Compares
the enabled data patterns and active policy rules against the information
about all users associated with your assets.
Gathers metadata for the assets (folder, repository, and table
names and information about the files, such as the owner and collaborators)
and the actual contents of the files.
Adds new incidents after it scans the assets.