the narrow scope, Targeted scans tend to take less time to complete than the other options. They may also generate fewer false positives A result on an EDD-related report or page in which a match is detected in a file, but upon further investigation, you do not consider the matched content to be at-risk data.. |
Moderate |
This level is associated with a broader scan scope than a Targeted scan. When this option is selected, most Internet Media Types are scanned, if they are stored on a device in a directory typically used to store user data. Directories that are typically used to store program files and system files are not scanned. |
Extended |
This level is associated with the broadest scan scope. When this option is selected, virtually all Internet Media Types are scanned in all directories, with a few exceptions (some system directories are excluded). On Mac devices, .sparsebundle folders and .sparseimage files are not scanned. Due to the broad scope, Extended scans tend to take more time and resources (CPU, power, and memory) to complete than the other options, and they may significantly increase the number of false positives. |

Note the following considerations that apply at any scan level:
- Files in the Recycle Bin (Windows) and Trash (macOS) folders are always scanned.
- For Windows devices using OneDrive Files On-Demand, only synchronized files are scanned. The DAR component A lightweight software component of the Secure Endpoint Agent that detects at-risk data stored on a Windows or Mac device during an EDD scan. The DAR component is deployed on a device only when the device is associated with a policy group in which the Endpoint Data Discovery policy is activated. does not download unsynchronized files to the device during an EDD scan.
- For Mac devices using OneDrive Files On-Demand, the DAR component is unable to scan the OneDrive folder due to a limitation of the Mac platform.