Security and compliance
Ensure data security and compliance with data masking, monitoring, and change traceability
In this video we run the mask command, the process that actually does the data masking.
The mask command requires a masking file. This is produced by firstly classifying the database with the classify command then running the map command against the classification file produced by the classify command.
Connection Strings Examples: https://documentation.red-gate.com/testdatamanager/command-line-interface-cli/anonymization/anonymization-setup-and-installation#Anonymizationsetupandinstallation-Databaseconnectionstringformats