Guides
ProductDeveloperPartnerPersonal

Hide Identities with De-identification

Some regions or organizations require restrictions to hide the identity of users making internet requests. To comply with these restrictions, you can hide identity names when generating a report, by enabling de-identification for a user. When enabled, a hash unique to that identity replaces the identity name.

1156

👍

You cannot enable or disable de-identification on your own account. At least two administrators are required to use this feature in the dashboard and any administrator can turn it on or off for another account. This is as-designed to prevent circumvention.

Table of Contents

Prerequisites

Identity Types

The following identity types are de-identified:

  • AD usernames
  • computer/hostnames
  • internal IP addresses
  • Chromebook identities
  • mobile identities
  • GSuite users and groups
  • SAML-obtained users and groups
  • internal IP addresses

Enable De-Identification

  1. Navigate to Admin > Accounts and click an account name.
    Note: You cannot enable de-identification for your own account.
1203
  1. Under De-identification click Change.
668
  1. Click Confirm.
868

De-identification is enabled and identity names are replaced with a hash.

Disable De-Identification

  1. Navigate to Admin > Accounts and click an account name.
    Note: You cannot enable de-identification for your own account.
1203
  1. Under De-identification click Change.
628
  1. Click Confirm.
864

De-identification is disabled and the account can view identity names.

Limitations

Because the purpose of de-identification is to remove the visibility of the identity names for the user, de-identification includes the following are limitations:

  • Scheduling and exporting reports is not available.
  • The Application Discovery report is not available.
  • You cannot search by an active directory username, roaming computer name, or internal IP name.
    However, you can click the hash name to view the identity's details or the Top Identities report.
  • There is no access to API key management and creation.
  • There is no access to S3 Log Management (both self-managed and Cisco-managed).

Change Account Settings< Hide Identities with De-identification > Manage User Roles