Arctera™ Insight Management Console Help
- Getting started
- About Arctera Insight Management Console
- Prerequisites for using Arctera Insight Management Console
- Arctera Insight Management Console web browser support
- What's new in this release
- Signing in to Arctera Insight Management Console
- Signing out from Arctera Insight Management Console
- Resetting a forgotten password
- Changing your profile password
- Archive Overview
- Working with Dashboard
- Managing Configurations
- About the Configuration page
- Viewing provisioned services
- Selecting options to provision and manage user accounts
- About Provisioning
- CloudLink Sync Summary
- About Managed Tags
- About Account Management
- Searching for archive accounts
- Using search filters
- Creating an archive account
- Viewing and editing the archive account details
- About the Account Details page
- Editing an archive account
- Deleting an archive account
- Deploying users
- Enabling services for existing archive accounts
- Configuring the Manage Your Own Keys (MYOK) Feature
- Removing user access
- Disabling bulk user accounts
- Editing Mobile Web Access permission for existing archive accounts
- Unlocking an archive account
- Exporting archive account information
- Editing contact details of a system administrator
- Managing InsightBooks permissions
- Managing Archive Collectors
- About Archive Collectors
- Adding new archive collectors
- Updating configuration of existing archive collectors
- Stopping or restarting import job of archive collectors
- Viewing the latest status of Archive Collectors
- Cloning archive collectors
- Deleting an existing archive collector
- Deleting a history of archive collectors
- About Exchange Online Archiving
- Setting up modern authentication in Azure AD for Exchange Online sync
- Configuring Exchange Online sync
- About Exchange Online folder synchronization
- Prerequisite for migrating Exchange Online Users configured with Folder Sync to Exchange Online Folder Synchronization
- Configuring Exchange Online folder synchronization
- Configuring Microsoft Azure Active Directory Group synchronization
- About Bloomberg Archiving
- About Google Chat Archiving
- About Google Workspace Archiving
- About SCIM Archiving
- About Import Collector
- About Insight Capture Services Archiving
- About Microsoft Teams (Audio Video) Archiving
- About Audio-Video Archiving
- About Audio-Video Archiving using NTR-X Collectors
- About Dubber Speik SMS Archiving
- About Dubber Speik Recordings Archiving
- About Text-Delimited Archiving
- About XSLT-XML Archiving
- About JSON Archiving
- About iMessage Archiving
- About LinkedIn Archiving
- About Signal Archiving
- About Verint Archiving
- About WeChat Archiving
- About WhatsApp Archiving
- About Cloud9 Archiving
- About Verba Archiving
- About Copilot Archiving
- About Zoom Phone Archiving
- Managing Roles and Permissions
- Managing Policies
- About Policy Management
- Configuring archive options
- Enabling and disabling account archiving
- Configuring the InsightAI feature
- Configuring an advanced password policy
- Configuring trusted networks for Arctera Insight Archiving access
- Managing Custom Headers
- Managing Discard Rules
- Managing Index Exclusion
- Managing Authentication
- Configuring the Arctera Insight Archiving authentication service
- Enabling the Authentication Settings permission for the Policy Manager role
- Assigning the Policy Manager role to an administrator
- Selecting an authentication method
- Uploading a -signing certificate
- Validating the Identity Provider URL
- Activating single sign-on
- Managing Retention Policies
- About Retention Management
- Supported retention scenarios for WORM and non-WORM Insight Archiving customers
- Configuring the default retention period
- Creating a retention policy
- Editing a retention policy
- Deleting a retention policy
- Associating a retention policy with a policy target
- Disassociating a retention policy from a policy target
- Enabling and disabling the storage expiry setting
- Viewing the storage expiry status table
- Managing Email Continuity Services
- About Email Continuity
- Email Continuity prerequisites
- Configuring Email Continuity
- Provisioning the Email Continuity service for your mail servers
- Adding the Email Continuity IP ranges to your firewall and mail server allowlists
- Updating your email security provider routing configuration
- Testing the Email Continuity configuration
- Managing Email Continuity
- Email Continuity FAQ
- Managing Reports and Notifications
- Classification
- Managing Data Import
- AD FS Configuration Guide
Subscribing to receive SIEM/SOAR Logs
The SIEM/SOAR Logs feature allows customers to retrieve all logs and transfer them to other tools, such as Splunk, for further processing.
To receive SIEM/SOAR Logs, customers need to contact Arctera Support and request enabling the SIEM/SOAR Log shipping service for their environment. Customers must specify which of the following storage options they require:
[Access key, Secret key, Region name, S3 bucket name]
[Blob connection string, container name]
[SFTP server hostname, port, username, password]
This service collects the following details:
Search logs from the Arctera Insight Management Console
Message logs, Activity logs, and Browser logs (including Mobile Browser, Discovery Browser, and Personal Browser) from the Insight eDiscovery portal
The SIEM/SOAR service identifies the collected logs by their name and creation date, and generates a separate CSV file for each log. If the customer has subscribed to this service, these CSV files are securely uploaded to their storage managed by the customer. The service employs the following components:
APIs provided by Amazon/Microsoft Azure/SFTP for uploading the CSV files.
Advanced Encryption Standard (AES-256) for secured data transmission. Each object is encrypted with a unique data key, providing additional protection for the data.
Refer to the following related knowledge base article to see sample SIEM/SOAR sample log reports in CSV format.
Note:
To ensure seamless and secured data transmission, customers are recommended to set up the necessary firewall rules to accomplish secure data upload to their storage of choice