After you have connected to both Source and Destination servers, click on the “Analyze” button in the upper right corner.
The system will go against current database metadata and data and apply search patterns. The orange bar below will display the current progress of the discovery process.
Once analysis is completed, the tool displays the database schema information and identifies which one is pertaining to the sensitive data. The metadata display format is <schema>.<table>.<field>. Below you can see a list of schemas in our sample database AdventureWorksDB. Clicking on the schema arrow will expand it, and you will see multiple tables with sensitive data and suggested algorithms.
If you open any table after the analysis process, you will see that the tool determined the type of data and selected the closest algorithm based on metadata names and values for data masking. The search for data types is based on HIPAA’s Safe Harbor. However, it does not accommodate Expert Determination, as it is limitless. We provide you with the capability to choose algorithms manually.
Discovery
Copyright © 2025 Hush-Hush. All rights reserved
Copyright © 2025 Hush-Hush.
All rights reserved