Your suggested change has been received. Thank you.


Suggest A Change….



DDC Administration


Please Note:

DDC Administration

This document is intended for CipherTrust Data Discovery and Classification (DDC) administrators responsible for configuring Data Stores and running Scans and Reports.

All products manufactured and distributed by Thales Group are designed to be installed, operated, and maintained by personnel who have the knowledge, training, and qualifications required to safely perform the tasks assigned to them. The information, processes, and procedures contained in this document are intended for use by trained and qualified personnel only.

It is assumed that the users of this document are proficient with data security concepts.


Thales CipherTrust Data Discovery and Classification is powered by Groundlabs.

What's in This Document

This guide explains data discovery concepts such as Branch Locations, Classification Profiles, Data Stores and Scans. The document also explains how to generate scan-based reports on the discovered data. Finally, the document describes how to read generated Reports.

  • It is assumed, for this document, that you have already configured the CipherTrust Manager appliance. Refer to the CipherTrust Manager product documentation for instructions.

  • The next step is to activate and install the DDC license. Refer to Licensing for details.

  • After the license is installed, you can configure DDC Agents. Refer to the Data Discovery and Classification Deployment Guide specific to your platform for details. Installation of the CTE Agents is required for protecting directories and files stored on clients.


This document contains the following sections:

  • Solution Architecture: Provides a high-level overview of the DDC solution.

  • Interfaces: Provides an overview of the CipherTrust Manager interfaces—Command Line Interface (CLI) and Graphical User Interface (GUI).

  • Concepts: Describes DDC concepts such as Information Types, Classification Profile, Data Stores, Scans and Reports.

  • Licensing: Provides an overview of the DDC licensing.

  • User Groups: Describes all predefined groups of DDC users with their rights to use various product features.

  • Managing Branch Locations: Describes how to add a Branch Location.

  • Managing Information Types: Describes how to view, customize and edit a Information Type (infotype).

  • Managing Classification Profiles: Describes how to view, add and edit a Classification Profile.

  • Managing Data Stores:Describes how to view, add and edit a Data Store.

  • Managing Scans: Describes how to view and add a Scan.

  • Managing Reports: Describes how to view and add a Report.

  • Managing Agents: How to view the agent list.

  • Logging: Describes most common log messages from DDC.

  • Operations: Describes the operations that the DDC Administrator performs on the CipherTrust Manager. In some situations, you must reconfigure DDC Agents with a new hostname, IP address, Agent Memory, CPU, or throughput.

  • Troubleshooting: Describes how to handle the issues that you might face when using DDC with the CipherTrust Manager.

  • Appendix: Additional useful information and tools related to system administration, such as system error messages, handy commands.