{"version":1,"pages":[{"id":"rrMb2MRLG2pS23ihBRzO","title":"Welcome to Nightfall Documentation","pathname":"/","siteSpaceId":"sitesp_q3box","description":"Nightfall Documentation landing page","breadcrumbs":[{"label":"Data Detection and Response"}]},{"id":"sUDFzXtrzOMca8JDrY3w","title":"Release Notes 2025-2026","pathname":"/release_notes/nightfall_new_features","siteSpaceId":"sitesp_q3box","description":"This document lists all the features released by Nightfall in 2025 and 2026.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Release Notes"}]},{"id":"mBRZ79h2VJbm9jeXW2vo","title":"Release Notes 2021-2024","pathname":"/release_notes/release_notes_old","siteSpaceId":"sitesp_q3box","description":"Nightfall Release Notes for the features released in 2024, 2023, 2022, and 2021.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Release Notes"}]},{"id":"zVY2aXRrK7YPp9hyVE62","title":"Why Cloud DLP?","pathname":"/nightfall_introduction/cloud_dlp","siteSpaceId":"sitesp_q3box","description":"Advantages of a Cloud DLP and introduction to Nightfall cloud DLP","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Introduction"}]},{"id":"ycehkGAwMPGjcXG2QIAX","title":"Introduction to Nightfall","pathname":"/nightfall_introduction/nightfall_overview","siteSpaceId":"sitesp_q3box","description":"An introduction to the Nightfall Cloud DLP","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Introduction"}]},{"id":"OVmWHrUj4voZRfx9bbNn","title":"Nightfall Overview","pathname":"/nightfall_introduction/overview","siteSpaceId":"sitesp_q3box","description":"Learn more about Nightfall Cloud DLP from this brief document","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Introduction"}]},{"id":"-Mgs7k25qKBvVTBk9mWQ","title":"Cloud-native DLP vs. CASB","pathname":"/nightfall_introduction/cloud_dlp_casb","siteSpaceId":"sitesp_q3box","description":"A comparison between Cloud-native DLP and CASB","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Introduction"}]},{"id":"-MkIsLmBmFZ2miOMaSyd","title":"How Nightfall Works","pathname":"/nightfall_introduction/overview_nightfall","siteSpaceId":"sitesp_q3box","description":"Learn more about the Nightfall Cloud DLP","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Introduction"}]},{"id":"-MkJTRuI3RPa0996WyGz","title":"Reasons to Choose Nightfall","pathname":"/nightfall_introduction/why_choose_nightfall","siteSpaceId":"sitesp_q3box","description":"Understand the reasons to choose Nightfall DLP.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Introduction"}]},{"id":"-MkmeMw5II3Ud92o5qp2","title":"Benefits of Nightfall","pathname":"/nightfall_introduction/benefits","siteSpaceId":"sitesp_q3box","description":"Learn how Nightfall benefits your organization","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Introduction"}]},{"id":"4Oh4kDLTbTp8cHv6qpce","title":"How Nightfall Fits into Compliance Frameworks","pathname":"/nightfall_compliance/compliance_with_nightfall","siteSpaceId":"sitesp_q3box","description":"Learn how Nightfall AI-powered data leak prevention (DLP) for SaaS and Cloud can help organizations maintain compliance with various global compliance frameworks across different industries.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Compliance"}]},{"id":"DPOqqI9bjlCrEYchLoo5","title":"ISO 27001 Compliance + DLP","pathname":"/nightfall_compliance/iso-27001","siteSpaceId":"sitesp_q3box","description":"Learn more about ISO 27001 and how Nightfall helps you with it.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Compliance"}]},{"id":"-MgJZ3gZRZUBPoN10FiK","title":"SOC 2 Compliance + DLP","pathname":"/nightfall_compliance/soc2","siteSpaceId":"sitesp_q3box","description":"Learn more about SOC 2 compliance and how Nightfall helps with it.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Compliance"}]},{"id":"-Mgbl2qkMKJ84M8SG-77","title":"PCI Compliance + DLP","pathname":"/nightfall_compliance/pci","siteSpaceId":"sitesp_q3box","description":"Learn more about PCI compliance and how Nightfall helps with it.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Compliance"}]},{"id":"uUtA3jECEnMchn7uolWk","title":"PHI Detector - More on Nightfall's HIPAA Compliance Detector","pathname":"/nightfall_compliance/phi_hipaa","siteSpaceId":"sitesp_q3box","description":"Learn how to ensure HIPAA compliance in your collaborative cloud applications","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Compliance"}]},{"id":"0o4GTxp44tspAuOiITKA","title":"Installing Nightfall","pathname":"/get_started/installation","siteSpaceId":"sitesp_q3box","description":"Learn how to onboard and start using the Nightfall AI platform.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Getting Started"}]},{"id":"Sc2M4SswE3S1OsrIWnzA","title":"Overview","pathname":"/detection_platform/overview","siteSpaceId":"sitesp_q3box","description":"An introduction to the Nightfall Detection Platform.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"}]},{"id":"RlZI7aBQaK1OuxiGIX25","title":"Detectors","pathname":"/detection_platform/detectors","siteSpaceId":"sitesp_q3box","description":"Learn about Nightfall detectors.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"}]},{"id":"-MgIdc2_M8U0B7Xke3JE","title":"Choosing a Nightfall Detector","pathname":"/detection_platform/choosing_detectors","siteSpaceId":"sitesp_q3box","description":"Learn about various factors to be considered while choosing a Nightfall detector.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"}]},{"id":"jXBxNyK9Xz2Hwz4ocZDu","title":"Compliance Use Cases","pathname":"/detection_platform/choosing_detectors/compliance_use_cases","siteSpaceId":"sitesp_q3box","description":"Organizational compliance is one of the leading drivers that require DLP tooling such as Nightfall. These are the recommended configurations for each compliance framework.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Choosing a Nightfall Detector"}]},{"id":"PjDTOd0aIflHseokxiC2","title":"Data Protection Use Cases","pathname":"/detection_platform/choosing_detectors/data_protection_use_cases","siteSpaceId":"sitesp_q3box","description":"Organizations may need to protect specific data types either by contractual obligation or to protect intellectual property. These are the recommended configurations to protect these data types.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Choosing a Nightfall Detector"}]},{"id":"9opVO1GrD352rxyCkJMQ","title":"Nightfall Detector Glossary","pathname":"/detection_platform/detection_glossary","siteSpaceId":"sitesp_q3box","description":"Learn about the various out-of-the-box detectors provided by Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"}]},{"id":"O22TiNfw1DjjCF2dWSAD","title":"Secrets Detection","pathname":"/detection_platform/detection_glossary/secrets_detection","siteSpaceId":"sitesp_q3box","description":"Learn about Nightfall secret detection.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Nightfall Detector Glossary"}]},{"id":"KLdVYVZ3DSkbxTM4K5Xz","title":"Creating Custom Detectors","pathname":"/detection_platform/custom_detectors","siteSpaceId":"sitesp_q3box","description":"Learn how to create custom detectors in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"}]},{"id":"Kb47vLKFQQ8eUoMX8fJ0","title":"Creating Dictionary Detector","pathname":"/detection_platform/custom_detectors/dictionary_detector","siteSpaceId":"sitesp_q3box","description":"Learn how to create a Dictionary detector in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Creating Custom Detectors"}]},{"id":"ik3qTD6CPnpea0snznix","title":"Create File Type Detector","pathname":"/detection_platform/custom_detectors/file_type_detector","siteSpaceId":"sitesp_q3box","description":"Learn how to create a File Type detector in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Creating Custom Detectors"}]},{"id":"sQvWBYhTaEyWGoepZqwO","title":"Create File Fingerprint Detector","pathname":"/detection_platform/custom_detectors/file_fingerprint_detector","siteSpaceId":"sitesp_q3box","description":"Learn how to create a File Fingerprint detector in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Creating Custom Detectors"}]},{"id":"vo3vVDgaINxqVBSBkBfm","title":"Create Regular Expression Detector","pathname":"/detection_platform/custom_detectors/regexp_detector","siteSpaceId":"sitesp_q3box","description":"Learn how to create a Regular Expression detector in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Creating Custom Detectors"}]},{"id":"yQ15HQF3KIm4Q8BcsSEV","title":"Create an Entity Detector using a Prompt","pathname":"/detection_platform/custom_detectors/create-an-entity-detector-using-a-prompt","siteSpaceId":"sitesp_q3box","description":"⭐ Define a detector to detect custom sensitive entities using natural language instead of regex","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Creating Custom Detectors"}]},{"id":"H4PT9VXYR2O5aMIvESaV","title":"Create a Prompt-based File Classifier","pathname":"/detection_platform/custom_detectors/create-a-prompt-based-file-classifier","siteSpaceId":"sitesp_q3box","description":"Define a file classifier using natural language. No training required.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Creating Custom Detectors"}]},{"id":"f9gVesZcZqpTJhqXozLu","title":"Extend a Nightfall Detector","pathname":"/detection_platform/custom_detectors/extend_nightfall_detector","siteSpaceId":"sitesp_q3box","description":"Learn how you can extend the functionality of an existing Nightfall detector.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Creating Custom Detectors"}]},{"id":"-MgIdrGXLr5V1AU0Sod9","title":"Create Detection Rules","pathname":"/detection_platform/create_detection_rules","siteSpaceId":"sitesp_q3box","description":"Learn the process of creating detection rules in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"}]},{"id":"-Mg93El6rOkFtJnV-D74","title":"Detection Platform Overview","pathname":"/detection_platform/overview_platform","siteSpaceId":"sitesp_q3box","description":"Understand how detection works in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"}]},{"id":"NZM3uCGTP82wlLyFFpdv","title":"Evaluating Detection","pathname":"/detection_platform/evaluate_nightfall_detection","siteSpaceId":"sitesp_q3box","description":"Learn how to evaluate detection rules in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"}]},{"id":"EaLMLPHcCjJIbvmPgSXK","title":"Creating Policies","pathname":"/detection_platform/policies","siteSpaceId":"sitesp_q3box","description":"Learn how to create policies in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"}]},{"id":"YxTaUO7v0sUDRZ6wHGKd","title":"Selecting Integration","pathname":"/detection_platform/policies/integration","siteSpaceId":"sitesp_q3box","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Creating Policies"}]},{"id":"XZ8mDaW1lxrm0mAERpNl","title":"Scope of the Policy","pathname":"/detection_platform/policies/scope","siteSpaceId":"sitesp_q3box","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Creating Policies"}]},{"id":"dUX4GFAHuTOpX9zqENb2","title":"Detection Rules","pathname":"/detection_platform/policies/detection_rules","siteSpaceId":"sitesp_q3box","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Creating Policies"}]},{"id":"pQ7tfoHUa4c4zFIdXbiP","title":"Advanced Settings","pathname":"/detection_platform/policies/advanced_settings","siteSpaceId":"sitesp_q3box","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Creating Policies"}]},{"id":"q6rwrHmnBiHwmFVIH2Wn","title":"Name and Risk Score","pathname":"/detection_platform/policies/risk_score","siteSpaceId":"sitesp_q3box","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Creating Policies"}]},{"id":"-MgIenta65LFPdhsZpGV","title":"Historical Scan Detection Rules","pathname":"/detection_platform/historical_scan","siteSpaceId":"sitesp_q3box","description":"","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"}]},{"id":"Oz8bDlySQIoYH8itcM8l","title":"Regex Library","pathname":"/detection_platform/regex_library","siteSpaceId":"sitesp_q3box","description":"Regular expressions for unique situations","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"}]},{"id":"-MgIfJUqTuH5n79d0lyc","title":"Detection Platform FAQs","pathname":"/detection_platform/faq","siteSpaceId":"sitesp_q3box","description":"","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"}]},{"id":"-MgIMV86U8i41eN7X8qZ","title":"How can I reduce false positives in my findings?","pathname":"/detection_platform/faq/reduce_false_positives","siteSpaceId":"sitesp_q3box","description":"Tips for improving finding accuracy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Detection Platform FAQs"}]},{"id":"-MgINY82RUfhyYZDoMDb","title":"What do different “Confidence Levels” mean?","pathname":"/detection_platform/faq/confidence_levels","siteSpaceId":"sitesp_q3box","description":"Learn how Nightfall assigns confidence levels to sensitive data classifications.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Detection Platform FAQs"}]},{"id":"-MgINGhDT17nkM9NmgGd","title":"What file types will Nightfall scan for sensitive data? What are the limitations?","pathname":"/detection_platform/faq/file_types_scanned","siteSpaceId":"sitesp_q3box","description":"Nightfall scans for sensitive data in a broad range of file types","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Detection Platform FAQs"}]},{"id":"-MgIMrnkPGox-QVAytoA","title":"How do I use Context Rules?","pathname":"/detection_platform/faq/context_rules","siteSpaceId":"sitesp_q3box","description":"Customize finding confidence to suit your business logic","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Detection Platform FAQs"}]},{"id":"-MgIMgBfMg8gRwtnWs_y","title":"How do I use Exclusion Rules?","pathname":"/detection_platform/faq/exclusion_rules","siteSpaceId":"sitesp_q3box","description":"Exclude certain tokens from detection to suit your business logic","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Detection Platform FAQs"}]},{"id":"-MgIMFxe2317sXsJQWZP","title":"Does Nightfall have a regex library I can choose from?","pathname":"/detection_platform/faq/regex_library","siteSpaceId":"sitesp_q3box","description":"Select from an aggregated library of regexes","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Detection Platform FAQs"}]},{"id":"dCt0hzvuVSDpxQJu9St7","title":"Why does Nightfall sometimes miss to report SSN, credit card number, and so on?","pathname":"/detection_platform/faq/report_ssn","siteSpaceId":"sitesp_q3box","description":"Learn about typical cases of Nightfall","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Detection Platform FAQs"}]},{"id":"iyHJW1kQM1m6QybSOqgp","title":"Why does the Password Detector Report False Positive Zoom Password Findings?","pathname":"/detection_platform/faq/false_positive","siteSpaceId":"sitesp_q3box","description":"Zoom Password Findings","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection Platform"},{"label":"Detection Platform FAQs"}]},{"id":"kN95OPmp3EKBFZRu5vEb","title":"Detection Rules","pathname":"/nightfall_policy_templates/detection_rules","siteSpaceId":"sitesp_q3box","description":"Use pre-defined templates to get started quickly with policies.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection & Policy Templates"}]},{"id":"BHRhtFSCJUctUrxeMkhh","title":"Sample Datasets","pathname":"/nightfall_policy_templates/sample_data","siteSpaceId":"sitesp_q3box","description":"Use sample data sets provided by Nightfall to test Nightfall's detection capabilities.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall Detection & Policy Templates"}]},{"id":"qlHkNOxihvH7nlmr4xWo","title":"Nightfall Dashboard","pathname":"/dashboard/overview","siteSpaceId":"sitesp_q3box","description":"Learn how to use the Nightfall Dashboard.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Dashboard and Events"}]},{"id":"fg1FDur6XI9gfQQX1B3y","title":"Data Detection and Response Events","pathname":"/dashboard/sdp_events","siteSpaceId":"sitesp_q3box","description":"Learn about the Events page in Nightfall","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Dashboard and Events"}]},{"id":"yWiBFlCnIFc5Sbx5ASbk","title":"Filtering Events","pathname":"/dashboard/sdp_events/filtering","siteSpaceId":"sitesp_q3box","description":"Filter Nightfall Events based on parameters.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Dashboard and Events"},{"label":"Data Detection and Response Events"}]},{"id":"etPRkLD9z9edY8zSi4FP","title":"Event Filter Operators","pathname":"/dashboard/sdp_events/filter_operators","siteSpaceId":"sitesp_q3box","description":"Learn more about the search operators provided by Nightfall, to filter Events.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Dashboard and Events"},{"label":"Data Detection and Response Events"}]},{"id":"HY0qUoP7k1faSBXxGVM1","title":"Applying Actions on Events","pathname":"/dashboard/sdp_events/event_actions","siteSpaceId":"sitesp_q3box","description":"Learn how to apply actions on Nightfall Events.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Dashboard and Events"},{"label":"Data Detection and Response Events"}]},{"id":"8g5PTJFhK6LeO9Z7xP83","title":"Applying Bulk Actions on Events","pathname":"/dashboard/sdp_events/bulk_actions","siteSpaceId":"sitesp_q3box","description":"Learn how to apply bulk actions on Nightfall Events.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Dashboard and Events"},{"label":"Data Detection and Response Events"}]},{"id":"Mlt93kN3wvEgs5Wc65zx","title":"Event Status","pathname":"/dashboard/sdp_events/status","siteSpaceId":"sitesp_q3box","description":"Learn more about various status of Nightfall Events.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Dashboard and Events"},{"label":"Data Detection and Response Events"}]},{"id":"4VbVsCu929HhqJqF7D1S","title":"Deduplication and Automatic Resolution of Events","pathname":"/dashboard/sdp_events/deduplication","siteSpaceId":"sitesp_q3box","description":"This document explains the Deduplication and Auto resolve features for Nightfall Events.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Dashboard and Events"},{"label":"Data Detection and Response Events"}]},{"id":"T61g3G4T0wIrg8xl7ip6","title":"Nightfall Alert Platforms","pathname":"/nightfall_alert_platform/overview","siteSpaceId":"sitesp_q3box","description":"Learn about the Nightfall alert platforms","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Setting up Alert Platforms"}]},{"id":"Kd9cqwUAuYPsjF7G1m57","title":"Setting up Slack as an Alert Platform","pathname":"/nightfall_alert_platform/alerting_to_slack","siteSpaceId":"sitesp_q3box","description":"Learn how to use Slack as an alert platform in Nightall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Setting up Alert Platforms"}]},{"id":"UZxUK3w4ZG22yykbvuHw","title":"Setting up Jira as an Alert Platform","pathname":"/nightfall_alert_platform/alerting_to_jira","siteSpaceId":"sitesp_q3box","description":"Learn how to use Jira as an alert platform in Nightall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Setting up Alert Platforms"}]},{"id":"diAK5hFA3yZq8n2Fm7fZ","title":"Setting up MS Teams as an Alert Platform","pathname":"/nightfall_alert_platform/alerting_to_ms_teams","siteSpaceId":"sitesp_q3box","description":"Learn how to use MS Teams as an alert platform in Nightall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Setting up Alert Platforms"}]},{"id":"dsfjyJmBKILufhBw4Vi4","title":"Playbook","pathname":"/operationalizing_nightfall_dlp/playbook","siteSpaceId":"sitesp_q3box","description":"Learn how to operationalize NIghtfall Playbook.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Operationalizing Nightfall DLP"}]},{"id":"-Mgs8Kux9dnVGy_iacvo","title":"Informing & Coaching Business Users","pathname":"/operationalizing_nightfall_dlp/coach_users","siteSpaceId":"sitesp_q3box","description":"Learn the process of informing and teaching users about Nightfall platform.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Operationalizing Nightfall DLP"}]},{"id":"-MjFgTowO8pAK6ahCG0M","title":"Alert Management Guiding Principles","pathname":"/operationalizing_nightfall_dlp/alert_guiding_principles","siteSpaceId":"sitesp_q3box","description":"Follow Nightfall's best practices for Alert Management and Remediation","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Operationalizing Nightfall DLP"}]},{"id":"-MgsDx_Q8q8BK1ykDCrH","title":"Integrating with Security Tools","pathname":"/operationalizing_nightfall_dlp/security_tools_integration","siteSpaceId":"sitesp_q3box","description":"Learn how you can integrate Nightfall with various security tools.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Operationalizing Nightfall DLP"}]},{"id":"-Mgr29hVBtTSjyPsbkw7","title":"Integrating with SIEM","pathname":"/operationalizing_nightfall_dlp/security_tools_integration/siem","siteSpaceId":"sitesp_q3box","description":"Learn how to integrate Nightfall with a SIEM or push violations downstream to any alert drain, SOAR tool, BI tool, and more.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Operationalizing Nightfall DLP"},{"label":"Integrating with Security Tools"}]},{"id":"GfllsvXTGsWRSL96WHiW","title":"Integrating with Microsoft Sentinel","pathname":"/operationalizing_nightfall_dlp/security_tools_integration/siem/microsoft_sentinel","siteSpaceId":"sitesp_q3box","description":"Learn how to integrate Nightfall with Microsoft Sentinel.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Operationalizing Nightfall DLP"},{"label":"Integrating with Security Tools"},{"label":"Integrating with SIEM"}]},{"id":"p8KVNdL4KCfNKaK8CDaS","title":"Creating Dashboards for Nightfall Alerts in Splunk","pathname":"/operationalizing_nightfall_dlp/security_tools_integration/splunk","siteSpaceId":"sitesp_q3box","description":"Learn how to start creating a dashboard of Nightfall alerts/actions in your Splunk Enterprise/Splunk Cloud environment.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Operationalizing Nightfall DLP"},{"label":"Integrating with Security Tools"}]},{"id":"4SL67Aj3IvjB6dGqTJ58","title":"Creating Dashboards for Nightfall Alerts in Sumo Logic","pathname":"/operationalizing_nightfall_dlp/security_tools_integration/sumo_logic","siteSpaceId":"sitesp_q3box","description":"Learn how to start creating a dashboard of Nightfall alerts/actions in your Sumo Logic environment.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Operationalizing Nightfall DLP"},{"label":"Integrating with Security Tools"}]},{"id":"cul03korWU1SMDT7eq5w","title":"Sending Alerts to Microsoft Teams","pathname":"/operationalizing_nightfall_dlp/security_tools_integration/ms_teams","siteSpaceId":"sitesp_q3box","description":"Learn how to configure Nightfall to send alerts to Microsoft Teams using email.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Operationalizing Nightfall DLP"},{"label":"Integrating with Security Tools"}]},{"id":"8HrDSvQC8SrzZnuHH80V","title":"Frequently Asked Questions (FAQs) for End-Users","pathname":"/operationalizing_nightfall_dlp/faqs_end_users","siteSpaceId":"sitesp_q3box","description":"Nightfall  FAQs for end-users","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Operationalizing Nightfall DLP"}]},{"id":"NboaAANgDtj4f4gJFL8I","title":"Nightfall Integrations","pathname":"/nightfall_integrations","siteSpaceId":"sitesp_q3box","description":"Links to all the Nightfall integrations","breadcrumbs":[{"label":"Data Detection and Response"}]},{"id":"dyxwOH74Lhim0xBK3fVQ","title":"Nightfall for Slack: Quick Start","pathname":"/slack/quickstart","siteSpaceId":"sitesp_q3box","description":"Learn how to set up your integration with Slack so that you can scan and protect sensitive data across your Slack workspace.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"}]},{"id":"QpR8g2i8Rztj0vB3r9G6","title":"Getting Started With Nightfall for Slack","pathname":"/slack/getting_started","siteSpaceId":"sitesp_q3box","description":"Get started with installing and integrating Nightfall for Slack.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"}]},{"id":"F5hwiqWjAOdpyrJeB81v","title":"Requirements","pathname":"/slack/getting_started/requirements","siteSpaceId":"sitesp_q3box","description":"Make sure the following requirements are fulfilled before you get started.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Getting Started With Nightfall for Slack"}]},{"id":"TjAH2UELPy8rthshGqey","title":"Requirements for Nightfall DLP for Slack Enterprise","pathname":"/slack/getting_started/requirements/slack_enterprise","siteSpaceId":"sitesp_q3box","description":"Understand the requirements for Nightfall DLP for Slack Enterprise.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Getting Started With Nightfall for Slack"},{"label":"Requirements"}]},{"id":"PuWQ8QkWdmbMr1WcNKjf","title":"Requirements for Nightfall DLP for Slack Pro and Slack Business+","pathname":"/slack/getting_started/requirements/slack_pro","siteSpaceId":"sitesp_q3box","description":"Understand the requirements for Nightfall DLP for Slack Pro.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Getting Started With Nightfall for Slack"},{"label":"Requirements"}]},{"id":"Fbk8M7329f90I66vxEYA","title":"Installing Nightfall for Slack","pathname":"/slack/getting_started/install","siteSpaceId":"sitesp_q3box","description":"Learn how to install Nightfall for Slack","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Getting Started With Nightfall for Slack"}]},{"id":"jRxYrv8W1LUkrrzDh9oO","title":"Installing Nightfall DLP for Slack Enterprise","pathname":"/slack/getting_started/install/slack_enterprise","siteSpaceId":"sitesp_q3box","description":"Learn the process of installing Nightfall DLP for Slack enterprise.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Getting Started With Nightfall for Slack"},{"label":"Installing Nightfall for Slack"}]},{"id":"hSAYq9WKc1onXl6j6wap","title":"Installing Nightfall DLP for Slack Pro and Business+","pathname":"/slack/getting_started/install/slack_pro","siteSpaceId":"sitesp_q3box","description":"Learn the process of installing Nightfall DLP for Slack Pro and Slack Business+.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Getting Started With Nightfall for Slack"},{"label":"Installing Nightfall for Slack"}]},{"id":"DHlZY2oE0Mgh12cHqmL2","title":"Configure Alerts for Slack","pathname":"/slack/integration_alerts","siteSpaceId":"sitesp_q3box","description":"Learn the process of configuring alerts for Slack.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"}]},{"id":"Tm9ERqwSXidq0R9Y8X5x","title":"Configuring Policies for Slack Pro and the Slack Business+ Editions","pathname":"/slack/slack_pro_policy","siteSpaceId":"sitesp_q3box","description":"Learn how to configure Nightfall policies for Slack Pro and Slack Business+","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"}]},{"id":"g9G7ou6Zf8tGrgAVgLLu","title":"Slack Pro and Business+ App Selection","pathname":"/slack/slack_pro_policy/integration","siteSpaceId":"sitesp_q3box","description":"Learn the process of selecting the Slack integration while creating a Nightfall policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Configuring Policies for Slack Pro and the Slack Business+ Editions"}]},{"id":"WFy5R8bVB3l0d0CQOikf","title":"Configure Scope for Slack Pro and Slack Business+","pathname":"/slack/slack_pro_policy/scope","siteSpaceId":"sitesp_q3box","description":"Learn the process of configuring the Scope in the Slack Pro and Business+ editions while creating a Nightfall policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Configuring Policies for Slack Pro and the Slack Business+ Editions"}]},{"id":"GCbxXuQupLFrZbFiCtL3","title":"Configure Detection Rules for Slack Pro and Slack Business+","pathname":"/slack/slack_pro_policy/detection_rules","siteSpaceId":"sitesp_q3box","description":"Learn the process of selecting the Detection rules in the Slack Pro and Business+ editions while creating a Nightfall policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Configuring Policies for Slack Pro and the Slack Business+ Editions"}]},{"id":"ypCndV47GhSSGZyzaTFu","title":"Configure Automated Actions in Slack Pro and Slack Business+","pathname":"/slack/slack_pro_policy/automated_actions","siteSpaceId":"sitesp_q3box","description":"Learn the process of configuring automated actions in the Slack Pro and Business+ editions while creating a Nightfall policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Configuring Policies for Slack Pro and the Slack Business+ Editions"}]},{"id":"5swbpcV3GzWP3aL6IZb4","title":"Configure Advanced Settings in Slack Pro and Slack Business+","pathname":"/slack/slack_pro_policy/advanced_settings","siteSpaceId":"sitesp_q3box","description":"Learn the process of configuring the advanced settings in the Slack Pro and Business+ editions while creating a Nightfall policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Configuring Policies for Slack Pro and the Slack Business+ Editions"}]},{"id":"V1qBwfzas63UOUPACc5G","title":"Risk Configuration in Slack DLP for Slack Pro and Slack Business+ Editions","pathname":"/slack/slack_pro_policy/policy_risk","siteSpaceId":"sitesp_q3box","description":"Learn the process of configuring the Risk Score and naming the policy while creating a Nightfall policy  for the Slack Pro and Slack Business+ editions.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Configuring Policies for Slack Pro and the Slack Business+ Editions"}]},{"id":"YGdrfiFOvldlkWFzUVla","title":"Manage Events for Slack","pathname":"/slack/slack_pro_policy/events","siteSpaceId":"sitesp_q3box","description":"Learn how to handle Nightfall Events that were created as a result of sensitive data leak in the Nightfall for Slack Pro and Slack Business+ editions.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Configuring Policies for Slack Pro and the Slack Business+ Editions"}]},{"id":"BXSIfGC81h0yDbWkdzLA","title":"Configuring Policies for the Slack Enterprise Edition","pathname":"/slack/enterprise_policy","siteSpaceId":"sitesp_q3box","description":"Learn the process of creating of Nightfall policies for the Slack Enterprise edition.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"}]},{"id":"UIcOV8PDxHRuq347DKpK","title":"Slack App Selection","pathname":"/slack/enterprise_policy/integration","siteSpaceId":"sitesp_q3box","description":"Learn the process of selecting the Slack Enterprise integration while creating a Nightfall policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Configuring Policies for the Slack Enterprise Edition"}]},{"id":"fX8ZIJJkO0BNp5f7CHdS","title":"Configure Scope for Slack Enterprise","pathname":"/slack/enterprise_policy/scope","siteSpaceId":"sitesp_q3box","description":"Learn the process of configuring the Scope section while creating a Nightfall policy for the Slack Enterprise edition.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Configuring Policies for the Slack Enterprise Edition"}]},{"id":"quuB4gTk0pOI5fbb3uVL","title":"Select Detection Rules for Slack Enterprise","pathname":"/slack/enterprise_policy/detection_rules","siteSpaceId":"sitesp_q3box","description":"Learn the process of selecting detection rules while creating a Nightfall policy for the Slack Enterprise edition.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Configuring Policies for the Slack Enterprise Edition"}]},{"id":"ytCFjyeHTC0SEkCm72U5","title":"Configure Automated Actions in Slack Enterprise","pathname":"/slack/enterprise_policy/automated_actions","siteSpaceId":"sitesp_q3box","description":"Learn the process of configuring automated actions while creating a Nightfall policy for the Slack Enterprise edition.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Configuring Policies for the Slack Enterprise Edition"}]},{"id":"wmcJAvdj4vZxf5EdRlV8","title":"Configure Advanced Settings for Slack Enterprise","pathname":"/slack/enterprise_policy/advanced_settings","siteSpaceId":"sitesp_q3box","description":"Learn the process of configuring advanced settings while creating a Nightfall policy for the Slack Enterprise edition.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Configuring Policies for the Slack Enterprise Edition"}]},{"id":"VlHW2avs9NB8B8QF6PFv","title":"Risk Configuration for Slack Enterprise","pathname":"/slack/enterprise_policy/risk_configuration","siteSpaceId":"sitesp_q3box","description":"Learn the process of configuring the Risk Score and naming the policy while creating a Nightfall policy  for the Slack enterprise edition.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Configuring Policies for the Slack Enterprise Edition"}]},{"id":"2boc9nJ2kPbyr4jo1zXV","title":"Manage Events for Slack Enterprise","pathname":"/slack/enterprise_policy/events","siteSpaceId":"sitesp_q3box","description":"Learn how to handle Nightfall Events that were created as a result of sensitive data leak in the Slack Enterprise.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"Configuring Policies for the Slack Enterprise Edition"}]},{"id":"4qO68ascKn5KhjM9QWyY","title":"FAQs","pathname":"/slack/slack-faqs","siteSpaceId":"sitesp_q3box","description":"","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"}]},{"id":"RXmpE119eDX4VC0aGLkO","title":"Can I redact sensitive message content in Slack?","pathname":"/slack/slack-faqs/redact_sensitive_data","siteSpaceId":"sitesp_q3box","description":"Redacting Sensitive Messages in Slack","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"FAQs"}]},{"id":"4pO1xFlpsGmgcy8eMdwd","title":"Nightfall for Slack Pro vs Enterprise","pathname":"/slack/slack-faqs/pro_vs_enterprise","siteSpaceId":"sitesp_q3box","description":"Understand the differences between Slack pro and Slack enterprise editions.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"FAQs"}]},{"id":"1rfr5J8S0OBwt2UtBnwg","title":"Upgrading from Slack Pro to Enterprise","pathname":"/slack/slack-faqs/pro_vs_enterprise/upgrading-pro-to-enterprise","siteSpaceId":"sitesp_q3box","description":"Learn how to migrate from Slack Pro to Slack Enterprise edition","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"FAQs"},{"label":"Nightfall for Slack Pro vs Enterprise"}]},{"id":"qYd5WDEo6CqAeLhNqkL6","title":"Can we customize the alert messages sent in Slack?","pathname":"/slack/slack-faqs/slack_alert_customization","siteSpaceId":"sitesp_q3box","description":"Learn how to customize the alert messages sent in Slack alerts","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"FAQs"}]},{"id":"323T27IRWztRCOmH1y6L","title":"Can I Disable Detection in Private Channels or DMs?","pathname":"/slack/slack-faqs/detection_disable","siteSpaceId":"sitesp_q3box","description":"Turn off the Nightfall bot in secure private communications","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"FAQs"}]},{"id":"3jRkt585VKur9uyJWLvZ","title":"What types of channels does Nightfall scan? Does Nightfall scan shared channels?","pathname":"/slack/slack-faqs/types_of_channels_scanned","siteSpaceId":"sitesp_q3box","description":"","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"FAQs"}]},{"id":"mflj27hQmRnlLVej8QH1","title":"I am unable to view a sensitive message or file from the Nightfall alert channel.","pathname":"/slack/slack-faqs/alert_message_blocked","siteSpaceId":"sitesp_q3box","description":"Learn why you might not be able to view sensitive messages or  files in Nightfall alert channel.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"FAQs"}]},{"id":"UJJEPNntchTtbzGpuSii","title":"Upon Slack installation, why am I seeing a 400 error mentioning a \"Restricted Action\"?","pathname":"/slack/slack-faqs/slack_400_error","siteSpaceId":"sitesp_q3box","description":"Understand why Channel Management Restrictions in your Slack Workspace settings may be causing Slack 400 error.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"FAQs"}]},{"id":"Et1AhzwM8fS5Lu8Y5K9s","title":"I send a sensitive message, edit it, and then admin applies the Redact action. What is the outcome?","pathname":"/slack/slack-faqs/multiple_actions","siteSpaceId":"sitesp_q3box","description":"Learn what happens when both, end-user and admin apply action on sensitive data.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"FAQs"}]},{"id":"rxJDxnDhAatlrHKXWnMC","title":"How do I re-install Nightfall DLP for Slack Pro Edition?","pathname":"/slack/slack-faqs/reinstall_slack_pro","siteSpaceId":"sitesp_q3box","description":"Learn the process of reinstalling Slack pro edition.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"FAQs"}]},{"id":"Zl6FSrD8RuzdLWw4TeTY","title":"How do I re-install Nightfall DLP for Slack Enterprise Edition?","pathname":"/slack/slack-faqs/reinstall_slack_enterprise","siteSpaceId":"sitesp_q3box","description":"Learn the process of reinstalling Slack enterprise edition.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"FAQs"}]},{"id":"P0U08jOZp2uv4l0LaqNS","title":"Our Slack Admin has Quit. Will it impact Nightfall Scan?","pathname":"/slack/slack-faqs/our-slack-admin-has-quit.-will-it-impact-nightfall-scan","siteSpaceId":"sitesp_q3box","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Slack"},{"label":"FAQs"}]},{"id":"Yhz1zJSmUPkib00OL6kS","title":"Getting Started","pathname":"/github/getting_started","siteSpaceId":"sitesp_q3box","description":"Learn the basics of Nightfall DLP for GitHub.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for GitHub"}]},{"id":"ZMQW9ZitJUPSvxm9vE36","title":"Requirements","pathname":"/github/getting_started/requirements","siteSpaceId":"sitesp_q3box","description":"Make sure the following requirements are fulfilled before you get started with the installation of Nightfall DLP for GitHub.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for GitHub"},{"label":"Getting Started"}]},{"id":"frX2TaiPMTe4xrdC0gx9","title":"Install Nightfall for GitHub","pathname":"/github/getting_started/installation","siteSpaceId":"sitesp_q3box","description":"Learn how to install Nightfall DLP for GitHub.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for GitHub"},{"label":"Getting Started"}]},{"id":"78b3Lk78B2INpn5sgEq6","title":"Configure Alerts for GitHub","pathname":"/github/getting_started/integration_alerts","siteSpaceId":"sitesp_q3box","description":"Understand the process of configuring integration alerts for Nightfall for GitHub.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for GitHub"},{"label":"Getting Started"}]},{"id":"OQzlutXuXVZH0XlQvdvO","title":"Configure Policies for GitHub","pathname":"/github/policies","siteSpaceId":"sitesp_q3box","description":"Learn how to configure a detection policy for Nightfall DLP for GitHub","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for GitHub"}]},{"id":"Gu6wB5qgBhIea3kfbly8","title":"GitHub App Selection","pathname":"/github/policies/integration","siteSpaceId":"sitesp_q3box","description":"Learn how you can select the GitHub integration in a Nightfall policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for GitHub"},{"label":"Configure Policies for GitHub"}]},{"id":"LiVhE978QgKctC1C4qKq","title":"Configure Scope for GitHub","pathname":"/github/policies/scope","siteSpaceId":"sitesp_q3box","description":"Learn the process of configuring the Scope section while creating a Nightfall policy in Nightfall or GitHub.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for GitHub"},{"label":"Configure Policies for GitHub"}]},{"id":"Bp4mBH57O26tnuf0WbOz","title":"Use Regular Expressions to Exclude GitHub Directories","pathname":"/github/policies/scope/github_regexp","siteSpaceId":"sitesp_q3box","description":"Learn how to use regular expressions to exclude specific GitHub repositories, while configuring the scope section in Nightfall for GitHub.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for GitHub"},{"label":"Configure Policies for GitHub"},{"label":"Configure Scope for GitHub"}]},{"id":"oMbl1gd96etDSTkrWr9X","title":"Configure Detection Rules for GitHub","pathname":"/github/policies/detection_rules","siteSpaceId":"sitesp_q3box","description":"Learn the process of selecting detection rules while creating a Nightfall policy in Nightfall for GitHub.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for GitHub"},{"label":"Configure Policies for GitHub"}]},{"id":"iglzInEFyJ5JzVEm60AW","title":"Configure Advanced Settings for GitHub","pathname":"/github/policies/advanced_settings","siteSpaceId":"sitesp_q3box","description":"Learn the process of configuring advanced settings while creating a Nightfall policy in Nightfall for GitHub.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for GitHub"},{"label":"Configure Policies for GitHub"}]},{"id":"AO2PrsngFYHh57wkN3DN","title":"Configure Risk Score for GitHub","pathname":"/github/policies/risk_score","siteSpaceId":"sitesp_q3box","description":"Learn the process of configuring the Risk Score and naming the policy while creating a Nightfall policy  in Nightfall for GitHub.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for GitHub"},{"label":"Configure Policies for GitHub"}]},{"id":"NF2M9gULtuc7h7mgP24e","title":"Manage GitHub Events","pathname":"/github/events","siteSpaceId":"sitesp_q3box","description":"Learn how to handle Nightfall Events that were created as a result of sensitive data leak in GitHub.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for GitHub"}]},{"id":"-Mg94XMf022Z3vOgsWje","title":"Remediation on Nightfall for Github","pathname":"/github/remediation","siteSpaceId":"sitesp_q3box","description":"Sensitive data like credentials pose a large risk when found in code repos. Read our guide to remediating these DLP risks in GitHub.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for GitHub"}]},{"id":"-MgHa7d7zYu-rS2TNDtF","title":"Getting Started","pathname":"/google-drive/getting_started","siteSpaceId":"sitesp_q3box","description":"Learn how to get started with Nightfall DLP for Google Drive.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"NIGHTFALL FOR GOOGLE DRIVE"}]},{"id":"RAwJEjBxUr19A8at9MOh","title":"Requirements","pathname":"/google-drive/getting_started/requirements","siteSpaceId":"sitesp_q3box","description":"Learn what requirements must be fulfilled to install Nightfall for Google Drive.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"NIGHTFALL FOR GOOGLE DRIVE"},{"label":"Getting Started"}]},{"id":"ZxjJxPll36DhlYyQ6M9x","title":"Install Nightfall for Google Drive","pathname":"/google-drive/getting_started/installation","siteSpaceId":"sitesp_q3box","description":"Learn how to install Nightfall for Google Drive.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"NIGHTFALL FOR GOOGLE DRIVE"},{"label":"Getting Started"}]},{"id":"yOjMsis6SfvUQOiG4OKm","title":"Enable Google Drive Labels","pathname":"/google-drive/getting_started/labels","siteSpaceId":"sitesp_q3box","description":"Learn how you can enable Google Drive Labels in Nightfall for Google Drive.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"NIGHTFALL FOR GOOGLE DRIVE"},{"label":"Getting Started"}]},{"id":"OlEw4seiNpFEU2NoKlXZ","title":"Configure Alerts for Google Drive","pathname":"/google-drive/getting_started/integration_alerts","siteSpaceId":"sitesp_q3box","description":"Learn the process of configuring integration level alerts in Nightfall for Google Drive.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"NIGHTFALL FOR GOOGLE DRIVE"},{"label":"Getting Started"}]},{"id":"mgxh84YzRtAtAXRapIUB","title":"Configure Policies for Google Drive","pathname":"/google-drive/policies","siteSpaceId":"sitesp_q3box","description":"Learn to configure Nightfall policies to monitor sensitive data from your Google Drive instances.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"NIGHTFALL FOR GOOGLE DRIVE"}]},{"id":"RiIECn44ruxyAGmMT78P","title":"Google Drive App Selection","pathname":"/google-drive/policies/integration","siteSpaceId":"sitesp_q3box","description":"Learn how you can select the Google Drive integration in a Nightfall policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"NIGHTFALL FOR GOOGLE DRIVE"},{"label":"Configure Policies for Google Drive"}]},{"id":"nc1KhN8uLHjhFE74haZL","title":"Configure Scope for Google Drive","pathname":"/google-drive/policies/scope","siteSpaceId":"sitesp_q3box","description":"Learn how you can configure the Scope section in a policy, created in Nightfall for Google Drive.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"NIGHTFALL FOR GOOGLE DRIVE"},{"label":"Configure Policies for Google Drive"}]},{"id":"mZCk6NaLtILN16sBCUB9","title":"Configure Detection Rules for Google Drive","pathname":"/google-drive/policies/detection_rules","siteSpaceId":"sitesp_q3box","description":"Learn how to select the required detection rules while creating a Nightfall policy for Google Drive.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"NIGHTFALL FOR GOOGLE DRIVE"},{"label":"Configure Policies for Google Drive"}]},{"id":"YgBUzvUL8ppsbBLE8WSf","title":"Configure Advanced Settings for Google Drive","pathname":"/google-drive/policies/advanced_settings","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the advanced settings section in a Nightfall policy for the Google Drive.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"NIGHTFALL FOR GOOGLE DRIVE"},{"label":"Configure Policies for Google Drive"}]},{"id":"hG6Pyt5FfsxGmervNql9","title":"Risk Score for Google Drive","pathname":"/google-drive/policies/configure_risk","siteSpaceId":"sitesp_q3box","description":"Learn how to configure risk score and name a Nightfall policy created for the Google Drive.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"NIGHTFALL FOR GOOGLE DRIVE"},{"label":"Configure Policies for Google Drive"}]},{"id":"ZnH8iMfGz5LQa3ZCT2mY","title":"Manage Google Drive Events","pathname":"/google-drive/policies/events","siteSpaceId":"sitesp_q3box","description":"Learn how to handle Nightfall Events that were created as a result of sensitive data leak in the Google Drive.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"NIGHTFALL FOR GOOGLE DRIVE"},{"label":"Configure Policies for Google Drive"}]},{"id":"-MhGJTU7ITsW3ifr9Ag_","title":"Getting Started","pathname":"/confluence/getting_started","siteSpaceId":"sitesp_q3box","description":"Learn how to get started with Confluence.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Confluence"}]},{"id":"PDlYYkgpGIIVjQhP4r1H","title":"Install Nightfall for Confluence","pathname":"/confluence/installation","siteSpaceId":"sitesp_q3box","description":"Learn how to install Nightfall DLP for Confluence.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Confluence"}]},{"id":"pyGjFjpj3RobkdKVfYFy","title":"Configure Alerts for Confluence","pathname":"/confluence/installation/integration_alerts","siteSpaceId":"sitesp_q3box","description":"Learn how you can configure the integration level alerts in Confluence","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Confluence"},{"label":"Install Nightfall for Confluence"}]},{"id":"4BgRKBA7VTq1EpB8ZG7J","title":"Configuring Policies for Confluence","pathname":"/confluence/policies","siteSpaceId":"sitesp_q3box","description":"Learn how to configure policies in Nightfall DLP for Confluence.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Confluence"}]},{"id":"S7wwUK432lTx3kuwqchh","title":"Confluence App Selection","pathname":"/confluence/policies/integration","siteSpaceId":"sitesp_q3box","description":"Learn how to select the Confluence integration while creating a policy in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Confluence"},{"label":"Configuring Policies for Confluence"}]},{"id":"E8s3neYl5VyqKvfOTU70","title":"Configure Scope for Confluence","pathname":"/confluence/policies/scope","siteSpaceId":"sitesp_q3box","description":"Learn how you can configure the Scope section in a Nightfall for Confluence policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Confluence"},{"label":"Configuring Policies for Confluence"}]},{"id":"lzCLFl1QM9imjql6huzg","title":"Configure Detection Rules for Confluence","pathname":"/confluence/policies/detection_rules","siteSpaceId":"sitesp_q3box","description":"Learn how you can select the required detection rules while creating a policy in Nightfall for Confluence.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Confluence"},{"label":"Configuring Policies for Confluence"}]},{"id":"tiRf8UiwvYkltNoGYxo8","title":"Configure Advanced Settings for Confluence","pathname":"/confluence/policies/advanced_settings","siteSpaceId":"sitesp_q3box","description":"Learn how to configure advanced settings in Nightfall for Confluence.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Confluence"},{"label":"Configuring Policies for Confluence"}]},{"id":"bt1U2KB0VibLRyy4FRb2","title":"Configure Risk Score for Confluence","pathname":"/confluence/policies/risk_score","siteSpaceId":"sitesp_q3box","description":"Learn how you can configure risk score and name a policy in Nightfall for Confluence.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Confluence"},{"label":"Configuring Policies for Confluence"}]},{"id":"Hz4Sfe40q8WQyzirllh0","title":"Manage Confluence Events","pathname":"/confluence/policies/events","siteSpaceId":"sitesp_q3box","description":"Learn how to handle Nightfall Events that were created as a result of sensitive data leak in Confluence.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Confluence"},{"label":"Configuring Policies for Confluence"}]},{"id":"FXRCkzSP6fWoOHzjQ65D","title":"FAQs","pathname":"/confluence/faqs","siteSpaceId":"sitesp_q3box","description":"FAQs on Nightfall for Confluence","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Confluence"}]},{"id":"mYjftwpmY5bew6SBEnzS","title":"Page Restrictions","pathname":"/confluence/faqs/page-restrictions","siteSpaceId":"sitesp_q3box","description":"Note the current issue that we have with scanning for Confluence pages with Page Restrictions set","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Confluence"},{"label":"FAQs"}]},{"id":"9Gns6Zf6EtjQfMP6RLUS","title":"Getting Started","pathname":"/jira/getting_started","siteSpaceId":"sitesp_q3box","description":"Learn how to get started with Nightfall DLP for Jira.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for jira"}]},{"id":"VR7QOgUTBGfcHmXLWOK2","title":"Install Nightfall for Jira","pathname":"/jira/installation","siteSpaceId":"sitesp_q3box","description":"Step by step instructions on installing the Nightfall for JIRA integration","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for jira"}]},{"id":"YG1ZpsOgdu2NGVeCkapt","title":"Configuring Alerts for Jira","pathname":"/jira/installation/integration_alerts","siteSpaceId":"sitesp_q3box","description":"Learn how you can configure integration level alerts in Nightfall for Jira.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for jira"},{"label":"Install Nightfall for Jira"}]},{"id":"MMhtYygV8WFPNR3gAbZP","title":"Configure Policies in Nightfall for Jira","pathname":"/jira/policies","siteSpaceId":"sitesp_q3box","description":"Learn how to configure policies in Nightfall for Jira.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for jira"}]},{"id":"RjzQqPKXTY0L8GL907Rn","title":"Jira App Selection","pathname":"/jira/policies/integration","siteSpaceId":"sitesp_q3box","description":"Learn how you can select the Jira integration while creating a policy in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for jira"},{"label":"Configure Policies in Nightfall for Jira"}]},{"id":"nR1jTLykftn1dNAAULiD","title":"Configure Scope in Nightfall for JIRA","pathname":"/jira/policies/scope","siteSpaceId":"sitesp_q3box","description":"Learn how you can configure the Scope section while creating a policy in Nightfall for JIRA.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for jira"},{"label":"Configure Policies in Nightfall for Jira"}]},{"id":"WasLjQx2N75IWIfWg7aK","title":"Select Detection Rules in Nightfall for JIRA","pathname":"/jira/policies/detection_rules","siteSpaceId":"sitesp_q3box","description":"Learn how you can select the required detection rules while creating a policy in Nightfall for JIRA.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for jira"},{"label":"Configure Policies in Nightfall for Jira"}]},{"id":"9F5IpAoG68qYzlE7mm61","title":"Configuring Advanced Settings in Nightfall for JIRA","pathname":"/jira/policies/advanced_settings","siteSpaceId":"sitesp_q3box","description":"Learn how you can configure the advanced settings section in a Nightfall policy created for the Nightfall for JIRA integration.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for jira"},{"label":"Configure Policies in Nightfall for Jira"}]},{"id":"kW6kAJt9KUcoYqhcBBGG","title":"Configure Risk Score for Jira","pathname":"/jira/policies/risk_score","siteSpaceId":"sitesp_q3box","description":"Learn how you can configure risk score and name a policy in Nightfall for Jira.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for jira"},{"label":"Configure Policies in Nightfall for Jira"}]},{"id":"XdZfSEHx7rxDygIkRbdY","title":"Manage Jira Events","pathname":"/jira/policies/events","siteSpaceId":"sitesp_q3box","description":"Learn how to handle Nightfall Events that were created as a result of sensitive data leak in the JIRA DLP.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for jira"},{"label":"Configure Policies in Nightfall for Jira"}]},{"id":"zOy88mKltYtUh2tu4DHO","title":"Getting Started","pathname":"/microsoft-365/getting_started","siteSpaceId":"sitesp_q3box","description":"Learn the basics of Nightfall DLP for Microsoft 365","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"}]},{"id":"ppAbQJB1FddzO0XpkUfg","title":"Microsoft 365 Requirements","pathname":"/microsoft-365/getting_started/requirements","siteSpaceId":"sitesp_q3box","description":"Make sure the following requirements are fulfilled before you get started with Microsoft 365.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Getting Started"}]},{"id":"45uU6uWT9qwxUrPokYLx","title":"Setting up Directory Sync","pathname":"/microsoft-365/getting_started/directory_sync","siteSpaceId":"sitesp_q3box","description":"Learn how you can setup directory sync for Microsoft 365.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Getting Started"}]},{"id":"MR8cd0LWCeuvLOLZ07II","title":"Setting up Microsoft Tenant","pathname":"/microsoft-365/getting_started/microsoft_tenant_setup","siteSpaceId":"sitesp_q3box","description":"Learn how to setup Microsoft Tenant for Nightfall","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Getting Started"}]},{"id":"z60iq8683w3o3cOlnIOV","title":"Update App Selection for a Registered Tenant","pathname":"/microsoft-365/getting_started/microsoft_tenant_setup/update_app_selections","siteSpaceId":"sitesp_q3box","description":"Learn how you can update the app selection in Microsoft 365.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Getting Started"},{"label":"Setting up Microsoft Tenant"}]},{"id":"Mo2xFdrjIr8JLiIrrwB6","title":"Nightfall for OneDrive","pathname":"/microsoft-365/onedrive","siteSpaceId":"sitesp_q3box","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"}]},{"id":"7txMoRUzchQpYQqDx560","title":"Configure Alerts for OneDrive","pathname":"/microsoft-365/onedrive/integration_alerts","siteSpaceId":"sitesp_q3box","description":"Learn how to configure integration level alerts in Nightfall for OneDrive.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for OneDrive"}]},{"id":"Q6Wh80bWaVU1KME6vJWx","title":"Nightfall Policies for OneDrive","pathname":"/microsoft-365/onedrive/policies","siteSpaceId":"sitesp_q3box","description":"Learn how to configure OneDrive policies","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for OneDrive"}]},{"id":"SwcJO6Nw7pvnDqgb83jq","title":"OneDrive App Selection","pathname":"/microsoft-365/onedrive/policies/integration","siteSpaceId":"sitesp_q3box","description":"Learn how you can select the OneDrive integration while creating a Nightfall policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for OneDrive"},{"label":"Nightfall Policies for OneDrive"}]},{"id":"UCbMfHGQQXOMEgyaU4yz","title":"Configure Scope for OneDrive","pathname":"/microsoft-365/onedrive/policies/scope","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the scope section in Nightfall policies created for Microsoft OneDrive.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for OneDrive"},{"label":"Nightfall Policies for OneDrive"}]},{"id":"S1Jpo5zaE1eBW9HFAxMG","title":"Configure Detection Rules for OneDrive","pathname":"/microsoft-365/onedrive/policies/detection_rules","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the detection rules section in Nightfall policies created for Microsoft OneDrive.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for OneDrive"},{"label":"Nightfall Policies for OneDrive"}]},{"id":"pTX7f81HGCxa0VOo4LKT","title":"Configure Advanced Settings for OneDrive","pathname":"/microsoft-365/onedrive/policies/advanced_settings","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the advanced setting section in Nightfall policies created for Microsoft OneDrive.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for OneDrive"},{"label":"Nightfall Policies for OneDrive"}]},{"id":"ss4aabVkb5brywKLzgzK","title":"Risk Score for OneDrive Policies","pathname":"/microsoft-365/onedrive/policies/risk_score","siteSpaceId":"sitesp_q3box","description":"Learn how to configure risk score and name a Nightfall policy created for Microsoft OneDrive.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for OneDrive"},{"label":"Nightfall Policies for OneDrive"}]},{"id":"mWFfCPcTwf2pHs3x0AJ0","title":"Manage OneDrive Events","pathname":"/microsoft-365/onedrive/policies/events","siteSpaceId":"sitesp_q3box","description":"Learn how to handle Nightfall Events that were created as a result of sensitive data leak in the Microsoft OneDrive.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for OneDrive"},{"label":"Nightfall Policies for OneDrive"}]},{"id":"zOMPxo6TUcW73oUCyFxC","title":"Nightfall for Microsoft Teams","pathname":"/microsoft-365/microsoft_teams","siteSpaceId":"sitesp_q3box","description":"Learn how to get started with Nightfall for Microsoft Teams","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"}]},{"id":"tEjJFtPMBTQPnzHip12Y","title":"Configure Alerts for Microsoft Teams","pathname":"/microsoft-365/microsoft_teams/integration_alerts","siteSpaceId":"sitesp_q3box","description":"Learn how you can configure integration level alerts in Microsoft Teams.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for Microsoft Teams"}]},{"id":"arqsFeEZLdaZrDBDCCPI","title":"Configure Policies for Microsoft Teams","pathname":"/microsoft-365/microsoft_teams/policies","siteSpaceId":"sitesp_q3box","description":"Learn how to configure a detection policy for Nightfall for Microsoft Teams.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for Microsoft Teams"}]},{"id":"RB7LDXxmz9hd1uIhDkgU","title":"Select Integration in Microsoft Teams","pathname":"/microsoft-365/microsoft_teams/policies/integration","siteSpaceId":"sitesp_q3box","description":"Learn how you can select the MS Teams integration in a Nightfall policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for Microsoft Teams"},{"label":"Configure Policies for Microsoft Teams"}]},{"id":"Kjm3ZIkZHBgU1woMu5cu","title":"Configure Scope for Microsoft teams","pathname":"/microsoft-365/microsoft_teams/policies/scope","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the Scope section for Microsoft Teams.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for Microsoft Teams"},{"label":"Configure Policies for Microsoft Teams"}]},{"id":"3iYFDewJKdguvC5BIdnU","title":"Scope for Personal Chats","pathname":"/microsoft-365/microsoft_teams/policies/scope/personal_chats","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the Scope section for personal chats in Microsoft Teams policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for Microsoft Teams"},{"label":"Configure Policies for Microsoft Teams"},{"label":"Configure Scope for Microsoft teams"}]},{"id":"1U1gIkxPbc2UFBHohc96","title":"Scope for MS Teams Channels","pathname":"/microsoft-365/microsoft_teams/policies/scope/channels","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the Scope section for personal chats in Microsoft Teams policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for Microsoft Teams"},{"label":"Configure Policies for Microsoft Teams"},{"label":"Configure Scope for Microsoft teams"}]},{"id":"nKsc66c6tE52mVyZLmGj","title":"Configure Detection Rules in Microsoft Teams DLP","pathname":"/microsoft-365/microsoft_teams/policies/detection_rules","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the detection rules section in Nightfall policies created for Microsoft Teams DLP.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for Microsoft Teams"},{"label":"Configure Policies for Microsoft Teams"}]},{"id":"6WwMD0DMbWtnOB48tSNM","title":"Configure Advanced Settings in Microsoft Teams","pathname":"/microsoft-365/microsoft_teams/policies/advanced_settings","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the advanced setting section in Nightfall policies created for Microsoft Teams.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for Microsoft Teams"},{"label":"Configure Policies for Microsoft Teams"}]},{"id":"7izAfX18za2ZXybGltwG","title":"Risk Score in Microsoft Teams Policies","pathname":"/microsoft-365/microsoft_teams/policies/risk_score","siteSpaceId":"sitesp_q3box","description":"Learn how to configure risk score and name a Nightfall policy created for Microsoft Teams DLP.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for Microsoft Teams"},{"label":"Configure Policies for Microsoft Teams"}]},{"id":"MJghZc8upVqLSNG0MLB7","title":"Manage Microsoft Teams Events","pathname":"/microsoft-365/microsoft_teams/policies/events","siteSpaceId":"sitesp_q3box","description":"Learn how to handle Nightfall Events that were created as a result of sensitive data leak in the Microsoft Teams.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft 365"},{"label":"Nightfall for Microsoft Teams"},{"label":"Configure Policies for Microsoft Teams"}]},{"id":"M6sO1mejjyADV6ijKnnG","title":"Getting Started","pathname":"/microsoft-exchange/getting_started","siteSpaceId":"sitesp_q3box","description":"Learn the basics of Nightfall DLP for Microsoft Exchange","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Exchange Online"}]},{"id":"7fRvLpp6uW5wEO2fVvOW","title":"Microsoft Exchange Requirements","pathname":"/microsoft-exchange/getting_started/requirements","siteSpaceId":"sitesp_q3box","description":"Make sure the following requirements are fulfilled before you get started with Microsoft Exchange.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Exchange Online"},{"label":"Getting Started"}]},{"id":"Y8gWgkLxREB9DHotWReT","title":"Setting up Directory Sync","pathname":"/microsoft-exchange/getting_started/directory_sync","siteSpaceId":"sitesp_q3box","description":"Learn how you can setup directory sync for Microsoft Exchange.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Exchange Online"},{"label":"Getting Started"}]},{"id":"yXGB04Uwy22IkMRx7CpT","title":"Installing Microsoft Exchange","pathname":"/microsoft-exchange/getting_started/installing-microsoft-exchange","siteSpaceId":"sitesp_q3box","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Exchange Online"},{"label":"Getting Started"}]},{"id":"Nr9sHXllaymxIrpKFH4E","title":"Create Connectors","pathname":"/microsoft-exchange/getting_started/installing-microsoft-exchange/create-connectors","siteSpaceId":"sitesp_q3box","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Exchange Online"},{"label":"Getting Started"},{"label":"Installing Microsoft Exchange"}]},{"id":"hcXrJWy8Oz7KG4LHSwJz","title":"Create Rules","pathname":"/microsoft-exchange/getting_started/installing-microsoft-exchange/create-rules","siteSpaceId":"sitesp_q3box","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Exchange Online"},{"label":"Getting Started"},{"label":"Installing Microsoft Exchange"}]},{"id":"m6qXCmHPUJj1lkxKnWju","title":"Create MX Record","pathname":"/microsoft-exchange/getting_started/installing-microsoft-exchange/create-mx-record","siteSpaceId":"sitesp_q3box","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Exchange Online"},{"label":"Getting Started"},{"label":"Installing Microsoft Exchange"}]},{"id":"peyxb9FMva4czZL7R7wE","title":"Nightfall for Microsoft Exchange","pathname":"/microsoft-exchange/exchange_online","siteSpaceId":"sitesp_q3box","description":"Learn how to get started with Nightfall for Exchange","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Exchange Online"}]},{"id":"PVkyGX7CPRcr0pNoxVhD","title":"Configure Alerts for Exchange","pathname":"/microsoft-exchange/exchange_online/integration_alerts","siteSpaceId":"sitesp_q3box","description":"Learn how you can configure integration level alerts in Exchange.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Exchange Online"},{"label":"Nightfall for Microsoft Exchange"}]},{"id":"M2BiuZ3D2JlMgkl9LsiW","title":"Configure Policies for Exchange","pathname":"/microsoft-exchange/exchange_online/policies","siteSpaceId":"sitesp_q3box","description":"Learn how to configure a detection policy for Nightfall for Exchange.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Exchange Online"},{"label":"Nightfall for Microsoft Exchange"}]},{"id":"WVoMbub3adMpoPTGinYi","title":"Select Integration in Exchange","pathname":"/microsoft-exchange/exchange_online/policies/integration","siteSpaceId":"sitesp_q3box","description":"Learn how you can select the Exchange integration in a Nightfall policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Exchange Online"},{"label":"Nightfall for Microsoft Exchange"},{"label":"Configure Policies for Exchange"}]},{"id":"tXByhTvqmL2IiZk29Cst","title":"Configure Scope for Exchange","pathname":"/microsoft-exchange/exchange_online/policies/scope","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the Scope section for Exchange.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Exchange Online"},{"label":"Nightfall for Microsoft Exchange"},{"label":"Configure Policies for Exchange"}]},{"id":"Qnx0AVUNO332RHkLmsQg","title":"Configure Detection Rules in Exchange","pathname":"/microsoft-exchange/exchange_online/policies/detection_rules","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the detection rules section in Nightfall policies created for Exchange","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Exchange Online"},{"label":"Nightfall for Microsoft Exchange"},{"label":"Configure Policies for Exchange"}]},{"id":"Y1lFoxfYaCOkCUcglnrW","title":"Configure Advanced Settings in Exchange","pathname":"/microsoft-exchange/exchange_online/policies/advanced_settings","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the advanced settings section in Nightfall policies created for MS Exchange.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Exchange Online"},{"label":"Nightfall for Microsoft Exchange"},{"label":"Configure Policies for Exchange"}]},{"id":"Ovk03LiCbd5cRBsgmEBz","title":"Risk Score in Exchange","pathname":"/microsoft-exchange/exchange_online/policies/risk_score","siteSpaceId":"sitesp_q3box","description":"Learn how to configure risk score and name a Nightfall policy created for Exchange","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Exchange Online"},{"label":"Nightfall for Microsoft Exchange"},{"label":"Configure Policies for Exchange"}]},{"id":"tzRwBJn4KvMU6ccqq6Hp","title":"Manage Exchange Events","pathname":"/microsoft-exchange/exchange_online/policies/events","siteSpaceId":"sitesp_q3box","description":"Learn how to handle Nightfall Events that were created as a result of sensitive data leak in Microsoft Exchange.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Exchange Online"},{"label":"Nightfall for Microsoft Exchange"},{"label":"Configure Policies for Exchange"}]},{"id":"lDSoEQgbDuL8P15BEQsI","title":"Getting Started","pathname":"/microsoft-exchange-1/getting_started","siteSpaceId":"sitesp_q3box","description":"Learn the basics of Nightfall DLP for Microsoft SharePoint","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Sharepoint"}]},{"id":"SjqeLngotHRXR0Ye2Afi","title":"Microsoft SharePoint Requirements","pathname":"/microsoft-exchange-1/getting_started/requirements","siteSpaceId":"sitesp_q3box","description":"Make sure the following requirements are fulfilled before you get started with Microsoft SharePoint.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Sharepoint"},{"label":"Getting Started"}]},{"id":"8Hd5OamqqffWu7eq9RuH","title":"Setting up Directory Sync","pathname":"/microsoft-exchange-1/getting_started/directory_sync","siteSpaceId":"sitesp_q3box","description":"Learn how you can setup directory sync for Microsoft SharePoint.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Sharepoint"},{"label":"Getting Started"}]},{"id":"UgtfPsQgDqlmPZi8L8ZU","title":"Installing Microsoft SharePoint","pathname":"/microsoft-exchange-1/getting_started/installing-microsoft-sharepoint","siteSpaceId":"sitesp_q3box","description":"Learn how to install Nightfall for Microsoft SharePoint","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Sharepoint"},{"label":"Getting Started"}]},{"id":"DY9BumJ9kJcEncytMQ0Q","title":"Nightfall for Microsoft SharePoint","pathname":"/microsoft-exchange-1/exchange_online","siteSpaceId":"sitesp_q3box","description":"Learn how to get started with Nightfall for SharePoint","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Sharepoint"}]},{"id":"fpK2ucJBBxw7lZXE6DQE","title":"Configure Alerts for SharePoint","pathname":"/microsoft-exchange-1/exchange_online/integration_alerts","siteSpaceId":"sitesp_q3box","description":"Learn how you can configure integration level alerts in SharePoint.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Sharepoint"},{"label":"Nightfall for Microsoft SharePoint"}]},{"id":"vnpkLTF9QLGRiEA4NCxd","title":"Configure Policies for SharePoint","pathname":"/microsoft-exchange-1/exchange_online/policies","siteSpaceId":"sitesp_q3box","description":"Learn how to configure a detection policy for Nightfall for SharePoint.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Sharepoint"},{"label":"Nightfall for Microsoft SharePoint"}]},{"id":"UGBkrHGsymTfv0S7NZ7e","title":"Select Integration in SharePoint","pathname":"/microsoft-exchange-1/exchange_online/policies/integration","siteSpaceId":"sitesp_q3box","description":"Learn how you can select the SharePoint integration in a Nightfall policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Sharepoint"},{"label":"Nightfall for Microsoft SharePoint"},{"label":"Configure Policies for SharePoint"}]},{"id":"HFm7bvSGbiu6b0G3jjbT","title":"Configure Scope for SharePoint","pathname":"/microsoft-exchange-1/exchange_online/policies/scope","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the Scope section for SharePoint.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Sharepoint"},{"label":"Nightfall for Microsoft SharePoint"},{"label":"Configure Policies for SharePoint"}]},{"id":"FWSi9P2xLM9F0xXtKiIY","title":"Configure Detection Rules in SharePoint","pathname":"/microsoft-exchange-1/exchange_online/policies/detection_rules","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the detection rules section in Nightfall policies created for SharePoint","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Sharepoint"},{"label":"Nightfall for Microsoft SharePoint"},{"label":"Configure Policies for SharePoint"}]},{"id":"cjpIXR0zho5yRsESDt0E","title":"Configure Advanced Settings in SharePoint","pathname":"/microsoft-exchange-1/exchange_online/policies/advanced_settings","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the advanced settings section in Nightfall policies created for MS SharePoint.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Sharepoint"},{"label":"Nightfall for Microsoft SharePoint"},{"label":"Configure Policies for SharePoint"}]},{"id":"pB0C9tabpbjvxARbEXLq","title":"Risk Score in SharePoint","pathname":"/microsoft-exchange-1/exchange_online/policies/risk_score","siteSpaceId":"sitesp_q3box","description":"Learn how to configure risk score and name a Nightfall policy created for SharePoint","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Sharepoint"},{"label":"Nightfall for Microsoft SharePoint"},{"label":"Configure Policies for SharePoint"}]},{"id":"aWrPrzhILadAcbMaq01L","title":"Manage SharePoint Events","pathname":"/microsoft-exchange-1/exchange_online/policies/events","siteSpaceId":"sitesp_q3box","description":"Learn how to handle Nightfall Events that were created as a result of sensitive data leak in Microsoft SharePoint.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Microsoft Sharepoint"},{"label":"Nightfall for Microsoft SharePoint"},{"label":"Configure Policies for SharePoint"}]},{"id":"q0gZeoE5qLxIAt4VDvjQ","title":"Overview","pathname":"/gmail/overview","siteSpaceId":"sitesp_q3box","description":"An introduction to Nightfall DLP for Gmail","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Gmail "}]},{"id":"4XCCJ1VDqShHTxm4IOtP","title":"Install Nightfall DLP for Gmail","pathname":"/gmail/installation","siteSpaceId":"sitesp_q3box","description":"Learn how to install the Nightfall DLP for Gmail.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Gmail "}]},{"id":"ON41DRk7xJlVVNBuqkyX","title":"Configure Content Compliance Rules","pathname":"/gmail/installation/content_compliance_rules","siteSpaceId":"sitesp_q3box","description":"Learn how to configure Content Compliance rules in the Google Workspace.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Gmail "},{"label":"Install Nightfall DLP for Gmail"}]},{"id":"OfzgiXkoNMIyfAF6fGie","title":"Create Content Compliance Rule - Monitoring","pathname":"/gmail/installation/content_compliance_rules/monitroring","siteSpaceId":"sitesp_q3box","description":"Learn how to create a monitoring content compliance rule in the Google Workspace.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Gmail "},{"label":"Install Nightfall DLP for Gmail"},{"label":"Configure Content Compliance Rules"}]},{"id":"gwcQOWReigy9CixC1JX7","title":"Configure Content Compliance Rule - Quarantine","pathname":"/gmail/installation/content_compliance_rules/quarantine","siteSpaceId":"sitesp_q3box","description":"Learn how to create a quarantime content compliance rule in the Google Workspace.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Gmail "},{"label":"Install Nightfall DLP for Gmail"},{"label":"Configure Content Compliance Rules"}]},{"id":"xgdnODjvxdxEx7xzbNZ4","title":"Configure Routing Rules - SMTP Relay Settings","pathname":"/gmail/installation/content_compliance_rules/smtp_relay_settings","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the routing rules for SMTP relay settings in the Google Workspace.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Gmail "},{"label":"Install Nightfall DLP for Gmail"},{"label":"Configure Content Compliance Rules"}]},{"id":"WqvU9BfW0uti1pSFUDIy","title":"Configure Alerts for Gmail","pathname":"/gmail/integration_alerts","siteSpaceId":"sitesp_q3box","description":"Learn how to configure integration level alerts in Nightfall DLP for Gmail.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Gmail "}]},{"id":"bGYWJgCdvRyl9Usy8mbp","title":"Nightfall Policies for Gmail","pathname":"/gmail/policies","siteSpaceId":"sitesp_q3box","description":"Learn about the Gmail policies in Nightfall DLP for Gmail.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Gmail "}]},{"id":"frBSnj8fRGgWhBXnyeyo","title":"Gmail App Selection","pathname":"/gmail/policies/integration","siteSpaceId":"sitesp_q3box","description":"Learn how you can select the Gmail integration in a Nightfall policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Gmail "},{"label":"Nightfall Policies for Gmail"}]},{"id":"1wOs6FbJ3AH7vk3ZpsbZ","title":"Configure Scope for Gmail","pathname":"/gmail/policies/scope","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the Scope section for Gmail.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Gmail "},{"label":"Nightfall Policies for Gmail"}]},{"id":"NoaOEaT3MZu5ZD42EfxQ","title":"Configure Detection Rules for Gmail","pathname":"/gmail/policies/detection_rules","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the detection rules section in Nightfall policies created for Gmail.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Gmail "},{"label":"Nightfall Policies for Gmail"}]},{"id":"anD1ihXJle55xtwQFAt5","title":"Configure Advanced Settings for Gmail","pathname":"/gmail/policies/advanced_settings","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the advanced settings section in Nightfall policies created for the Gmail DLP.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Gmail "},{"label":"Nightfall Policies for Gmail"}]},{"id":"Q6ZGkBRuQpbGoQHv6bX7","title":"Configure Risk Score for Gmail","pathname":"/gmail/policies/risk_score","siteSpaceId":"sitesp_q3box","description":"Learn how to configure risk score and name a Nightfall policy created for Gmail.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Gmail "},{"label":"Nightfall Policies for Gmail"}]},{"id":"C3CHnYSEBOXyUgSTEuEb","title":"Manage Gmail Events","pathname":"/gmail/policies/events","siteSpaceId":"sitesp_q3box","description":"Learn how to handle Nightfall Events that were created as a result of sensitive data leak in the Gmail DLP.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Gmail "},{"label":"Nightfall Policies for Gmail"}]},{"id":"gPvzGbirgT3QH2hGDanO","title":"Remediation on Nightfall for Gmail","pathname":"/gmail/remediation","siteSpaceId":"sitesp_q3box","description":"Learn how to remediate events in Nightfall for Gmail.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Gmail "}]},{"id":"qbcEqTKHjJboDbEYuaCV","title":"Overview","pathname":"/salesforce/overview","siteSpaceId":"sitesp_q3box","description":"Learn how to get started with Nightfall DLP for Salesforce.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall For Salesforce"}]},{"id":"PvF0OVAnaQxfPL0U72il","title":"Getting Started","pathname":"/salesforce/getting-started","siteSpaceId":"sitesp_q3box","description":"A walk through of how to install Nightfall's DLP solution for Salesforce.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall For Salesforce"}]},{"id":"nFArDF8pVRB1wVnJPPyj","title":"Install Nightfall DLP for Salesforce","pathname":"/salesforce/getting-started/installation","siteSpaceId":"sitesp_q3box","description":"Learn how to install Nightfall DLP for Salesforce.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall For Salesforce"},{"label":"Getting Started"}]},{"id":"yL6WBJBLEeznv1mhpeSn","title":"Upgrade Nightfall DLP for Salesforce","pathname":"/salesforce/getting-started/upgrade","siteSpaceId":"sitesp_q3box","description":"Learn how you can upgrade the Nightfall DLP package, installed in a Salesforce org.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall For Salesforce"},{"label":"Getting Started"}]},{"id":"KKze0VRUCU0UCigSCJPy","title":"Configure Alerts for Salesforce","pathname":"/salesforce/getting-started/integration_alerts","siteSpaceId":"sitesp_q3box","description":"Learn how you can configure integration level alerts in Salesforce.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall For Salesforce"},{"label":"Getting Started"}]},{"id":"FOnwvqbK3RlZA8hR5IAp","title":"Nightfall Policies for Salesforce","pathname":"/salesforce/policies","siteSpaceId":"sitesp_q3box","description":"Learn how you can create policies for the Nightfall DLP for Salesforce.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall For Salesforce"}]},{"id":"MV7P3zkAhNpI9Az5PLsd","title":"Salesforce App Selection","pathname":"/salesforce/policies/integration","siteSpaceId":"sitesp_q3box","description":"Learn how you can select the Salesforce integration in a Nightfall policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall For Salesforce"},{"label":"Nightfall Policies for Salesforce"}]},{"id":"QylN2kErjuOxpLY3G6Ez","title":"Configure Scope for Salesforce","pathname":"/salesforce/policies/scope","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the Scope section in the Nightfall DLP for Salesforce.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall For Salesforce"},{"label":"Nightfall Policies for Salesforce"}]},{"id":"f4c90j7Qw6jcWIKsoqxO","title":"Configure Detection Rules for Salesforce","pathname":"/salesforce/policies/detection_rules","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the detection rules section in Nightfall policies created for Salesforce.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall For Salesforce"},{"label":"Nightfall Policies for Salesforce"}]},{"id":"OUm1UkEvdWQYVldZMham","title":"Configure Advanced Settings for Salesforce","pathname":"/salesforce/policies/advanced_settings","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the advanced settings section in Nightfall policies created for the Salesforce DLP.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall For Salesforce"},{"label":"Nightfall Policies for Salesforce"}]},{"id":"y3FbqJLHUqFXhDaeddqG","title":"Risk Score for Salesforce","pathname":"/salesforce/policies/risk_score","siteSpaceId":"sitesp_q3box","description":"Learn how to configure risk score and name a Nightfall policy created for Salesforce.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall For Salesforce"},{"label":"Nightfall Policies for Salesforce"}]},{"id":"vQSBofnscR1Uo0LIf3RX","title":"Manage Salesforce Events","pathname":"/salesforce/policies/events","siteSpaceId":"sitesp_q3box","description":"Learn how to handle Nightfall Events that were created as a result of sensitive data leak in the Salesforce.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall For Salesforce"},{"label":"Nightfall Policies for Salesforce"}]},{"id":"W5llNqkD8eRFjtjowpPQ","title":"High-Risk Salesforce Objects and Fields for Data Loss Prevention (DLP)","pathname":"/salesforce/policies/high-risk-salesforce-objects-and-fields-for-data-loss-prevention-dlp","siteSpaceId":"sitesp_q3box","description":"Prioritize unstructured and custom Salesforce fields to detect PII, PCI, PHI, Financial Data, IP/Confidential Data, and Secrets.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall For Salesforce"},{"label":"Nightfall Policies for Salesforce"}]},{"id":"Zf1ZXoAIlJq5kstOhSvi","title":"FAQs","pathname":"/salesforce/faqs","siteSpaceId":"sitesp_q3box","description":"Frequently Asked Questions for Nightfall DLP for Salesforce","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall For Salesforce"}]},{"id":"-MhGDf2Pe_pv8bz7Oh5I","title":"Getting Started","pathname":"/zendesk/getting_started","siteSpaceId":"sitesp_q3box","description":"This guide will help you to get started with installing and integrating Nightfall DLP for Zendesk.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Zendesk"}]},{"id":"LFdfhkt8VP31ol4Imtbq","title":"Requirements","pathname":"/zendesk/getting_started/requirements","siteSpaceId":"sitesp_q3box","description":"Make sure the following requirements are fulfilled before you get started.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Zendesk"},{"label":"Getting Started"}]},{"id":"lJfRUu7q17e9ZAYcT43g","title":"Install Nightfall DLP for Zendesk","pathname":"/zendesk/getting_started/installation","siteSpaceId":"sitesp_q3box","description":"Learn how you can install the Nightfall DLP for Zendesk.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Zendesk"},{"label":"Getting Started"}]},{"id":"A7OnHneUBlmH55Jpzn8y","title":"Configure Alerts for Zendesk","pathname":"/zendesk/getting_started/integration_alerts","siteSpaceId":"sitesp_q3box","description":"Learn how you can configure the integration level alerts in Nightfall DLP for Zendesk.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Zendesk"},{"label":"Getting Started"}]},{"id":"jYhp2B8PP1ZW7EoQYVId","title":"Configure Policies for Zendesk","pathname":"/zendesk/policies","siteSpaceId":"sitesp_q3box","description":"Learn how to set up Nightfall policies for Zendesk","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Zendesk"}]},{"id":"iIxCo2QV8UXKlBboA82t","title":"Zendesk App Selection","pathname":"/zendesk/policies/integration","siteSpaceId":"sitesp_q3box","description":"Learn how you can select the Zendesk integration in a Nightfall policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Zendesk"},{"label":"Configure Policies for Zendesk"}]},{"id":"E9NWR9rETyIbqbot0y9w","title":"Configure Scope for Zendesk","pathname":"/zendesk/policies/scope","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the Scope section for Zendesk.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Zendesk"},{"label":"Configure Policies for Zendesk"}]},{"id":"fA5LgFD4YkhnJKZq7f9b","title":"Configure Detection Rules for Zendesk DLP","pathname":"/zendesk/policies/detection_rules","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the detection rules section in Nightfall policies created for Zendesk.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Zendesk"},{"label":"Configure Policies for Zendesk"}]},{"id":"gYNfaKkklHUyoKx0ncJH","title":"Configure Advanced Settings in Zendesk","pathname":"/zendesk/policies/advanced_settings","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the advanced settings section in Nightfall policies created for the Zendesk.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Zendesk"},{"label":"Configure Policies for Zendesk"}]},{"id":"iAa56CepFND4LEarDg8a","title":"Risk Score for Zendesk","pathname":"/zendesk/policies/risk_score","siteSpaceId":"sitesp_q3box","description":"Learn how to configure risk score and name a Nightfall policy created for Zendesk","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Zendesk"},{"label":"Configure Policies for Zendesk"}]},{"id":"QoOaB4xyxK3kBfkmzQJW","title":"Manage Zendesk Events","pathname":"/zendesk/policies/events","siteSpaceId":"sitesp_q3box","description":"Learn how to handle Nightfall Events that were created as a result of sensitive data leak in the Zendesk.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Zendesk"},{"label":"Configure Policies for Zendesk"}]},{"id":"J9iUqqGDAJXudJAqfeAB","title":"Getting Started","pathname":"/notion/getting_started","siteSpaceId":"sitesp_q3box","description":"Learn the basics of Nightfall DLP for Notion.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Notion"}]},{"id":"K2TI6Ajd0E9oOHlds2AG","title":"Requirements","pathname":"/notion/getting_started/requirements","siteSpaceId":"sitesp_q3box","description":"Understand the Prerequisites to install the Nightfall DLP for Notion.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Notion"},{"label":"Getting Started"}]},{"id":"RhOQYKYxe5gCd0yZOZsx","title":"Steps","pathname":"/notion/getting_started/steps","siteSpaceId":"sitesp_q3box","description":"Learn the steps to get the Notion up and running.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Notion"},{"label":"Getting Started"}]},{"id":"WjrXxsl62XfdRhyBq5yC","title":"Install Nightfall for Notion","pathname":"/notion/installation","siteSpaceId":"sitesp_q3box","description":"Learn how you can install the Nightfall DLP for Notion.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Notion"}]},{"id":"GvKabGyRaiz4P1dr2Pdz","title":"Verification of Notion Installation","pathname":"/notion/installation/verification","siteSpaceId":"sitesp_q3box","description":"Learn how you can verify the connection to the installed Notion instance.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Notion"},{"label":"Install Nightfall for Notion"}]},{"id":"EoZqbSg0StMJ9tvscAu4","title":"Configure Alerts for Notion","pathname":"/notion/integration_alerts","siteSpaceId":"sitesp_q3box","description":"Learn how you can configure the integration level alerts for Notion.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Notion"}]},{"id":"ODE7TNnPsFc5wKEvYKNo","title":"Configure Policies for Notion","pathname":"/notion/policies","siteSpaceId":"sitesp_q3box","description":"Learn how you can create policies for the Nightfall DLP for Notion.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Notion"}]},{"id":"450AWGzoKdOPmoazlzrO","title":"Notion App Selection","pathname":"/notion/policies/integration","siteSpaceId":"sitesp_q3box","description":"Learn how you can select the Notion integration in a Nightfall policy.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Notion"},{"label":"Configure Policies for Notion"}]},{"id":"XzIS5rFLX9SSDqUPyTPW","title":"Configure Detection Rules for Notion","pathname":"/notion/policies/detection_rules","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the detection rules section in Nightfall policies created for Notion.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Notion"},{"label":"Configure Policies for Notion"}]},{"id":"4uRAsdNmyu9PcSZ4IOpr","title":"Configure Advanced Settings for Notion","pathname":"/notion/policies/advanced_settings","siteSpaceId":"sitesp_q3box","description":"Learn how to configure the advanced settings section in Nightfall policies created for Notion.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Notion"},{"label":"Configure Policies for Notion"}]},{"id":"dH4IFWcWgKxPeAIx6VU9","title":"Risk Score for Notion","pathname":"/notion/policies/risk_score","siteSpaceId":"sitesp_q3box","description":"Learn how to configure risk score and name a Nightfall policy created for the Notion DLP.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Notion"},{"label":"Configure Policies for Notion"}]},{"id":"iMApDi6piDQnMtPtyGlB","title":"Manage Notion Events","pathname":"/notion/policies/events","siteSpaceId":"sitesp_q3box","description":"Learn how to handle Nightfall Events that were created as a result of sensitive data leak in the Notion.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Nightfall for Notion"},{"label":"Configure Policies for Notion"}]},{"id":"TpeEch0LgyPkfi042W4h","title":"Users and Roles","pathname":"/nightfall_settings/users_roles","siteSpaceId":"sitesp_q3box","description":"Learn more about users and roles in Nightfall settings.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Settings"}]},{"id":"-Mg7bcHvrFcL7FvRnrG_","title":"Authentication Options","pathname":"/nightfall_settings/users_roles/authentication_options","siteSpaceId":"sitesp_q3box","description":"Learn the available authentication options.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Settings"},{"label":"Users and Roles"}]},{"id":"eIp8OoHViIRVRW6LrjYO","title":"Role Based Access Control (RBAC)","pathname":"/nightfall_settings/role_based_access_control","siteSpaceId":"sitesp_q3box","description":"Learn how the role based access control(RBAC) works in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Settings"}]},{"id":"8W9ipkz3Oz5Qovn4fu4t","title":"Security Analyst Role","pathname":"/nightfall_settings/role_based_access_control/security_analyst","siteSpaceId":"sitesp_q3box","description":"Learn the various permissions available to the security analyst role in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Settings"},{"label":"Role Based Access Control (RBAC)"}]},{"id":"uRkXSXyukqIkAl3cNEvs","title":"Policy Manager Role","pathname":"/nightfall_settings/role_based_access_control/policy_manager","siteSpaceId":"sitesp_q3box","description":"Learn the various permissions available to the policy manager role in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Settings"},{"label":"Role Based Access Control (RBAC)"}]},{"id":"ttqW4mrIsKilJYZ1BOPW","title":"Security Events Manager Role","pathname":"/nightfall_settings/role_based_access_control/security_events_manager","siteSpaceId":"sitesp_q3box","description":"Learn the various permissions available to the security events manager role in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Settings"},{"label":"Role Based Access Control (RBAC)"}]},{"id":"WSLuyB90MhyOikKYnx5y","title":"Security Operations Manager Role","pathname":"/nightfall_settings/role_based_access_control/security_operations_manager","siteSpaceId":"sitesp_q3box","description":"Learn the various permissions available to the security operations manager role in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Settings"},{"label":"Role Based Access Control (RBAC)"}]},{"id":"bHpMs0NsZIjlBUQx8aZI","title":"System Administrator Role","pathname":"/nightfall_settings/role_based_access_control/system_administrator","siteSpaceId":"sitesp_q3box","description":"Learn the various permissions available to the system administrator role in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Settings"},{"label":"Role Based Access Control (RBAC)"}]},{"id":"XbmvxHqSLaiFqAJEOlJ9","title":"Directory Sync","pathname":"/nightfall_settings/directory_sync","siteSpaceId":"sitesp_q3box","description":"Learn how you can leverage the directory sync feature in Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Settings"}]},{"id":"gAVlWW6LmYu4sVqT7J6M","title":"Add Microsoft Entra ID to Nightfall","pathname":"/nightfall_settings/directory_sync/microsoft_entra_id","siteSpaceId":"sitesp_q3box","description":"Learn how to sync your Microsoft Entra ID's data to Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Settings"},{"label":"Directory Sync"}]},{"id":"FXlFgLgy1mBVK8YAnGxP","title":"Google Workspace Directory Service","pathname":"/nightfall_settings/directory_sync/google_workspace","siteSpaceId":"sitesp_q3box","description":"Learn how to sync your Google Workspace data to Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Settings"},{"label":"Directory Sync"}]},{"id":"cI5jHv0UP0QCSbUmHaad","title":"Add Okta to Nightfall","pathname":"/nightfall_settings/directory_sync/okta","siteSpaceId":"sitesp_q3box","description":"Learn how to sync your Okta data to Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Settings"},{"label":"Directory Sync"}]},{"id":"a2M04VkmUbSHCvzDgrNm","title":"Custom Branding","pathname":"/nightfall_settings/custom-branding","siteSpaceId":"sitesp_q3box","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Settings"}]},{"id":"5Uu7QLeiw4z9XgqA7R8V","title":"Customer Referral Program","pathname":"/nightfall_settings/customer-referral-program","siteSpaceId":"sitesp_q3box","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Settings"}]},{"id":"-MjVvHzOzDjXWm1hrdqM","title":"Frequently Asked Questions (FAQs)","pathname":"/faqs","siteSpaceId":"sitesp_q3box","description":"A list of common queries which users get while using Nightfall and their responses.","breadcrumbs":[{"label":"Data Detection and Response"}]},{"id":"-MgIJteFoas9LSZsTyVx","title":"How long does it take to deploy Nightfall?","pathname":"/faqs/nightfall_deployment_time","siteSpaceId":"sitesp_q3box","description":"Learn about the time taken to deploy Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"-MgIK1ZJeOqpSeMieipW","title":"How do I deploy Nightfall?","pathname":"/faqs/deploy_nightfall","siteSpaceId":"sitesp_q3box","description":"Learn the process of Nightfall deployment.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"-MjWVOKsBdK3mUGN-hd4","title":"What are some unique points about Nightfall that I should know?","pathname":"/faqs/differentiators","siteSpaceId":"sitesp_q3box","description":"Learn some unique points about Nightfall which differentiate it from the competitors.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"dSjzsROqsi0yidIGk1JN","title":"Which languages does Nightfall support?","pathname":"/faqs/supported_languages","siteSpaceId":"sitesp_q3box","description":"Use this to understand the language nuances when using Nightfall for text recognition and classification.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"-MjWVi4z9KDV037NCCHW","title":"How does Nightfall yield time savings for my team?","pathname":"/faqs/reduced_tco","siteSpaceId":"sitesp_q3box","description":"Learn how Nightfall can save your team's time in managing sensitive data.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"-MjWVqcmoLy2EA3f-C4I","title":"Nightfall vs Legacy DLP: What's the difference?","pathname":"/faqs/nightfall_vs_legacy_dlp","siteSpaceId":"sitesp_q3box","description":"Learn the difference between Nightfall DLP and legacy DLP solutions.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"-MjWW0Re3ikUGvVquoA-","title":"How does Nightfall make my organization more secure?","pathname":"/faqs/eliminate_data_exposure","siteSpaceId":"sitesp_q3box","description":"Learn how Nightfall can secure your organization from sensitive data leaks.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"-MjWWD4qshulk6Qxdx25","title":"Nightfall vs CASB: What's the difference?","pathname":"/faqs/nightfall_vs_casb","siteSpaceId":"sitesp_q3box","description":"Learn the differences between Nightfall DLP and cloud access security broker (CASB).","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"-MjWWLB4Y6xPD75zMcON","title":"Nightfall vs E-Discovery: What's the difference?","pathname":"/faqs/nightfall-vs-e-discovery","siteSpaceId":"sitesp_q3box","description":"Learn the differences between Nightfall DLP and E-discovery","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"-MjWWvJJLsTTyPGjLFkT","title":"How does Nightfall classify data?","pathname":"/faqs/data_classification","siteSpaceId":"sitesp_q3box","description":"Learn how Nightfall classifies data.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"-MjWWyWRLAJa_KnIGS5g","title":"What types of data does Nightfall classify?","pathname":"/faqs/nightfall_data_types_classification","siteSpaceId":"sitesp_q3box","description":"Learn the types of data that Nightfall can classify.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"-MjWX31pGZsjylzs29IB","title":"Does Nightfall scan unstructured data?","pathname":"/faqs/unstructured_data_scan","siteSpaceId":"sitesp_q3box","description":"Learn how Nightfall scans unstructured data.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"-MjWX8lEXIg_At_Qj4fN","title":"Does Nightfall require data to be already tagged?","pathname":"/faqs/data_tagging","siteSpaceId":"sitesp_q3box","description":"Learn if Nightfall can handle data that is not tagged","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"-MjWXEOD7aoQ_swtOmXa","title":"How do I learn more about and test out Nightfall?","pathname":"/faqs/contact_sales","siteSpaceId":"sitesp_q3box","description":"Learn how you can contact Nightfall sales team.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"-MkdIKEScMqBihFBdx3Z","title":"Using Service Accounts with Nightfall","pathname":"/faqs/service_accounts","siteSpaceId":"sitesp_q3box","description":"Learn if you can use service accounts for authentication in the Nightfall integrations.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"IUAQxRZjc5xunhkSVmdS","title":"Which permissions are required for each integration?","pathname":"/faqs/permissions","siteSpaceId":"sitesp_q3box","description":"Learn the permissions required for each Nightfall integration.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"A3UiE4Joa27BjCRWNR5v","title":"Where can I find active user counts for each SaaS application protected by Nightfall?","pathname":"/faqs/active_users","siteSpaceId":"sitesp_q3box","description":"Learn how you search for active user count for each SaaS application protected by Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"sOrDa8LC8n8I51lbNqM1","title":"In the Atlassian Marketplace, why does it show that the Nightfall app is not approved in security?","pathname":"/faqs/atlassian_marketplace","siteSpaceId":"sitesp_q3box","description":"Learn why the Atlassian Marketplace says that the Nightfall app is not approved.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"efkJxvjmRIZhONSGz6oi","title":"How can I estimate the data volume that Nightfall needs to scan?","pathname":"/faqs/estimate_data_to_be_scanned","siteSpaceId":"sitesp_q3box","description":"Learn how you can estimate the amount of data that needs to be scanned by Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"-MiIXmXuNqCijQE5-tEj","title":"How can I check the Platform Status of Nightfall","pathname":"/faqs/platform_status","siteSpaceId":"sitesp_q3box","description":"Learn how to view the current status of your Nightfall platform.","breadcrumbs":[{"label":"Data Detection and Response"},{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"-MjNDgFqae0oedV2yXhQ","title":"Contact Nightfall","pathname":"/contact-us","siteSpaceId":"sitesp_q3box","description":"Learn how you can contact Nightfall.","breadcrumbs":[{"label":"Data Detection and Response"}]},{"id":"TzBRrcIl5je33g6XJ2Pu","title":"Nightfall Posture Management","pathname":"/data-security-posture-management","siteSpaceId":"sitesp_2ladQ","breadcrumbs":[{"label":"Posture Management"}]},{"id":"Ho3Luh4CYISGbzQ1nifC","title":"Nightfall Security Posture Management","pathname":"/data-security-posture-management/nightfall-security-posture-management","siteSpaceId":"sitesp_2ladQ","breadcrumbs":[{"label":"Posture Management"}]},{"id":"4MzfOPgMbXZWj0VfdDqe","title":"Installing Nightfall for Google Drive","pathname":"/data-security-posture-management/nightfall-for-google-drive/installing-nightfall-for-google-drive","siteSpaceId":"sitesp_2ladQ","breadcrumbs":[{"label":"Posture Management"},{"label":"Nightfall for Google Drive"}]},{"id":"dlfxLtaL3R0WGnIZB60X","title":"Configuring Integration Alerts","pathname":"/data-security-posture-management/nightfall-for-google-drive/configuring-integration-alerts","siteSpaceId":"sitesp_2ladQ","breadcrumbs":[{"label":"Posture Management"},{"label":"Nightfall for Google Drive"}]},{"id":"RUICyBqvyPzyy8OiWSzC","title":"Configuring Google Drive Policies","pathname":"/data-security-posture-management/nightfall-for-google-drive/configuring-google-drive-policies","siteSpaceId":"sitesp_2ladQ","breadcrumbs":[{"label":"Posture Management"},{"label":"Nightfall for Google Drive"}]},{"id":"adDVTAwQgwQcpzLeBKYK","title":"Integration","pathname":"/data-security-posture-management/nightfall-for-google-drive/configuring-google-drive-policies/integration","siteSpaceId":"sitesp_2ladQ","breadcrumbs":[{"label":"Posture Management"},{"label":"Nightfall for Google Drive"},{"label":"Configuring Google Drive Policies"}]},{"id":"sVw62dLKdou5ZetE2xRF","title":"Scope","pathname":"/data-security-posture-management/nightfall-for-google-drive/configuring-google-drive-policies/scope","siteSpaceId":"sitesp_2ladQ","breadcrumbs":[{"label":"Posture Management"},{"label":"Nightfall for Google Drive"},{"label":"Configuring Google Drive Policies"}]},{"id":"ME9zXxNRfvvfR1SzRduz","title":"Trigger","pathname":"/data-security-posture-management/nightfall-for-google-drive/configuring-google-drive-policies/trigger","siteSpaceId":"sitesp_2ladQ","breadcrumbs":[{"label":"Posture Management"},{"label":"Nightfall for Google Drive"},{"label":"Configuring Google Drive Policies"}]},{"id":"Tz33HTvqSXNmSyGfepqK","title":"Automated Actions","pathname":"/data-security-posture-management/nightfall-for-google-drive/configuring-google-drive-policies/automated-actions","siteSpaceId":"sitesp_2ladQ","breadcrumbs":[{"label":"Posture Management"},{"label":"Nightfall for Google Drive"},{"label":"Configuring Google Drive Policies"}]},{"id":"tgU4hjoUPbjNe3JTW25z","title":"Creating Policy","pathname":"/data-security-posture-management/nightfall-for-google-drive/configuring-google-drive-policies/creating-policy","siteSpaceId":"sitesp_2ladQ","breadcrumbs":[{"label":"Posture Management"},{"label":"Nightfall for Google Drive"},{"label":"Configuring Google Drive Policies"}]},{"id":"tRzejp6cBCAACt9qMx97","title":"Remediation for Google Drive","pathname":"/data-security-posture-management/nightfall-for-google-drive/remediation-for-google-drive","siteSpaceId":"sitesp_2ladQ","breadcrumbs":[{"label":"Posture Management"},{"label":"Nightfall for Google Drive"}]},{"id":"8BDwytMm1xWlMR9i9FTA","title":"Posture Management Events Page","pathname":"/data-security-posture-management/nightfall-for-google-drive/posture-management-events-page","siteSpaceId":"sitesp_2ladQ","breadcrumbs":[{"label":"Posture Management"},{"label":"Nightfall for Google Drive"}]},{"id":"TzBRrcIl5je33g6XJ2Pu","title":"Nightfall Data Exfiltration Prevention","pathname":"/data-exfiltration-prevention","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"}]},{"id":"Ho3Luh4CYISGbzQ1nifC","title":"What is Data Exfiltration","pathname":"/data-exfiltration-prevention/nightfall_exfiltration","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"}]},{"id":"IDDKwlUKkbUhMmdmX8my","title":"Nyx – AI-powered DLP Copilot","pathname":"/data-exfiltration-prevention/nightfall_copilot_nyx/nyx-ai-powered-dlp-copilot","siteSpaceId":"sitesp_RHT5S","description":"Learn about Nyx. Nightfall's AI-powered Copilot.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Nightfall Copilot - NyX"}]},{"id":"viD4Qu6cmPOiBTQfOo8R","title":"Exfiltration Events","pathname":"/data-exfiltration-prevention/dashboard-and-events/exfiltration-events","siteSpaceId":"sitesp_RHT5S","description":"Learn the details available on the Nightfall Exfiltration Events page","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Dashboard and Events"}]},{"id":"4MzfOPgMbXZWj0VfdDqe","title":"Installing Nightfall for Google Drive","pathname":"/data-exfiltration-prevention/exfiltration_google_drive/installation","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Google Drive"}]},{"id":"dlfxLtaL3R0WGnIZB60X","title":"Configuring Integration Alerts","pathname":"/data-exfiltration-prevention/exfiltration_google_drive/integration_alerts","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Google Drive"}]},{"id":"RUICyBqvyPzyy8OiWSzC","title":"Configuring Google Drive Policies","pathname":"/data-exfiltration-prevention/exfiltration_google_drive/policies","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Google Drive"}]},{"id":"adDVTAwQgwQcpzLeBKYK","title":"Google Drive App Selection","pathname":"/data-exfiltration-prevention/exfiltration_google_drive/policies/integration","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Google Drive"},{"label":"Configuring Google Drive Policies"}]},{"id":"JONWTnbf7J2fvWONrjf4","title":"Scope","pathname":"/data-exfiltration-prevention/exfiltration_google_drive/policies/scope","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Google Drive"},{"label":"Configuring Google Drive Policies"}]},{"id":"ME9zXxNRfvvfR1SzRduz","title":"Trigger","pathname":"/data-exfiltration-prevention/exfiltration_google_drive/policies/trigger","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Google Drive"},{"label":"Configuring Google Drive Policies"}]},{"id":"Tz33HTvqSXNmSyGfepqK","title":"Automated Actions","pathname":"/data-exfiltration-prevention/exfiltration_google_drive/policies/automated_actions","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Google Drive"},{"label":"Configuring Google Drive Policies"}]},{"id":"tgU4hjoUPbjNe3JTW25z","title":"Creating Policy","pathname":"/data-exfiltration-prevention/exfiltration_google_drive/policies/policy_creation","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Google Drive"},{"label":"Configuring Google Drive Policies"}]},{"id":"tRzejp6cBCAACt9qMx97","title":"Remediation for Google Drive Exfiltration","pathname":"/data-exfiltration-prevention/exfiltration_google_drive/remediation","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Google Drive"}]},{"id":"aFUwEeO7Ccw2RDoHEaoz","title":"Endpoint Exfiltration Prevention","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/endpoint-exfiltration-prevention","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"}]},{"id":"ck8Bsq00DOkkTeHlCfMN","title":"Additional Methods to Install Nightfall AI Extension","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/additional-methods-to-install-nightfall-ai-extension","siteSpaceId":"sitesp_RHT5S","description":"This explains the other methods of deployment available for the Nightfall AI extension, separate from the Nightfall AI Agent.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"}]},{"id":"UE5Fv4JnevWFIKgOLyhw","title":"Install Nightfall AI Extension via Google Workspace Admin","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/additional-methods-to-install-nightfall-ai-extension/install-nightfall-ai-extension-via-google-workspace-admin","siteSpaceId":"sitesp_RHT5S","description":"If an organization is utilizing Google Workspace to deploy extensions to Chrome, two options are provided to deploy the Nightfall extension and avoid conflicts on the machine.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Additional Methods to Install Nightfall AI Extension"}]},{"id":"HQ7htnBSbZFtpJjo0dkp","title":"Install Nightfall AI Extension via a Common MDM Profile","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/additional-methods-to-install-nightfall-ai-extension/install-nightfall-ai-extension-via-a-common-mdm-profile","siteSpaceId":"sitesp_RHT5S","description":"This walkthrough adds the Nightfall Profile Chrome ExtensionSettings to an existing custom macOS profile.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Additional Methods to Install Nightfall AI Extension"}]},{"id":"XsuyQrSdrZxsPRRvHp8Z","title":"Install Nightfall AI Agent for Mac","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/installation_mac","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"}]},{"id":"2PsvS2KoPZenykWvKZ7V","title":"Manual Installation","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/installation_mac/manual_installation","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Install Nightfall AI Agent for Mac"}]},{"id":"2BqUnvR3EqAd4KdpPnvr","title":"Nightfall macOS Agent Deployment: JAMF MDM","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/installation_mac/jamf_installation","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Install Nightfall AI Agent for Mac"}]},{"id":"428785dc08cfa142be4209af7312a105f24c0406","title":"Nightfall macOS Agent Deployment: JumpCloud MDM","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/installation_mac/nightfall-macos-agent-deployment-jumpcloud-mdm","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Install Nightfall AI Agent for Mac"}]},{"id":"6a209hFZiKpK8JRd5UJh","title":"Nightfall macOS Agent Deployment: Iru (Kandji) MDM","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/installation_mac/kandji_installation","siteSpaceId":"sitesp_RHT5S","description":"This document explains the process of installing Nightfall AI agent using the Kandji MDM.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Install Nightfall AI Agent for Mac"}]},{"id":"uEajzH92TsL4f3aIxiXp","title":"Nightfall macOS Agent Deployment: Mosyle MDM","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/installation_mac/nightfall-macos-agent-deployment-mosyle-mdm","siteSpaceId":"sitesp_RHT5S","description":"Below is a step-by-step guide to deploy the Nightfall Endpoint DLP agent for macOS using Mosyle MDM.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Install Nightfall AI Agent for Mac"}]},{"id":"8qxK5GRLv3dhOrGIjHMb","title":"Nightfall macOS Agent Deployment: PDQ SimpleMDM","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/installation_mac/nightfall-macos-agent-deployment-pdq-simplemdm","siteSpaceId":"sitesp_RHT5S","description":"Below is a step-by-step guide to deploy the Nightfall Endpoint DLP agent for macOS using PDQ's SimpleMDM.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Install Nightfall AI Agent for Mac"}]},{"id":"giunFk8hfxPbcQ07K5Og","title":"Nightfall macOS Agent Deployment: Rippling MDM","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/installation_mac/rippling_installation","siteSpaceId":"sitesp_RHT5S","description":"This document explains the process of installing Nightfall AI agent using the Rippling MDM.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Install Nightfall AI Agent for Mac"}]},{"id":"vB8B67wFUsllmKHojNBd","title":"Nightfall macOS Agent Deployment: Workspace ONE UEM","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/installation_mac/nightfall-macos-agent-deployment-workspace-one-uem","siteSpaceId":"sitesp_RHT5S","description":"Below is a step-by-step guide to deploy the Nightfall Endpoint agent for macOS using Workspace ONE UEM.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Install Nightfall AI Agent for Mac"}]},{"id":"eeqjOuIpWiJ3zjFnQjWx","title":"Install Nightfall AI Agent for Windows OS","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/install-nightfall-ai-agent-for-windows-os","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"}]},{"id":"Qpt3XsN9QaQ92RWMlOnf","title":"Manual Installation","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/install-nightfall-ai-agent-for-windows-os/manual-installation","siteSpaceId":"sitesp_RHT5S","description":"Learn how to install the Nightfall agent on Microsoft Windows OS manually.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Install Nightfall AI Agent for Windows OS"}]},{"id":"d996e9c48c7cd83f1ee009cc9d03757eee4a1994","title":"Nightfall Windows Agent Deployment: JumpCloud MDM","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/install-nightfall-ai-agent-for-windows-os/nightfall-windows-agent-deployment-jumpcloud-mdm","siteSpaceId":"sitesp_RHT5S","description":"Instructions on how to install the Nightfall agent on Microsoft Windows using the JumpCloud MDM.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Install Nightfall AI Agent for Windows OS"}]},{"id":"oslnoNnMtZwtWKSAjlER","title":"Nightfall Windows Agent Deployment: Microsoft Intune","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/install-nightfall-ai-agent-for-windows-os/nightfall-windows-agent-deployment-microsoft-intune","siteSpaceId":"sitesp_RHT5S","description":"Learn how to install the Nightfall Agent for Windows using Intune as a Line-of-Business (LOB) app.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Install Nightfall AI Agent for Windows OS"}]},{"id":"Xk1qmmMDCJZNwYXhFcPL","title":"Nightfall Windows Agent Deployment: MSI","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/install-nightfall-ai-agent-for-windows-os/nightfall-windows-agent-deployment-msi","siteSpaceId":"sitesp_RHT5S","description":"This guide explains multiple ways to deploy the Nightfall Agent (NightfallAgent.msi) with the required API_KEY and COMPANY_ID parameters.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Install Nightfall AI Agent for Windows OS"}]},{"id":"AHr1LiQEXQRUEd8SJiE5","title":"Nightfall Windows Agent Deployment: Rippling MDM","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/install-nightfall-ai-agent-for-windows-os/nightfall-windows-agent-deployment-rippling-mdm","siteSpaceId":"sitesp_RHT5S","description":"Learn how to install the Nightfall agent on Microsoft Windows OS using the Rippling MDM.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Install Nightfall AI Agent for Windows OS"}]},{"id":"Lx5SZKV7jkRgNlRM8iKI","title":"Nightfall Windows Agent Deployment: Workspace ONE UEM","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/install-nightfall-ai-agent-for-windows-os/nightfall-windows-agent-deployment-workspace-one-uem","siteSpaceId":"sitesp_RHT5S","description":"Below is a step-by-step guide to deploy the Nightfall Endpoint DLP agent for Windows using Workspace ONE UEM.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Install Nightfall AI Agent for Windows OS"}]},{"id":"3fP8htYnahh0kwYBJnkZ","title":"Configuring Integration Alerts","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/integration_alerts","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"}]},{"id":"sLvvlRV72ek32TuB4heC","title":"Configuring Policies","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"}]},{"id":"28B5O80Ml2DloVLqTTV8","title":"MAC/Windows App Selection","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/integration","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"}]},{"id":"uZgKjC9oUjp7zPMIqsLp","title":"Scope","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/scope","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"}]},{"id":"cKYkfjl6ygiBCdJSKpYe","title":"Trigger","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/trigger","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"}]},{"id":"USVdC42o1aiz5LhyfYIx","title":"Browser Uploads","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/trigger/browser-uploads","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"},{"label":"Trigger"}]},{"id":"Segf95G6R4CkYqiLvc11","title":"Clipboard Paste","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/trigger/clipboard-paste","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"},{"label":"Trigger"}]},{"id":"YEkKsR4dpGz8mmnxgMO2","title":"Uploads, Paste to Desktop Apps","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/trigger/uploads-paste-to-desktop-apps","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"},{"label":"Trigger"}]},{"id":"rq3KyRMQPEl7kkJ4jmlb","title":"Session Detection: Corporate and Personal Account Filtering","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/trigger/session-detection-corporate-and-personal-account-filtering","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"},{"label":"Trigger"}]},{"id":"m90QDbezkos8j9PRANwh","title":"Cloud Sync App Uploads","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/trigger/cloud-sync-app-uploads","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"},{"label":"Trigger"}]},{"id":"q3RwWcbb1H3pG8bLZYP5","title":"Removable Media","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/trigger/removable-media","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"},{"label":"Trigger"}]},{"id":"MtLHPtkDh2m5yVQDJ0CZ","title":"Git Push Monitoring","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/trigger/git-push-monitoring","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"},{"label":"Trigger"}]},{"id":"Lx8cw70VWkdxiSAuNLcN","title":"Printer Support","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/trigger/printer-support","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"},{"label":"Trigger"}]},{"id":"pdSwoYOXRT0tPOJg3iBM","title":"Advanced Settings","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/advanced_settings","siteSpaceId":"sitesp_RHT5S","description":"Learn about the advanced setting options present in the Nightfall exfiltration policy for MAC devices.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"}]},{"id":"ND8R10oWE8ouXx0FQYIX","title":"Admin Alerting","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/advanced_settings/alerting","siteSpaceId":"sitesp_RHT5S","description":"Learn how to configure admin alerts in Nightfall exfiltration policies.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"},{"label":"Advanced Settings"}]},{"id":"gArmKfn7YV5exI3qAM96","title":"Automated Actions","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/advanced_settings/automated_action","siteSpaceId":"sitesp_RHT5S","description":"Learn more about how automated actions work in a Nightfall exfiltration policy.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"},{"label":"Advanced Settings"}]},{"id":"cjBGATNdfLvE7UcPntQX","title":"Temporary Exception Requests - User Justification and Override Workflow","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/advanced_settings/automated_action/temporary-exception-requests-user-justification-and-override-workflow","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"},{"label":"Advanced Settings"},{"label":"Automated Actions"}]},{"id":"D1ECkAEpB11CarVym8mj","title":"End-User Notifications","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/advanced_settings/enduser_notification","siteSpaceId":"sitesp_RHT5S","description":"Learn how to configure end user notifications in Nightfall exfiltration policies.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"},{"label":"Advanced Settings"}]},{"id":"FlVouT3eodIraSCGALfY","title":"Creating Policy","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/create_policy","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"}]},{"id":"rfynivugvWoPtWlmsnFc","title":"Remediation for MAC OS Policies","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/remediation","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"}]},{"id":"eeB3Cmmc1ixjWhLzdvUE","title":"Frequently Asked Questions (FAQs)","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/frequently-asked-questions-faqs","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"}]},{"id":"wCZt8Zz93UsMfDFdWn4z","title":"Remediation for Windows OS Policies","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/remediation-for-windows-os-policies","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"}]},{"id":"c6HHmaBURqDwX1cfeIcC","title":"Recommended Policy Configurations","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/policies/recommended-policy-configurations","siteSpaceId":"sitesp_RHT5S","description":"","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"},{"label":"Configuring Policies"}]},{"id":"9w0NUOGYbai1j7apzzF8","title":"Endpoints - Installation Status","pathname":"/data-exfiltration-prevention/exfiltration_endpoint/endpoints-installation-status","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Endpoint"}]},{"id":"m9AcOEOV4ZfWSo1IqkfD","title":"Nightfall Exfiltration for Salesforce","pathname":"/data-exfiltration-prevention/exfiltration_salesforce/overview","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Salesforce"}]},{"id":"juhB89ioXDley5KaJeal","title":"Configuring Integration Alerts","pathname":"/data-exfiltration-prevention/exfiltration_salesforce/integration_alerts","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Salesforce"}]},{"id":"0C5YhLIa0F0wd3RH4XOM","title":"Configuring Salesforce Exfiltration Policies","pathname":"/data-exfiltration-prevention/exfiltration_salesforce/policies","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Salesforce"}]},{"id":"rGxqv8WtzOU2JpDuvGcY","title":"Salesforce App Selection","pathname":"/data-exfiltration-prevention/exfiltration_salesforce/policies/integration","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Salesforce"},{"label":"Configuring Salesforce Exfiltration Policies"}]},{"id":"nZxRTcr6pN7K2c0PM9HG","title":"Scope","pathname":"/data-exfiltration-prevention/exfiltration_salesforce/policies/scope","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Salesforce"},{"label":"Configuring Salesforce Exfiltration Policies"}]},{"id":"Q6mUseBJMm4XCM4BHtJr","title":"Trigger","pathname":"/data-exfiltration-prevention/exfiltration_salesforce/policies/trigger","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Salesforce"},{"label":"Configuring Salesforce Exfiltration Policies"}]},{"id":"J93FIdQNsvgX4zRjPyUi","title":"Advanced Settings","pathname":"/data-exfiltration-prevention/exfiltration_salesforce/policies/advanced_settings","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Salesforce"},{"label":"Configuring Salesforce Exfiltration Policies"}]},{"id":"WnyyaSuVw8lND6XyiLHj","title":"Creating Policy","pathname":"/data-exfiltration-prevention/exfiltration_salesforce/policies/create_policy","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Salesforce"},{"label":"Configuring Salesforce Exfiltration Policies"}]},{"id":"PSf1tIiktl5b4nIeS5gh","title":"Remediation for Salesforce Exfiltration","pathname":"/data-exfiltration-prevention/exfiltration_salesforce/policies/remediation","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Exfiltration Prevention for Salesforce"},{"label":"Configuring Salesforce Exfiltration Policies"}]},{"id":"7DKLE2NhTcsWKoIOxSJk","title":"AI Agent Governance: MCP Server Visibility","pathname":"/data-exfiltration-prevention/ai-agent-security/ai-agent-governance-mcp-server-visibility","siteSpaceId":"sitesp_RHT5S","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"AI Agent Security"}]},{"id":"XY1gZYklM4zjKyso5p4m","title":"Forensics Search","pathname":"/data-exfiltration-prevention/forensic-search/forensics-search","siteSpaceId":"sitesp_RHT5S","description":"Perform insider risk investigations and threat hunting across all detected data exfiltration events — not only policy-triggered alerts.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"Forensic Search"}]},{"id":"Pimriz1O0rvaaGeJK9fJ","title":"App Intelligence","pathname":"/data-exfiltration-prevention/app-intelligence/app-intelligence","siteSpaceId":"sitesp_RHT5S","description":"Identify, classify, and assess risk for SaaS and AI applications used across your environment.","breadcrumbs":[{"label":"Data Exfiltration Prevention"},{"label":"App Intelligence"}]},{"id":"TzBRrcIl5je33g6XJ2Pu","title":"Nightfall Data Encryption","pathname":"/data-encryption","siteSpaceId":"sitesp_GW1YE","breadcrumbs":[{"label":"Data Encryption"}]},{"id":"Off6bNZtkXY1mHnfduRH","title":"Encryption FAQs","pathname":"/data-encryption/encryption-faqs","siteSpaceId":"sitesp_GW1YE","breadcrumbs":[{"label":"Data Encryption"}]},{"id":"ALQrFlpCWao0qG3vPp0H","title":"Data Encryption for Gmail - Overview","pathname":"/data-encryption/gmail/data-encryption-for-gmail-overview","siteSpaceId":"sitesp_GW1YE","breadcrumbs":[{"label":"Data Encryption"},{"label":"Gmail"}]},{"id":"oqkKykeuX0i9FgNWoz6X","title":"Installing Nightfall DLP","pathname":"/data-encryption/gmail/installing-nightfall-dlp","siteSpaceId":"sitesp_GW1YE","breadcrumbs":[{"label":"Data Encryption"},{"label":"Gmail"}]},{"id":"ekzHi8VmFDjdrZD7tan5","title":"Installing Nightfall DLP on Individual Devices","pathname":"/data-encryption/gmail/installing-nightfall-dlp/installing-nightfall-dlp-on-individual-devices","siteSpaceId":"sitesp_GW1YE","breadcrumbs":[{"label":"Data Encryption"},{"label":"Gmail"},{"label":"Installing Nightfall DLP"}]},{"id":"og5oUnuRL4yGHCjvM0Z1","title":"Installing Nightfall DLP Across Organization","pathname":"/data-encryption/gmail/installing-nightfall-dlp/installing-nightfall-dlp-across-organization","siteSpaceId":"sitesp_GW1YE","breadcrumbs":[{"label":"Data Encryption"},{"label":"Gmail"},{"label":"Installing Nightfall DLP"}]},{"id":"yGsnsYnFgYai1SIZkwCT","title":"Creating Policies for Encryption","pathname":"/data-encryption/gmail/creating-policies-for-encryption","siteSpaceId":"sitesp_GW1YE","breadcrumbs":[{"label":"Data Encryption"},{"label":"Gmail"}]},{"id":"u1ssrahH9jE3Ma20dp97","title":"Integration","pathname":"/data-encryption/gmail/creating-policies-for-encryption/integration","siteSpaceId":"sitesp_GW1YE","breadcrumbs":[{"label":"Data Encryption"},{"label":"Gmail"},{"label":"Creating Policies for Encryption"}]},{"id":"9pAJRTpYXoIQpvPvxfpR","title":"Scope","pathname":"/data-encryption/gmail/creating-policies-for-encryption/scope","siteSpaceId":"sitesp_GW1YE","breadcrumbs":[{"label":"Data Encryption"},{"label":"Gmail"},{"label":"Creating Policies for Encryption"}]},{"id":"yKCd06nZQYvutYCgSPGi","title":"Advanced Settings","pathname":"/data-encryption/gmail/creating-policies-for-encryption/advanced-settings","siteSpaceId":"sitesp_GW1YE","breadcrumbs":[{"label":"Data Encryption"},{"label":"Gmail"},{"label":"Creating Policies for Encryption"}]},{"id":"ObXCH3itudGqffdQ5sQT","title":"Creating Policy","pathname":"/data-encryption/gmail/creating-policies-for-encryption/creating-policy","siteSpaceId":"sitesp_GW1YE","breadcrumbs":[{"label":"Data Encryption"},{"label":"Gmail"},{"label":"Creating Policies for Encryption"}]},{"id":"0ISM0sC8TyZJzRBF7PC8","title":"Remediation for Data Encryption","pathname":"/data-encryption/gmail/creating-policies-for-encryption/remediation-for-data-encryption","siteSpaceId":"sitesp_GW1YE","breadcrumbs":[{"label":"Data Encryption"},{"label":"Gmail"},{"label":"Creating Policies for Encryption"}]},{"id":"fhmBv0ebO5K77LS6TSQA","title":"Encryption Policy FAQs","pathname":"/data-encryption/gmail/creating-policies-for-encryption/encryption-policy-faqs","siteSpaceId":"sitesp_GW1YE","breadcrumbs":[{"label":"Data Encryption"},{"label":"Gmail"},{"label":"Creating Policies for Encryption"}]},{"id":"ISLYFPyKxo2N1KZdvGoT","title":"Nightfall Encryption - Sender Experience","pathname":"/data-encryption/gmail/nightfall-encryption-sender-experience","siteSpaceId":"sitesp_GW1YE","breadcrumbs":[{"label":"Data Encryption"},{"label":"Gmail"}]},{"id":"zZYpskyLx4LJHd1hFjNb","title":"Nightfall Encryption - Recipient Experience","pathname":"/data-encryption/gmail/nightfall-encryption-recipient-experience","siteSpaceId":"sitesp_GW1YE","breadcrumbs":[{"label":"Data Encryption"},{"label":"Gmail"}]},{"id":"RsOiVN3PTvj9NmdAKKyy","title":"Encryption Events Page","pathname":"/data-encryption/gmail/encryption-events-page","siteSpaceId":"sitesp_GW1YE","breadcrumbs":[{"label":"Data Encryption"},{"label":"Gmail"}]},{"id":"8xGZMTXTbWEzzTZN2sMZ","title":"Welcome to Developer APIs Documentation","pathname":"/developer-api","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"}]},{"id":"jupbs97fTtDAJUXsLWv9","title":"Overview","pathname":"/developer-api/introduction/overview","siteSpaceId":"sitesp_HDcK9","description":"","breadcrumbs":[{"label":"Developer APIs"},{"label":"Introduction to Developer APIs"}]},{"id":"lMnRMZxxAZgNsD4hrxUY","title":"Quickstart","pathname":"/developer-api/introduction/quickstart","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Introduction to Developer APIs"}]},{"id":"WmDwRxDkiszdYwdsxFgC","title":"Authentication and Security","pathname":"/developer-api/introduction/authentication_security","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Introduction to Developer APIs"}]},{"id":"NqaKDUZiMbiPlld9lHjJ","title":"Entities and Terms to Know","pathname":"/developer-api/key-concepts/key_terms","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"}]},{"id":"q8dJcFljQMGV6GT1Dsnu","title":"Setting Up Nightfall","pathname":"/developer-api/key-concepts/setup","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"}]},{"id":"eAEsj25XIWNY3x8XXpbJ","title":"Creating API Key","pathname":"/developer-api/key-concepts/setup/api_key","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Setting Up Nightfall"}]},{"id":"jIFsiP2VvG5FsF6uf6fP","title":"Creating Policies","pathname":"/developer-api/key-concepts/setup/policies","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Setting Up Nightfall"}]},{"id":"oxZs1EHMq9XIzytTX9ho","title":"Alerting","pathname":"/developer-api/key-concepts/alerting","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"}]},{"id":"rbgBOdV8nAhw8YV46O8s","title":"Scanning Text","pathname":"/developer-api/key-concepts/text_scan","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"}]},{"id":"CqnClI0VxgJjLbEMujP1","title":"Scanning Files","pathname":"/developer-api/key-concepts/file_scan","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"}]},{"id":"CkjTRzwcBH10YBm37qwu","title":"Supported File Types","pathname":"/developer-api/key-concepts/file_scan/supported_file_types","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Files"}]},{"id":"Ki2SEtvBTf0Qj74ZVR2m","title":"File Scanning and Webhooks","pathname":"/developer-api/key-concepts/file_scan/webhooks","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Files"}]},{"id":"19aiKzsV6XvzPhdDjip4","title":"Uploading and Scanning API Calls","pathname":"/developer-api/key-concepts/file_scan/scan_api_calls","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Files"}]},{"id":"1I47QMCd0tbbQ3JhW406","title":"Special File Types","pathname":"/developer-api/key-concepts/file_scan/special_file_types","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Files"}]},{"id":"XHqp1D41WLOyWQresKnU","title":"Specialized File Detectors","pathname":"/developer-api/key-concepts/file_scan/special_file_detectors","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Files"}]},{"id":"uMIam6ihnMi4m5cSX4Em","title":"Webhooks and Asynchronous Notifications","pathname":"/developer-api/key-concepts/file_scan/webhooks_async_notifications","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Files"}]},{"id":"WgenNBTRYvDwljZGN3Ep","title":"Accessing Your Webhook Signing Key","pathname":"/developer-api/key-concepts/file_scan/webhooks_async_notifications/webhook_signing_key","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Files"},{"label":"Webhooks and Asynchronous Notifications"}]},{"id":"D4zRonqoWH4khR8IghVe","title":"Creating a Webhook Server","pathname":"/developer-api/key-concepts/file_scan/webhooks_async_notifications/webhook_server","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Files"},{"label":"Webhooks and Asynchronous Notifications"}]},{"id":"LZAMsisKLMHwiK9ZRKxF","title":"Scanning Features","pathname":"/developer-api/key-concepts/scanning_features","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"}]},{"id":"DeZz5BiYsK8dMA5bBKwm","title":"Using Pre-Configured Detection Rules","pathname":"/developer-api/key-concepts/scanning_features/pre_configured_detection_rules","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Features"}]},{"id":"TCp1Th3XwDHTUWHtlPIO","title":"Scanning Images for patterns using Custom Regex Detectors","pathname":"/developer-api/key-concepts/scanning_features/pre_configured_detection_rules/scanning-images-for-patterns-using-custom-regex-detectors","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Features"},{"label":"Using Pre-Configured Detection Rules"}]},{"id":"003N7E2QCaWcB003vMW4","title":"Creating an Inline Detection Rule","pathname":"/developer-api/key-concepts/scanning_features/inline_detection_rules","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Features"}]},{"id":"VVjSo7TdyzjumSuisxIz","title":"Using Exclusion Rules","pathname":"/developer-api/key-concepts/scanning_features/exclusion_rules","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Features"}]},{"id":"jevGX3pLbMWjhotUdmqa","title":"Using Context Rules","pathname":"/developer-api/key-concepts/scanning_features/context_rules","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Features"}]},{"id":"eQjXzOstpD8tSBbxzmoX","title":"Using Redaction","pathname":"/developer-api/key-concepts/scanning_features/redaction","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Features"}]},{"id":"pkYkUeRtWGz04kSedRei","title":"Using Policies to Send Alerts","pathname":"/developer-api/key-concepts/scanning_features/send_alerts_using_policies","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Features"}]},{"id":"0ftGKIe0mgprRIbw5VHy","title":"Detecting Secrets","pathname":"/developer-api/key-concepts/scanning_features/secrets_detection","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Features"}]},{"id":"k2QSjfYqJk5Ba4p2t3sM","title":"PHI Detection Rules","pathname":"/developer-api/key-concepts/scanning_features/phi_detection_rules","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"},{"label":"Scanning Features"}]},{"id":"JHp91pWVNrOGFAmeYkgg","title":"Test Datasets","pathname":"/developer-api/key-concepts/test_datasets","siteSpaceId":"sitesp_HDcK9","description":"","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"}]},{"id":"U8zGC9go8Cacv1nIWCDH","title":"Errors","pathname":"/developer-api/key-concepts/errors","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"}]},{"id":"umH2REfPu8a5aqY0LQo6","title":"Nightfall Playground","pathname":"/developer-api/key-concepts/nightfall_playground","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Key Concepts"}]},{"id":"HEBl3k1le4PPSymZIprg","title":"DLP APIs - Firewall for AI Platform","pathname":"/developer-api/nightfall_apis/dlp","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall APIs"}]},{"id":"NqobYhnaCoXPqkJjqO0p","title":"Rate Limits for Firewall APIs","pathname":"/developer-api/nightfall_apis/dlp/rate_limits","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall APIs"},{"label":"DLP APIs - Firewall for AI Platform"}]},{"id":"qeW7TGmpdn4dcGRu4BXa","title":"DLP APIs - Native SaaS Apps","pathname":"/developer-api/nightfall_apis/saas","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall APIs"}]},{"id":"GZZtq2dZqtW5vizj458X","title":"Rate Limits for Native SaaS app APIs","pathname":"/developer-api/nightfall_apis/saas/rate-limits-for-native-saas-app-apis","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall APIs"},{"label":"DLP APIs - Native SaaS Apps"}]},{"id":"3dLnwzxEYy07rmnu6e6Y","title":"Policy Update APIs","pathname":"/developer-api/nightfall_apis/scope_update","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall APIs"}]},{"id":"9kcePuGOpAaHSjaZzIJV","title":"Exfiltration Prevention APIs","pathname":"/developer-api/nightfall_apis/exfiltration-prevention-apis","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall APIs"}]},{"id":"xQG4aDQsDjcme2ANItkM","title":"Posture Management APIs","pathname":"/developer-api/nightfall_apis/posture-management-apis","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall APIs"}]},{"id":"ypr2CLIYi7oeF73wr5wz","title":"SaaS App and Device Management APIs","pathname":"/developer-api/nightfall_apis/saas-app-and-device-management-apis","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall APIs"}]},{"id":"xdUxRE097vEOuCUMeJds","title":"Nightfall Model Context Protocol (MCP) Server","pathname":"/developer-api/nightfall_apis/nightfall-model-context-protocol-mcp-server","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall APIs"}]},{"id":"fbvcl5k27Q8Xh9GvjXDd","title":"Getting Started","pathname":"/developer-api/nightfall_apis/nightfall-model-context-protocol-mcp-server/getting-started","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall APIs"},{"label":"Nightfall Model Context Protocol (MCP) Server"}]},{"id":"TlLEDnMTSona1Jl1nr95","title":"Available Tools","pathname":"/developer-api/nightfall_apis/nightfall-model-context-protocol-mcp-server/available-tools","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall APIs"},{"label":"Nightfall Model Context Protocol (MCP) Server"}]},{"id":"AKGFlBzrJWybyqgtS4iq","title":"Common Use Cases","pathname":"/developer-api/nightfall_apis/nightfall-model-context-protocol-mcp-server/common-use-cases","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall APIs"},{"label":"Nightfall Model Context Protocol (MCP) Server"}]},{"id":"4JTtg8xy1nxWfI6kRQN6","title":"Query Examples","pathname":"/developer-api/nightfall_apis/nightfall-model-context-protocol-mcp-server/query-examples","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall APIs"},{"label":"Nightfall Model Context Protocol (MCP) Server"}]},{"id":"GpWUUOTxq8n88OBzr4Pr","title":"Best Practices - Security Investigation Workflows","pathname":"/developer-api/nightfall_apis/nightfall-model-context-protocol-mcp-server/best-practices-security-investigation-workflows","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall APIs"},{"label":"Nightfall Model Context Protocol (MCP) Server"}]},{"id":"w5mHWX2VIkXtoG5ttz2t","title":"Troubleshooting","pathname":"/developer-api/nightfall_apis/nightfall-model-context-protocol-mcp-server/troubleshooting","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall APIs"},{"label":"Nightfall Model Context Protocol (MCP) Server"}]},{"id":"zB7QWwMltuSfRlxa2xxl","title":"Support & Resources","pathname":"/developer-api/nightfall_apis/nightfall-model-context-protocol-mcp-server/support-and-resources","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall APIs"},{"label":"Nightfall Model Context Protocol (MCP) Server"}]},{"id":"l00Y7q6q1B4ttscoZ8km","title":"Overview","pathname":"/developer-api/nightfall_sdk/overview","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall Software Development Kit (SDK)"}]},{"id":"tejo2wkwxtQgv3V2tLJH","title":"Overview","pathname":"/developer-api/language_specific_guides/overview","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Language Specific Guides"}]},{"id":"hEpKNCkSaOmUGI23v9X2","title":"Python","pathname":"/developer-api/language_specific_guides/python","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Language Specific Guides"}]},{"id":"hWGIZ3l3Q96uJ40c9TQr","title":"Ruby","pathname":"/developer-api/language_specific_guides/ruby","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Language Specific Guides"}]},{"id":"thYlbmNHwH8ZNE4MaocL","title":"Java","pathname":"/developer-api/language_specific_guides/java","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Language Specific Guides"}]},{"id":"XSEh0u9WEcoCV8BYFruW","title":"Overview","pathname":"/developer-api/nightfall-use-cases/overview","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall Use Cases"}]},{"id":"OTM5PSzSqM9QYsPyn0Lr","title":"Building Endpoint DLP to Detect PII on Your Machine in Real-Time","pathname":"/developer-api/nightfall-use-cases/endpoint_dlp","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall Use Cases"}]},{"id":"ZRet066MJ6KAa4kYV5Yz","title":"Deploy a File Scanner for Sensitive Data in 40 Lines of Code","pathname":"/developer-api/nightfall-use-cases/file_scanner","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall Use Cases"}]},{"id":"Dfy3Q8CLJBcircn524o5","title":"Using Scan API (with Python)","pathname":"/developer-api/nightfall-use-cases/scan_api","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"Nightfall Use Cases"}]},{"id":"-MjVvHzOzDjXWm1hrdqM","title":"FAQs","pathname":"/developer-api/faqs","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"}]},{"id":"RMmYYdVFhFhaLiytKXCA","title":"What Can I do with the Firewall for AI","pathname":"/developer-api/faqs/uses","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"FAQs"}]},{"id":"w34940thpM6lY2g282v6","title":"How quickly can I get started with Firewall for AI?","pathname":"/developer-api/faqs/get_started","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"FAQs"}]},{"id":"1pLRCnaE1vFbBKpFlOgk","title":"What types of data can I scan with API?","pathname":"/developer-api/faqs/data_scan","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"FAQs"}]},{"id":"nFD6EAbefG9fDBYvCd5C","title":"What types of detectors are supported out of the box?","pathname":"/developer-api/faqs/detector_types","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"FAQs"}]},{"id":"Q2DdNpif9hU60eF6nKJx","title":"Can I customize or bring my own detectors?","pathname":"/developer-api/faqs/customize_detectors","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"FAQs"}]},{"id":"5x83vqjZqgeGHOQAuUCY","title":"What is the pricing model?","pathname":"/developer-api/faqs/pricing_model","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"FAQs"}]},{"id":"bC8uGIAq2byLCK9a6aQa","title":"How do I know my data is secure?","pathname":"/developer-api/faqs/secure_data_confirmation","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"FAQs"}]},{"id":"TBhRlD3EeJkhjvaXCMqo","title":"How do I get in touch with you?","pathname":"/developer-api/faqs/contact_nightfall","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"FAQs"}]},{"id":"8bhj6TsVZ4sdva9F0VMZ","title":"Can I test out the detection and my own detection rules before writing any code?","pathname":"/developer-api/faqs/playground","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"FAQs"}]},{"id":"CPz5Z281aw14MROUFSK8","title":"How does Nightfall support custom data types?","pathname":"/developer-api/faqs/custom_data_types","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"FAQs"}]},{"id":"zUERJpIZPCfBNdxyUDjQ","title":"How does Nightfall's Firewall for AI differs from other solutions?","pathname":"/developer-api/faqs/unique_features","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"},{"label":"FAQs"}]},{"id":"-MjNDgFqae0oedV2yXhQ","title":"Contact Us","pathname":"/developer-api/contact_nightfall_team","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"}]},{"id":"f9bea0073428c0f64212dd4ed4ba510cf2abe14c","title":"Nightfall MCP Documentation","pathname":"/developer-api/nightfall-mcp-documentation","siteSpaceId":"sitesp_HDcK9","breadcrumbs":[{"label":"Developer APIs"}]},{"id":"dCu6qh0K57T9Z6BCIksS","title":"Data Discovery and Classification","pathname":"/audit","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"}]},{"id":"H2dYBufVE04M5Zav3eMZ","title":"Introduction to Nightfall Audit","pathname":"/audit/nightfall-audits/introduction-to-nightfall-audit","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"Nightfall Audits"}]},{"id":"2N25GZdJqXjqQfTg7tfu","title":"Overview","pathname":"/audit/google-drive-audit/overview","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"Google Drive Audit"}]},{"id":"SSFkLOOHRujhoF4h09cv","title":"Select Integration","pathname":"/audit/google-drive-audit/select-integration","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"Google Drive Audit"}]},{"id":"BCnEDybpxbcBL6ZMlrFB","title":"Select Scope","pathname":"/audit/google-drive-audit/select-scope","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"Google Drive Audit"}]},{"id":"4YMbKbkXFUrhQL5sDGEY","title":"Detection Rules","pathname":"/audit/google-drive-audit/detection-rules","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"Google Drive Audit"}]},{"id":"QxRsOnjuYzr5vqdyliH1","title":"Automated Actions","pathname":"/audit/google-drive-audit/automated-actions","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"Google Drive Audit"}]},{"id":"regZWbsSeDHpVV94rysE","title":"Review Configurations","pathname":"/audit/google-drive-audit/review-configurations","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"Google Drive Audit"}]},{"id":"83qlQbqPTvBc949frwY8","title":"Analyzing Google Drive Audit Results","pathname":"/audit/google-drive-audit/analyzing-google-drive-audit-results","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"Google Drive Audit"}]},{"id":"dYoOiqjUoDeYWCF5p808","title":"Overview","pathname":"/audit/github-audit/overview","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"GitHub Audit"}]},{"id":"oUJET2MgCOlmOSnGAPew","title":"Select Integration","pathname":"/audit/github-audit/select-integration","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"GitHub Audit"}]},{"id":"4Gz3dDGBwkUZodOOMcrj","title":"Configure Scope","pathname":"/audit/github-audit/configure-scope","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"GitHub Audit"}]},{"id":"G5ciswz05KVKvy5RLdzT","title":"Select Detection Rules","pathname":"/audit/github-audit/select-detection-rules","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"GitHub Audit"}]},{"id":"kNFPJUSVu8ag6I9ooKOI","title":"Review Configurations","pathname":"/audit/github-audit/review-configurations","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"GitHub Audit"}]},{"id":"oPqCPvxWOvrFE2EWBMeR","title":"Overview","pathname":"/audit/salesforce-audit/overview","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"Salesforce Audit"}]},{"id":"snHC2k2PNwppkzYffrfM","title":"Salesforce Integration","pathname":"/audit/salesforce-audit/salesforce-integration","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"Salesforce Audit"}]},{"id":"Wfg9kIinQOS2OTpMlZ6c","title":"Configure Scope","pathname":"/audit/salesforce-audit/configure-scope","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"Salesforce Audit"}]},{"id":"GlAqV3Qlj4mc9w8qn7Dh","title":"Detection Rules","pathname":"/audit/salesforce-audit/detection-rules","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"Salesforce Audit"}]},{"id":"ernnFy8wjnkkiwRhoKdk","title":"Automated Actions","pathname":"/audit/salesforce-audit/automated-actions","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"Salesforce Audit"}]},{"id":"0S608B8RsvH3E3e2lXRr","title":"Review Configurations","pathname":"/audit/salesforce-audit/review-configurations","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"Salesforce Audit"}]},{"id":"6PtGojG3iW3drqiZElLz","title":"Analyzing Salesforce Audit Results","pathname":"/audit/salesforce-audit/analyzing-salesforce-audit-results","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"Salesforce Audit"}]},{"id":"7MCyfd5DS5ZprnBXoPwm","title":"Overview","pathname":"/audit/onedrive-audit/overview","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"OneDrive Audit"}]},{"id":"zaCrxoUrgwIcDwutJ5uE","title":"OneDrive Integration","pathname":"/audit/onedrive-audit/onedrive-integration","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"OneDrive Audit"}]},{"id":"epp4eAWDaczLJZey111V","title":"Configure Scope","pathname":"/audit/onedrive-audit/configure-scope","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"OneDrive Audit"}]},{"id":"MufGQovFgfmt4BaTalV1","title":"Detection Rules","pathname":"/audit/onedrive-audit/detection-rules","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"OneDrive Audit"}]},{"id":"OBzneFqhtYgVvCAW64pD","title":"Automated Actions","pathname":"/audit/onedrive-audit/automated-actions","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"OneDrive Audit"}]},{"id":"nv6ncHEmSKWgIdTBki1Z","title":"Review Configurations","pathname":"/audit/onedrive-audit/review-configurations","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"OneDrive Audit"}]},{"id":"Y7KvN4wSh4O6B31p2RFH","title":"Analyzing OneDrive Audit Results","pathname":"/audit/onedrive-audit/analyzing-onedrive-audit-results","siteSpaceId":"sitesp_Qvbo7","breadcrumbs":[{"label":"Data Classification and Discovery"},{"label":"OneDrive Audit"}]},{"id":"qcpOA7qkqzDtIn9LbVzH","title":"Nightfall FAQs","pathname":"/frequently-asked-questions-faqs","siteSpaceId":"sitesp_B2fKv","breadcrumbs":[{"label":"Frequently Asked Questions (FAQs)"}]},{"id":"feayhPcs6SecnDRq492J","title":"End User FAQs","pathname":"/frequently-asked-questions-faqs/security-faqs/end-user-faqs","siteSpaceId":"sitesp_B2fKv","breadcrumbs":[{"label":"Frequently Asked Questions (FAQs)"},{"label":"Nightfall Security FAQs"}]},{"id":"9MscEndrnJOPBCrL5b75","title":"Email Encryption - Sender FAQs","pathname":"/frequently-asked-questions-faqs/sender-faqs/email-encryption-sender-faqs","siteSpaceId":"sitesp_B2fKv","breadcrumbs":[{"label":"Frequently Asked Questions (FAQs)"},{"label":"Sender FAQs"}]},{"id":"mMb3qK7UxbbVS3ixCJCN","title":"Email Encryption - Receiver FAQs","pathname":"/frequently-asked-questions-faqs/email-encryption-receiver-faqs","siteSpaceId":"sitesp_B2fKv","breadcrumbs":[{"label":"Frequently Asked Questions (FAQs)"}]}]}