5.1

Table Of Contents
Table 15-1. Information displayed in the Reports tab (Continued)
Section Information Displayed
Violation
Information
Top regulations that have been violated and the virtual machines on which the most violations
have been reported.
Scan History Start and end time of each scan, the number of virtual machines scanned, and the number of
violations detected. You can click Download Complete Report in the Action column to download
the complete report for any scan.
Creating Regular Expressions
A regular expression is a pattern that describes a certain sequence of text characters, otherwise known as
strings. You use regular expressions to search for, or match, specific strings or classes of strings in a body of
text.
Using a regular expression is like performing a wildcard search, but regular expressions are far more powerful.
Regular expressions can be very simple, or very complex. An example of a simple regular expression is cat.
This finds the first instance of the letter sequence cat in any body of text that you apply it to. If you want to
make sure it only finds the word cat, and not other strings like cats or hepcat, you could use this slightly more
complex one: \bcat\b.
This expression includes special characters that make sure a match occurs only if there are word breaks on
both sides of the cat sequence. As another example, to perform a near equivalent to the typical wildcard search
string c+t, you could use this regular expression: \bc\w+t\b.
This means find a word boundary (\b) followed by a c, followed by one or more non-whitespace, non-
punctuation characters (\w+), followed by a t, followed by a word boundary (\b). This expression finds cot,
cat, croat, but not crate.
Expressions can get very complex. The following expression finds any valid email address.
\b[A-Za-z0-9._%-]+@[A-Za-z0-9.-]+\.[A-Za-z]{2,4}\b
For more information on creating regular expressions, see http://userguide.icu-project.org/strings/regexp.
Available Regulations
Below are descriptions of each of the regulations available within vShield Data Security.
Arizona SB-1338
Arizona SB-1338 is a state data privacy law which protects personally identifiable information. Arizona SB-1338
was signed into law April 26, 2006 and became effective December 31, 2006. The law applies to any person or
entity that conducts business in Arizona and owns or licenses unencrypted computerized data that includes
personally identifiable information.
The policy looks for at least one match to personally identifiable information, which may include:
n
Credit Card Number
n
Credit Card Track Data
n
US Drivers License Number
n
US Social Security Number
vShield Administration Guide
182 VMware, Inc.