# Buckets

## Bucket Protection Table

The Bucket Protection table is a complete list of the current status of all buckets across all regions within the AWS account the console is running in as well as active linked accounts.

We've seen configuration for this page covered in the [Initial Configuration](https://help.cloudstoragesec.com/getting-started/initial-config#step-2-enable-bucket-scanning) section, but we'll get into more details here

<div data-full-width="false"><figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FGYPYVF69NtIZWVLqQSPA%2FScreenshot_1.png?alt=media&#x26;token=03a0c02e-3646-47a1-88fa-2c97c8042a62" alt=""><figcaption></figcaption></figure></div>

{% hint style="info" %}
Notice the `Account` identifier shows as `Primary`. This represents the default account you deployed the solution in. If you [link accounts](https://help.cloudstoragesec.com/console-overview/access-management/linked-accounts) for cross-account scanning, you will see a different identifier (the nickname you gave it) for those buckets that come from other accounts.

The bucket list is refreshed every 30 minutes in the background, but if you have recently created new buckets or deleted existing, you can force a refresh with the `Actions --> Refresh Buckets` menu item at the top of the buckets list.

You may have noticed the **Object Count** and **Total Size (GB)** values for each bucket. These are not real-time reliable numbers. This data is pulled from CloudWatch Metrics for S3 Buckets. Amazon only updates these metrics once per day at the end of each day. So the numbers you are seeing are always a day old, but can give you a good feel.
{% endhint %}

### Bucket Attributes

We check certain attributes related to buckets to give you information pertinent to setting up protection. As a result, you may notice icons next to the bucket names. The two main aspects we check now are public status and the encryption status. We want you to be informed on which buckets are public and how they are public. We also want to stop you from scanning whole buckets of encrypted objects when we don't have permissions to the key to decrypt those objects. Giving the AgentRole [permissions to the key](https://help.cloudstoragesec.com/trouble-shooting/objects-show-unscannable-with-access-denied) will solve this issue.

* ![possibly public lock](https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FNOdekDu8LItLyNhCmzGi%2Fpublic-bucket-yellowlock.png?alt=media) when bucket is capable of being `public`, but not actually `public`.
  * Some of the `Block Public Access` checks are turned off, but there isn't an ACL or a Bucket Policy set to make the bucket public.
* ![truly public lock](https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2F2ItKaUuhkhbr38bVShnU%2Fpublic-bucket-redlock.png?alt=media) when bucket is truly `public` via ACL or Bucket Policy.
  * Some of the `Block Public Access` checks are turned off and there is an ACL or a Bucket Policy set to make the bucket public.
  * The tooltip will give you details on the ACL settings.
* ![kms encryption no permissions](https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FunNV2PLolLekE9P9MLbH%2Fencryption-redkey.png?alt=media) when KMS encryption enabled on the bucket and the AgentRole **does not** have permission to the key.
  * Follow the [trouble shooting](https://help.cloudstoragesec.com/trouble-shooting/objects-show-unscannable-with-access-denied) for how to enable the AgentRole with the key.

{% hint style="info" %}
You will not be able to turn on protection for a bucket or perform a `Scan Existing` if the AgentRole does not have permission to the key
{% endhint %}

* ![kms encryption with permissions](https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FuWehu8OUbQE1RarKc4DZ%2Fencryption-greenkey.png?alt=media) when KMS encryption enabled on the bucket and the AgentRole **does** have permissions to the key.

## Scan new objects uploaded to a bucket

You can enable buckets one at a time by selecting one checkbox or you can multi-select checkboxes or you can "select all" with the `Select Visible` button at the top of the page to create any kind of bucket set for enabling protection. For any buckets in new regions where you aren't currently scanning, you will be asked to configure the VPC and Subnet(s) as we saw in the [Initial Configuration](https://help.cloudstoragesec.com/getting-started/initial-config#enabling-buckets-in-other-regions). And if you select multiple new regions during the same action, you will be prompted to configure each one. Look to the steps below where two buckets are selected from two different regions (`eu-central-1` and `eu-north-1`) not currently enabled.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2F7CV49WDNqdPbwtanyZNb%2F2.png?alt=media&#x26;token=ee52fc5e-57a7-41cc-8b6c-a9a2f2f4715b" alt=""><figcaption></figcaption></figure>

{% hint style="info" %}
`Select Visible` means all rows available from the filtered search. If no search criteria has been entered, then all buckets in your list will be selected. If you have filtered the list down with a search, then only those search results will be selected.

This is a great way to find the set of buckets you want to take a batch action against and trigger the action.

You can chain sets together by filtering to select a few buckets, filter with different criteria and select a few buckets. Both selected sets will remain selected. This allows you to take the same action against different filtered sets.
{% endhint %}

Selecting `Turn On Selected` from the `Actions` drop down button yields the following popup where you must configure a VPC and Subnet(s) for any regions that are not already setup.

<div data-full-width="true"><figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FgZh8arfGhXSUyHchPC6L%2FEu-central-1%20eu-north-1.png?alt=media&#x26;token=34798998-927b-4b38-b5f9-048030904e34" alt=""><figcaption></figcaption></figure></div>

{% hint style="warning" %}
The VPC and Subnets you choose must have an outbound path to reach Amazon ECR. If not, the agents will [never boot properly](https://help.cloudstoragesec.com/trouble-shooting/my-scanning-agents-keep-starting-up-and-immediately-shutting-down). As discussed in the troubleshooting topic, you can do with outbound access to the internet or through VPC Endpoints that give you access to ECR and API.

We now show `Public` / `Private` next to each VPC to indicate whether or not the VPC is tied to an Internet Gateway and therefor likely to have an outbound path. We also show `Public` / `Restricted` next to each Subnet to indicate whether each Subnet appears to have outbound routing.
{% endhint %}

### **Automating Bucket Protection**

In addition to selecting buckets in a one or many fashion as described above, you can automate the protection of buckets by leveraging `tag triggered protection`. By specifying [a particular tag on the bucket](https://help.cloudstoragesec.com/configuration/console-settings#automatic-bucket-protection) we will automatically turn event-based protection on for that bucket(s).

We do this in the every 30 minute refresh cycle where we refresh the bucket catalog for bucket characteristics, new or removed buckets and now for the protection of those buckets.

For more information check out the [Console Settings page](https://help.cloudstoragesec.com/configuration/console-settings#automatic-bucket-protection) to define the tag we look for.

## Scan Pre-existing Objects

Any time you enable a bucket for scanning, you will be asked if you would like to scan all the existing objects in that bucket as well. You can also trigger a `scan existing objects` any time from the `Actions` drop down button at the top of the bucket list as well. In the scenario above, you turned on two buckets and were first prompted to select network settings. Once that is complete you will be presented the `Scan Existing Objects` popup. If you'd prefer not to scan existing objects at this time you can simply click `Don't Scan` and this popup will be closed. If you do prefer to scan your existing objects as well, you select some or all of the buckets you had enabled for event-based scanning and then click the `Scan Selected` button. You must select the disclaimer checkbox as well before the button will be enabled.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FXsmQW0cHVQX2e8mMuvUm%2FScan%20Existing%20Files.png?alt=media&#x26;token=4fc6f510-e1c2-469b-9505-2eadee71595f" alt=""><figcaption></figcaption></figure>

Buckets being turned on for event-based scanning is **not** a pre-requisite for scanning existing objects. Whether the bucket is turned on or off and whether it has a conflict or not, a `scan existing` can be triggered on it. More than one `scan existing` can be triggered on a bucket if so desired (picture two or more distinct, non-contiguous date ranges needed). Triggering a `scan existing` for a bucket or buckets is simple on this page. Select one or many buckets using the `Select All` button or the checkboxes and then select `Scan Existing Objects` from the `Actions` button. This will pull up the same popup as seen above.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2F8yKsDIQF1DLuUU0vNYgQ%2F3.png?alt=media&#x26;token=a117c5a3-30d0-4f82-b348-18adb265ab9c" alt=""><figcaption></figcaption></figure>

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FGfBRRJWgarsuYqvaebVj%2FScan%20Existing%20Files-2.png?alt=media&#x26;token=8641c3ad-131c-4fbf-8cc2-2441c4ab26e5" alt=""><figcaption></figcaption></figure>

For a time window, the default is beginning of time through current time. The intends to scan all objects within the bucket. The date picker allows you to select from one of the present values as well as create a completely custom range. `Custom Range` allows you to select down to specific hours and minutes of the day if needed.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FRalrWmfnDvDPApFvlc1b%2FCustom%20Range.png?alt=media&#x26;token=342a4a9b-40ac-4e89-8c5e-5f41e6c83a12" alt=""><figcaption></figcaption></figure>

You can add specific prefixes to crawl, limiting the scan to only those paths inside the S3 bucket. When you run the 'Scan Pre-Existing Objects' option for the bucket, you can also choose 'Only Scan Objects that Have Not Already Been Scanned' to avoid rescanning files that were already processed:

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2F2q6xTbb3qaVwkCRvSmu7%2Fonly%20scan%20objects%20that%20have%20not.png?alt=media&#x26;token=c0a78785-cd46-4c60-9f6e-5f824849e06d" alt=""><figcaption></figcaption></figure>

{% hint style="info" %}
The instructions for this popup are collapsed by default. Expand for detailed steps.

A Fargate `run task` (temporary tasks) is spun up for each bucket to crawl the objects and place matching files into a temporary SQS Queue. Each run task will shut down as crawling is completed. A new set of `run tasks` will be spun up to to process the queue entries. We will automatically attempt to spin up the number of `run tasks` required to process the queue in \~1 hour.

On-demand and Scheduled scan-existing scans are considered Jobs and can be tracked on the [Monitoring → Jobs](https://help.cloudstoragesec.com/console-overview/monitoring/jobs) page.
{% endhint %}

To learn more retro scanning of your existing objects. More details can be found [here](https://help.cloudstoragesec.com/how-it-works/object-scanning#retro-scanning).

### Scheduled Scanning

In addition to the on-demand scanning that [Scan Existing](#scan-existing-objects) offers, you can create schedules to scan your buckets as well. You simply need to select the buckets you would like to scan and then define the scan frequency as desired.

Select the buckets and then from the action menu click on `Create Schedule`

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FTV7Dhvirsrc7QeeBVV0K%2FCreate%20AV%20Schedule.png?alt=media&#x26;token=b4238baf-5e7f-4582-a9ac-7257b3c7a4bf" alt=""><figcaption></figcaption></figure>

The `Create Schedule` modal will pop up to allow you to review selected buckets and define the scan frequency (daily, weekly, monthly, yearly).&#x20;

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FrbWjlQbuBs5Ji4I3hAOT%2FCreate%20AV%20Schedule%20inside%20page.png?alt=media&#x26;token=a55d338a-0aba-4682-8fec-f774de6aae59" alt=""><figcaption></figcaption></figure>

For more information, review the [Scheduled Scans](https://help.cloudstoragesec.com/console-overview/scheduled-scans) documentation page.

{% hint style="warning" %}
Creating a schedule from this page, does NOT actually activate the schedule. You must go to the [Scheduled Scans](https://help.cloudstoragesec.com/scheduled-scans#activating-and-deactivating) page and then activate the schedule. Only at that time will the schedule execute and protect your buckets as defined.
{% endhint %}

## Protection Statuses

"Protection" can mean multiple things. In regards to **Antivirus for Amazon S3** it means: real-time scanning (event-based), schedule scanning (pre-defined schedule based) and on-demand (pick a bucket(s) and scan immediately whenever you want).

The Shield Color Legend shown on this page will reflect how a bucket is being protected with event-based scanning as seen below.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2F8RdQH55fep4lMftjnqoh%2FScreenshot%202023-07-22%20at%2019.57.20.png?alt=media&#x26;token=68be0a14-2884-49f3-afc4-28ba23ef9c9b" alt=""><figcaption></figcaption></figure>

### Event-based Protection

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2F61hJjMMWMILI95DrriTM%2FScreenshot%202023-07-22%20at%2020.08.17.png?alt=media&#x26;token=a1ef73ee-b2eb-44f9-81f6-0fc17001bc0a" alt=""><figcaption></figcaption></figure>

A green shield means a bucket is protected and a red shield indicates a bucket is not protected.

### Schedules Status

The schedule icons shown below will reflect whether a bucket is associated with a schedule and whether that schedule is active or not.

* Protected by Active Schedule - ![Green clock](https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FcWjXBZghM895Qpeu9Zr7%2Fgreen-clock.png?alt=media)
* Part of an **Inactive** Schedule - ![Red clock](https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FD1I4zDFdWHhwv79Ma0Zi%2Fyellow-clock.png?alt=media)
* Not a Part of any Schedule - ![Red clock](https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FLAvOVzethjMYhwSe7V27%2Fred-clock.png?alt=media)

### Conflicted Buckets

{% hint style="warning" %}
As of v7.00.000 we automatically use EventBridge to resolve any bucket conflicts.

If you are running an older version (any version prior to v7.00.000) of our product please check out the [Trouble Shooting - Address Conflicts](https://help.cloudstoragesec.com/trouble-shooting/conflicted-buckets) section for detailed steps on how to resolve these conflicts.
{% endhint %}

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2F37vZ9g02Q015UAYtiP9z%2FConflicted.png?alt=media&#x26;token=7a39f356-9181-49eb-a0c4-1d06f72c4089" alt=""><figcaption></figcaption></figure>

On top of these main statuses, you may have buckets that are in some form of conflict for scanning. As of v7.00.00 we automatically resolve any conflicted buckets using EventBridge.

If a bucket is conflicted it will have a shield with a slash through it. If a bucket is protected by event bridge it will have a green shield with a star inside of it.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2Fvlr6M576iutBO5BsuHCW%2Fshields-1.png?alt=media&#x26;token=8e6e45ed-1d44-4937-80a4-c78e360c99b2" alt=""><figcaption></figcaption></figure>

You can protect a conflicted bucket by clicking on the shield associated with the bucket. You will receive a prompt notifying you that we can protect this bucket with EventBridge and additional charges from EventBridge will be incurred. If you select `Turn On` your bucket will have event-based scanning enabled (using EventBridge).

\
You can also enable EventBridge globally for all buckets on the [Scan Settings](https://help.cloudstoragesec.com/console-overview/configuration/scan-settings) so you can use it by default anytime you protect a bucket.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FQCsNJRtJnfOUnRS6La96%2FScreenshot%202023-07-22%20at%2020.11.40.png?alt=media&#x26;token=2a83904a-2023-4c8a-ad83-93d5f61266fe" alt=""><figcaption></figcaption></figure>

{% hint style="info" %}
If `Protect with Event Bridge` is enabled globally from [Scan Settings](https://help.cloudstoragesec.com/console-overview/configuration/scan-settings) then we will protect all selected buckets with Event Bridge without acknowledgment.

\
If `Protect with Event Bridge` is not enabled we will protect buckets using the "best choice". If the bucket can be protected with the S3 Event Notification we will do so, but if conflicted we will fail over to Event Bridge.&#x20;
{% endhint %}

Along with these main conflicts, you can see a purple colored shield associated with a bucket if there is another Antivirus for Amazon S3 console running and protecting that bucket.

If you'd like to protect it with a different console you'll first need to disable protection on that bucket inside the console that is already protecting it.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FnUBqoucItvTmkmGQ5FNZ%2Fshields-2.png?alt=media&#x26;token=1382f6b0-6a48-4fe5-aaa8-818a641cf23e" alt=""><figcaption></figcaption></figure>

## Search

Every field in the table can be searched upon utilizing the `Search` field at the top of the page. Want to see only the buckets in 'east' search for that. Want all of the buckets that have a particular piece of text in their name, just type in that piece of text. You can search for multiple things as well separated by a space. Want to see all the buckets in `us-east-1` for the `Production` account just add both of those in with a space between them.

### Special Search Terms

There are some special terms that you can search on:

1. Public
2. Encrypt
3. Conflict
4. Protected

Protection Status can be searched by `Protected.`\
\&#xNAN;*You may find bucket names that one `protected` within the name which could throw the results slightly unprotected. In this case, use column sort on Protection Status.*

Bucket Conflicts can be searched for by using the word `conflict` in the search field. This will return all the highlighted rows that reflect a potential event conflict.

Searching on `public` will identify all buckets that have some public aspects to them as seen in the [Bucket Attributes](#bucket-attributes) above.

Searching on `encrypt` will return all buckets that have a KMS key associated with them and identify whether the AgentRole has access to the key as seen in the [Bucket Attributes](#bucket-attributes) above.

### Additional Search Capabilities

We also provide the ability to search leveraging regex within the search field. This gives you great flexibility to really narrow down exactly what you are looking for. Whereas a general partial word specified in the Search field may pull back more rows than you'd like, the regex option will allow you to better pattern match.

But, if you want a specific set of buckets that starts with "has" folders that end with "it", we could specify `Regex(has.*it)` to get the two buckets that contain "has" and end with "it":

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2F7pK59G2YnzDnQmCb9N7p%2FRegex.png?alt=media&#x26;token=02815bec-f530-49f9-9266-86a147f7d5d6" alt=""><figcaption></figcaption></figure>

### Aggregate search terms

Another useful capability is that you can aggregate multiple individual searches to build a larger selected list. We can create a potentially complex regex or we can do multiple simple searches for our selections. Extending the example above, albeit a simple one, might look as follows.

Search for and select the buckets you want. In this example, we are searching for buckets named `classification`.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FUZlY28MV4UP40Z3TbMI6%2FScreenshot_2.png?alt=media&#x26;token=0a5afc9e-2ec3-47e5-8056-169fa8636c5b" alt=""><figcaption></figcaption></figure>

Notice the bottom summary line: <mark style="background-color:blue;">`Showing 7 of 896 buckets - 1 Selected`</mark>

Clear `classification` from the search and enter `eu` in place of it and select the bucket(s) you want.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FXsxW7oXrMtZgCVnoHg0C%2FShowing%20buckets.png?alt=media&#x26;token=2aed5530-edf7-43e3-9257-842c516ec03d" alt=""><figcaption></figcaption></figure>

Now notice the bottom summary line: <mark style="background-color:blue;">`Showing 51 of 896 buckets - 3 Selected (1 not currently visible)`</mark>

Your first search selection is still maintained as well as any subsequent search selections made. So you can build up your selected list very simply this way. This can be used for one off retro scanning ([Scan Existing](#scan-existing-objects)) as well as the basis for creating [schedule based scans](https://help.cloudstoragesec.com/console-overview/scheduled-scans).

### Search Examples

{% tabs %}
{% tab title="Search Account and Region" %}

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FzGhWdZFJt7YjRUscSCzp%2FSearching%201.png?alt=media&#x26;token=4e2470eb-44df-46ca-b065-0a67613b11ef" alt=""><figcaption></figcaption></figure>
{% endtab %}

{% tab title="Search Public Status" %}

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FRUppsuJwjrKRtiQP6UDN%2FPublic.png?alt=media&#x26;token=90d1e2bb-1557-403f-978e-8e2d5ed4b41b" alt=""><figcaption></figcaption></figure>
{% endtab %}

{% tab title="Search Conflicts" %}

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2Ft6eMdRE6S3M7ykcfdHNI%2FScreenshot_1.png?alt=media&#x26;token=0fdb5450-d749-4b23-8cfc-2d67e30f3a92" alt=""><figcaption></figcaption></figure>
{% endtab %}

{% tab title="Search with Regex" %}

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FTF6tFVRLvrHDV9WgDrtI%2FRegex%202.png?alt=media&#x26;token=bcd1f701-b2f4-4df7-9b32-312c46788751" alt=""><figcaption></figcaption></figure>
{% endtab %}
{% endtabs %}

### Filtering

\
Next to the **Select Visible** button, there is a **Show** button that lets you search and filter buckets based on the following options:

* **Show all buckets**
* **Show unprotected buckets** (Red Shield)
* **Show protected buckets** (Green Shield)
* **Show buckets protected by another console** (Purple Shield)
* **Show buckets protected by schedules** (Watch icon)

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FQvK7ASfscOUndRRzdVkL%2Fshow%20section.png?alt=media&#x26;token=339908fb-4f7e-4e55-b25c-cb6682ca35d0" alt=""><figcaption></figcaption></figure>
