Arctera™ Insight Management Console Help
- Getting started
- About Arctera Insight Management Console
- Prerequisites for using Arctera Insight Management Console
- Arctera Insight Management Console web browser support
- What's new in this release
- Signing in to Arctera Insight Management Console
- Signing out from Arctera Insight Management Console
- Resetting a forgotten password
- Changing your profile password
- Archive Overview
- Working with Dashboard
- Managing Configurations
- About the Configuration page
- Viewing provisioned services
- Selecting options to provision and manage user accounts
- About Provisioning
- CloudLink Sync Summary
- About Managed Tags
- About Account Management
- Searching for archive accounts
- Using search filters
- Creating an archive account
- Viewing and editing the archive account details
- About the Account Details page
- Editing an archive account
- Deleting an archive account
- Deploying users
- Enabling services for existing archive accounts
- Configuring the Manage Your Own Keys (MYOK) Feature
- Removing user access
- Disabling bulk user accounts
- Editing Mobile Web Access permission for existing archive accounts
- Unlocking an archive account
- Exporting archive account information
- Editing contact details of a system administrator
- Managing InsightBooks permissions
- Managing Archive Collectors
- About Archive Collectors
- Adding new archive collectors
- Updating configuration of existing archive collectors
- Stopping or restarting import job of archive collectors
- Viewing the latest status of Archive Collectors
- Cloning archive collectors
- Deleting an existing archive collector
- Deleting a history of archive collectors
- About Exchange Online Archiving
- Setting up modern authentication in Azure AD for Exchange Online sync
- Configuring Exchange Online sync
- About Exchange Online folder synchronization
- Prerequisite for migrating Exchange Online Users configured with Folder Sync to Exchange Online Folder Synchronization
- Configuring Exchange Online folder synchronization
- Configuring Microsoft Azure Active Directory Group synchronization
- About Bloomberg Archiving
- About Google Chat Archiving
- About Google Workspace Archiving
- About ChatGPT conversation data Archiving
- About Google Messages Archiving
- About SCIM Archiving
- About Import Collector
- About Insight Capture Services Archiving
- About Microsoft Teams (Audio Video) Archiving
- About Audio-Video Archiving
- About Audio-Video Archiving using NTR-X Collectors
- About Dubber Speik SMS Archiving
- About Dubber Speik Recordings Archiving
- About Text-Delimited Archiving
- About XSLT-XML Archiving
- About JSON Archiving
- About iMessage Archiving
- About LinkedIn Archiving
- About Signal Archiving
- About Verint Archiving
- About WeChat Archiving
- About WhatsApp Archiving
- About Cloud9 Archiving
- About Verba Archiving
- About Copilot Archiving
- About Zoom Phone Archiving
- Managing Roles and Permissions
- About Role Management
- Editing the built-in administrator roles
- Creating custom administrator roles
- Assigning administrator roles to an archive account
- Assigning the reviewer role to an archive account
- Assigning multiple archive accounts for monitoring
- Assigning the Department Reviewer Role
- Assigning roles, privileges, and monitored accounts to Azure Active Directory groups
- Managing Policies
- About Policy Management
- Configuring archive options
- Enabling and disabling account archiving
- Configuring the InsightAI feature
- Configuring an advanced password policy
- Configuring trusted networks for Arctera Insight Archiving access
- Managing Custom Headers
- Managing Discard Rules
- Managing Index Exclusion
- Managing Authentication
- Configuring the Arctera Insight Archiving authentication service
- Enabling the Authentication Settings permission for the Policy Manager role
- Assigning the Policy Manager role to an administrator
- Selecting an authentication method
- Uploading a -signing certificate
- Validating the Identity Provider URL
- Activating single sign-on
- Managing Retention Policies
- About Retention Management
- Supported retention scenarios for WORM and non-WORM Insight Archiving customers
- Configuring the default retention period
- Creating a retention policy
- Editing a retention policy
- Deleting a retention policy
- Associating a retention policy with a policy target
- Disassociating a retention policy from a policy target
- Enabling and disabling the storage expiry setting
- Viewing the storage expiry status table
- Managing Email Continuity Services
- About Email Continuity
- Email Continuity prerequisites
- Configuring Email Continuity
- Provisioning the Email Continuity service for your mail servers
- Adding the Email Continuity IP ranges to your firewall and mail server allowlists
- Updating your email security provider routing configuration
- Testing the Email Continuity configuration
- Managing Email Continuity
- Email Continuity FAQ
- Managing Reports and Notifications
- Classification
- Managing Data Import
- AD FS Configuration Guide
Assigning roles, privileges, and monitored accounts to Azure Active Directory groups
The Management Console supports synchronizing Azure Active Directory groups through SCIM or Active Directory Sync. This capability allows administrators to centrally manage access to Active Directory groups.
The feature enables administrators to assign roles and privileges to Active Directory groups directly from the Management Console. This reduces the need to manage reviewer roles on individual users-basis.
Before you use this feature, note the following facts:
By default, all synchronized Active Directory groups are assigned the role. At this stage, effective role and privileges of each member will be either their individual user role or other Active Directory groups the user belongs to.
When administrators assign the role at the Active Directory group level, all direct members of the Active Directory group automatically inherit the assigned reviewer privileges. A maximum of 100 members (user accounts) from a single Active Directory group can be assigned case-level reviewer privileges.
Only the direct group members can be assigned the role. The nested groups and their members cannot be assigned the Reviewer role.
The administrator can add, remove, and import monitored accounts while assigning roles and privileges to the Active Directory group.
The for monitored accounts will be highest date assigned from Individual user and all Active Directory groups.
Active Directory groups assigned with the Reviewer role can be selected as reviewers in Insight eDiscovery. However, the Active Directory group role cannot be changed using Insight eDiscovery.
Administrators can assign case-level reviewer privileges to an Active Directory group. All direct members of the Active Directory group automatically inherit the assigned reviewer privileges for the selected case. When an Active Directory group is added as a case reviewer, all its members are added as reviewers for the case.
If an Active Directory group is deleted during synchronization, members of that Active Directory group no longer retain the roles and privileges that were assigned to them through that Active Directory group. In this scenario, each member's effective role and privileges will be either their individual user role or other Active Directory groups the user belongs to.
If an Active Directory group with case-level reviewer privileges is removed, the expiry date for its members is set to the group removal date. The members still remain listed as case reviewers. However, when such members log in to Insight eDiscovery with an expired reviewer role, the associated cases are not displayed to them.
To assign roles to Azure Active Directory groups
- In the left navigation pane, select Role Management > Assign Active Directory Groups.
The application displays a list of available Active Directory groups synchronized from identity sources such as SCIM and Microsoft 365. To view the members of a group, click the Download icon next to the required group name. The downloaded file contains the names of all users who are members of the selected Active Directory group.
- Search for and select the Active Directory group. You can use Advanced Search to filter the list of Active Directory groups or enter the keywords of Active Directory group name.
Perform the following as needed:
If the selected Active Directory group has no assigned roles, the Role drop-down on the Role Change page displays None by default.
- From the Role drop-down menu, select Reviewer, and then click Save.
When you view the list, Active Directory groups are displayed with their assigned roles. The Role column displays Reviewer when the reviewer role is assigned; otherwise, it is blank. Refer to the sample image below.
To assign privileges to Azure Active Directory groups
- In the left navigation pane, select Role Management > Assign Active Directory Groups.
The list of available Active Directory groups is displayed.
- Search for and select the Active Directory group. You can use Advanced Search to filter the list of Active Directory groups or enter the keywords of Active Directory group name.
- Under Privileges, select one or more of the following options:
Monitor All Accounts
Select this option to allow the Active Directory group to view archived messages for all archive accounts. When this option is selected, there is no need to complete the steps in the Accounts to Monitor section.
Clear this option to allow the selected Active Directory group to view archived messages for specific archive accounts. When this option is not selected, the Accounts to Monitor section is displayed, allowing archive accounts and Active Directory groups to be added, removed, and imported.
To add monitored accounts, click Add/Remove Monitored Accounts. Select the archive accounts that you want the reviewer to monitor, and click Save.
To import monitored account, click Import, and do the following:
a. In the Import Monitor Accounts window, download the sample .xls file, save it as a .csv file.
b. Retain the PrimaryEmailAddress column heading, and enter only the primary email addresses of the archive accounts. Delete all content below the PrimaryEmailAddress column heading.
c. Click Browse to select the prepared .csv file, click Import, and then click Save on the Role Change page.
eDiscovery Reviewer
By default, this option is selected to allow the Active Directory group to access Insight eDiscovery.
The eDiscovery Reviewer privileges section lists privileges that vary by case level.
As an administrator, you can assign these privileges to the eDiscovery Reviewers to perform various actions while reviewing the cases.
Disable Preview Emails
Select this option to prevent the reviewer from previewing emails from other archive accounts.
Case Creation
Select this option to allow the reviewer to create cases in Insight eDiscovery.
- On the Role Change page, click Save.
After you save the changes made to the selected Active Directory group, they are updated in the application and can be verified as follows.
Application-level changes
a. In the left navigation pane, select Reports and Notifications > Logs.
b. On the Activity Log page, specify the time period, Detail Substring, or a user name as available.
c. From the Event drop-down list, select Role changed option. Click Search to view the log as shown in the sample image below.
Account-level changes
a. In the left navigation pane, select Role Management > Assign Accounts. A list of archive accounts appears.
b. Search for the required archive account. Use any of the following methods.
Expand the Advanced Search section, specify the input, and click Apply.
Expand the Roles section, click on the required role.
In the Search field, enter the username or email of the archive account and click the Search icon.
Refer to the Effective Role and Role column values for the required archive account to verify the role changes.
Click the question mark (?) icon (if appears) in the Effective Role column to view how the effective role is determined based on Active Directory group membership. The details appear as shown in the sample image below.