Veritas Data Insight User's Guide

Last Published:
Product(s): Data Insight (6.1.2)
  1. Section I. Introduction
    1. Introducing Veritas Data Insight
      1.  
        About Veritas Data Insight
      2.  
        About data custodian
      3.  
        About permissions
      4.  
        About SharePoint permissions
      5.  
        About Box permissions
      6.  
        About audit logs
      7.  
        About migrated domains
      8.  
        Applications for Symantec Data Loss Prevention
      9.  
        Content classification using Veritas Information Classifier
    2. Using the Veritas Data Insight Management Console
      1. About the Veritas Data Insight Management Console
        1.  
          Header
        2.  
          Tabs
        3.  
          Navigation pane
        4.  
          Content pane
      2.  
        Operation icons on the Management Console
      3.  
        Logging in to the Data Insight Management Console
      4.  
        Logging out of the Data Insight Management Console
      5.  
        Accessing online Help
  2. Section II. Data Insight Workspace
    1. Navigating the Workspace tab
      1.  
        About the Data Insight Workspace
      2.  
        Using the Workspace filters
      3.  
        Managing the Workspace
      4.  
        Searching the storage device hierarchy
      5.  
        Searching for users and user groups
    2. Analyzing data using the Workspace views
      1.  
        About information risk
      2.  
        Viewing summary of data sources
      3. Viewing shares summary
        1.  
          About control points
      4.  
        About the risk score for users
      5. About the Risk Dossier
        1.  
          Assessing risky users - an example scenario
      6.  
        Viewing user summary
      7.  
        Viewing details of Watchlist users
      8.  
        Viewing details of alert notifications
    3. Viewing access information for files and folders
      1.  
        About viewing file or folder summary
      2.  
        Viewing the overview of a data source
      3.  
        Managing data custodian for paths
      4.  
        Viewing the summary of user activity on a file or folder
      5. Viewing user activity on files or folders
        1.  
          Assigning an inferred data owner as custodian
        2.  
          Assigning an active user as custodian
        3.  
          Assigning a custodian from the Permissions tab
      6.  
        Viewing file and folder activity
      7.  
        Viewing CIFS permissions on folders
      8.  
        Viewing NFS permissions on folders
      9.  
        Viewing SharePoint permissions for folders
      10.  
        Viewing Box permissions on folders
      11.  
        Viewing audit logs for files and folders
      12. About visualizing collaboration on a share
        1.  
          Analyzing activity on collaborative shares
    4. Viewing access information for users and user groups
      1.  
        Viewing the overview of a user
      2.  
        Viewing the overview of a group
      3.  
        Managing custodian assignments for users
      4.  
        Viewing folder activity by users
      5.  
        Viewing CIFS permissions for users
      6.  
        Viewing CIFS permissions for user groups
      7.  
        Viewing NFS permissions for users and user groups
      8.  
        Viewing SharePoint permissions for users and user groups
      9.  
        Viewing Box permissions for users and user groups
      10.  
        Viewing audit logs for users
  3. Section III. Data Insight reports
    1. Using Data Insight reports
      1.  
        About Data Insight reports
      2.  
        How Data Insight reporting works
      3.  
        Creating a report
      4. About Data Insight security reports
        1.  
          Activity Details report
        2. Permissions reports
          1.  
            Inactive Users
          2.  
            Path Permissions
          3. Permissions Search report
            1.  
              Create Permissions Search report
          4.  
            About Permissions Query templates
          5. Creating a Permissions Query Template
            1.  
              Using the match-type criteria
          6.  
            Creating custom rules
          7. Permissions Query Template actions
            1.  
              Editing or deleting a Permissions Query Template
            2.  
              Copying a Permissions Query Template
            3.  
              About sharing a Permissions Query Template
          8.  
            Using Permissions Search report output to remediate permissions
          9.  
            Entitlement Review
          10.  
            User/Group Permissions
          11.  
            Group Change Impact Analysis
        3. Ownership Reports
          1.  
            Data Custodian Summary
          2.  
            Inferred Owner
          3.  
            Data Inventory Report
      5.  
        Create/Edit security report options
      6.  
        Data Insight limitations for Box permissions
      7. About Data Insight storage reports
        1.  
          Activity Summary reports
        2. Capacity reports
          1.  
            Filer Utilization
          2.  
            Filer Growth Trend
        3. Data Lifecycle reports
          1.  
            Inactive Data by File Group
          2.  
            Inactive Data by Owner
          3.  
            Data Aging
          4.  
            Inactive Folders
        4. Consumption Reports
          1.  
            Potential Duplicate Files
          2.  
            Consumption by Folders
          3.  
            Consumption by Department
          4.  
            Consumption by File Group
          5.  
            Consumption by Owner
          6.  
            Consumption by File Group and Owner
      8.  
        Create/Edit storage report options
      9. About Data Insight custom reports
        1.  
          About DQL query templates
        2.  
          Creating custom templates for DQL queries
        3.  
          Create/Edit DQL report options
      10.  
        Considerations for importing paths using a CSV file
    2. Managing reports
      1.  
        About managing Data Insight reports
      2. Viewing reports
        1.  
          About stale information in reports
      3.  
        Filtering a report
      4.  
        Editing a report
      5.  
        About sharing reports
      6.  
        Copying a report
      7.  
        Running a report
      8.  
        Viewing the progress of a report
      9.  
        Customizing a report output
      10.  
        Configuring a report to generate a truncated output
      11.  
        Sending a report by email
      12.  
        Automatically archiving reports
      13.  
        Canceling a report run
      14.  
        Deleting a report
      15.  
        Considerations for viewing reports
      16.  
        Organizing reports using labels
  4. Section IV. Remediation
    1. Configuring remediation workflows
      1.  
        About remediation workflows
      2.  
        Prerequisites for configuring remediation workflows
      3.  
        Configuring Self-Service Portal settings
      4.  
        About workflow templates
      5. Managing workflow templates
        1.  
          Create/Edit Entitlement Review workflow template
        2.  
          Create/Edit DLP Incident Remediation workflow template
        3.  
          Create/Edit Ownership Confirmation workflow template
        4.  
          Create/Edit Records Classification workflow template
      6. Creating a workflow using a template
        1. Create Entitlement Review workflow options
          1.  
            Customizing Entitlement Review report output
        2.  
          Create DLP Incident Remediation workflow options
        3.  
          Create Ownership Confirmation workflow options
        4.  
          Create Records Classification workflow options
      7. Managing workflows
        1.  
          Viewing details of submitted workflows
        2.  
          Extending the deadline of a workflow
        3.  
          Copying a workflow
        4.  
          Managing submitted workflows
        5.  
          Canceling or deleting a workflow
      8.  
        Auditing workflow paths
      9.  
        Monitoring the progress of a workflow
      10.  
        Remediating workflow paths
    2. Using the Self-Service Portal
      1. About the Self-Service Portal
        1.  
          About Entitlement Review
      2.  
        Logging in to the Self-Service Portal
      3.  
        Using the Self-Service Portal to review user entitlements
      4.  
        Using the Self-Service Portal to manage Data Loss Prevention (DLP) incidents
      5.  
        Using the Self-Service Portal to confirm ownership of resources
      6.  
        Using the Self-Service Portal to classify sensitive data
    3. Managing data
      1. About managing data using Enterprise Vault and custom scripts
        1.  
          About Retention categories
        2.  
          About post-processing actions
      2.  
        Managing data from the Shares list view
      3.  
        Managing inactive data from the Folder Activity tab
      4.  
        Managing inactive data by using a report
      5.  
        Archiving workflow paths using Enterprise Vault
      6.  
        Using custom scripts to manage data
      7.  
        Pushing classification tags while archiving files into Enterprise Vault
      8. About adding tags to files, folders, and shares
        1.  
          Using the metadata framework for classification and remediation
    4. Managing permissions
      1.  
        About permission visibility
      2.  
        About recommending permission changes
      3. About recommending permissions changes for inactive users
        1.  
          Reviewing permission recommendations
        2.  
          Analyzing permission recommendations and applying changes
      4.  
        Making permission changes directly from Workspace
      5.  
        Removing permissions for Entitlement Review workflow paths
  5. Appendix A. Command Line Reference
    1.  
      mxcustodian

Create/Edit security report options

Use this dialog to create an instance of a report. The options available on the page and their order depend on the type of report that you select.

Table: Create/Edit security report options

Option

Description

Report Information

Enter information in the following fields:

  • Name - A logical name for the report.

  • Label - Add a label(s) to help you categorize and easily find the report from a long list of reports. For example, Finance or Media Files.

    See Organizing reports using labels.

  • Description - A short description of the data contained in the report.

  • Report type - The type of security report. This field is populated by default.

  • Select resources using - Select Paths or Custodian Information radio button.

    Depending on the selection, you can see the data selection or custodian selection option.

    Note:

    This field is available only in the following five reports :

    • Activity summary report for paths

    • Data aging report

    • Inactive folders report

    • Path permissions report

    • Consumption by folders report

  • Output format - Select the format in which you want to generate the report. You can select one or all of the given output formats.

  • Maximum reports to preserve - Select the number of report outputs you want the system to preserve. If both, global value and local value is not configured, then the value is considered as unlimited.

    In case of scheduled reports, setting up value of this parameter to Unlimited may fill up disk space. Configure the value appropriately by taking disk space into consideration.

    Note:

    You can configure a global setting to purge report outputs when they exceed a certain number. However, the value configured in the Maximum reports to preserve field takes precedence over the global setting.

    For information about data retention settings, see the Veritas Data Insight Administrator's Guide.

  • Schedule - Select the schedule at which you want the report to run.

  • Copy output to - Enter a path to copy report output files. To successfully copy a report output to an external computer, you must ensure that the Secondary Logon windows service is running in the Management Server.

    Note:

    When you specify a path in this field, select a folder that already exists. Data Insight does not create a new folder. Copying a report may fail if the folder is in use by any application, including Windows Explorer. To test a connection, check the number of connections allowed on the folder. If you have just created a folder and the folder is open in Windows explorer, the test connection will fail for default settings since the default number of connections allowed on a folder is one.

  • Select Credentials to access "Copy output to" path - Select a credential from the drop-down menu, so that Data Insight can direct the report output to the specified location. Aditionally you can use the option for adding a new set of credentials if the required credentials are not already added. The credentials must have folder-level read, write, create and delete permissions on the external computer where the report output is copied.

  • Overwrite option - Selecting this option overwrites the earlier report output files. If you clear this check box, Data Insight creates a new folder with a report run ID for every report run, and saves the report in the new folder.

Configuration

Select the conditions to configure the report.

  • Time Period - Enter the time range for which you want data to be included in the report.

    Select Duration to indicate the last n hours/days/weeks/months/year.

    Select Date Range to specify a specific time range.

  • Bucket Size (Months) - Enter the bucket interval that you want to include in the report.

  • Access Type - Select the access types you want to include in your report.

  • Include custom attributes of user - By default, the check box is cleared. Select the check box to select the custom attributes from the drop-down list.

    For more information on configuring the custom directory attributes, see the Veritas Data Insight Administrator's Guide.

  • Select order of policies for computing data owner- The up and down buttons help you change the order of data owner policy according to your preference in the report output.

  • Inactive Time Period - From the drop-down, select the duration of inactivity for files.

    Only the files that have remained inactive for the selected duration are included in the report.

    This field is only available for the Inactive users report.

  • Folder Depth - Select the depth of subfolders to be included in the report from the drop-down list. This option is useful when you want to limit the total output in the report. From the drop-down,

    • Select Current folder, to include the folders from the current directory.

    • Select Full to include all the folders.

    • Select Specify Depth and enter the level at which you want to include the folders.

    You can add folder depth for the following reports:

    • Path Permissions

    • User/Group Permissions

    • Inferred Owner

    • Entitlement Review

  • Effective Permissions or Access Control List - Select the appropriate radio button to include required permissions in the report.

  • Include share level ACLs for effective permission computation - Select the checkbox to include share-level permissions in the report.

    Note:

    If you select Include Share level ACLs for effective permission computation in the Configuration tab, Data Insight replaces any user/group that has explicit permissions on the path and has migrated to a new domain, with the corresponding new account.

  • Display only unique permissions - Select the checkbox to include only the unique permissions in the report.

  • Show advance permissions - Select this checkbox to include all the advance permissions in the report.

  • Expand User Groups - Select this checkbox to include the member count in the report.

  • Member count - Enter the number of expanded member users that you want to include in the report output.

    Note:

    This option is available only for Entitlement Review report.

  • Select columns to hide in output - Select the columns that you do not want to display in the report.

  • Department mapping - You can map the department through the options available in the drop-down list . The generated report maps the department on the basis of the option you choose.

  • Filter- This option is available only for the Data Inventory Reports. Use the filter to specify the following :

    • Time filter- From the drop down, select an option to consider all the files that are last accessed or modified before a given time.

    • File Group- Select this option to specify the file groups, to be considered for generating the report output.

    • File Type-Select this option to specify file types to be considered for generating the report output. Specify the extensions of the file types to be considered in a comma separated list.

    • DLP Policy-Select a DLP policy to be considered for generating the report output.

  • Results-This option is available only for the Data Inventory Reports. Use this option to specify the following:

    • Summary only- Select this option to create a report which displays the summary of the files grouped on the basis of either BU Name, BU Owner, or any other Custom Attibutes that you have selected from the Department Mapping drop-down.

    • Summary and Sensitive file details-Select this option to create a report which displays:

      • The details of the all the sensitive files present.

      • The summary of all the files grouped by business unit name, business unit owner, or any other custom attibutes that you have selected from the Department Mapping drop-down.

    • Summary and all file details-This option is available only when a DLP policy is selected in the Filter option. Select this option to create a report which displays:

      • The details of the all the files.

      • The summary of all the files grouped by business unit owner, or any other custom attibutes that you have selected from the Department Mapping drop-down.

  • Number of Records- Specify the number of records you want to include in the detailed report. The report computes the number of records as the top N files based on the file size for every data owner. From the top N files, (for example, in case of Data Inventory report) the report will display the top N files based on the department mapping configured. The default is 25 records.

Data Selection

Do the following:

  1. Select the Physical Hierarchy radio button to view the configured file servers or SharePoint web applications.

    Or, select the DFS Hierarchy radio button to view the configured DFS paths in a domain.

    Or, select the Containers radio button to view the available containers that can be added in the report.

    Click the site, file server, share, or folder to select it. The selected data set is listed in the Selected Data pane.

  2. Add resource- Enter the resource path and click Add to include the path name in the report output.

  3. You can also use a CSV file to import paths for creating reports. Click Upload CSV. On the pop-up, you can download the CSV template to review the input values and the format of the CSV file for that particular report.

    Only valid paths in the .csv file are displayed in the Selected Data pane.

    Browse to the location of the CSV file and click Upload.

This option is available for the following reports:

  • Activity Details for Paths

  • Activity Summary for Paths

  • Path Permissions

  • Entitlement Review

Custodian Selection

For data custodian driven reports Data Insight creates a report output for each selected custodian at the time of generating a report.

For each custodian, all paths that belong to the custodian are considered. Custodian selection is an indirect way of selecting paths. For example, If a custodian has two locations assigned - \\netapp1\fin-share and \\netapp1\hr-share, then selecting this custodian as a custodian is equivalent to selecting these two paths through data selection.

User Selection

From the list, click the user, group, or all users/groups radio button. The selected entities are listed in the Selected Users/Groups pane.

You can type a name in the search bar to search for a user or group. You can also type a domain name in the Domain Filter field to narrow your search to users in a specific domain.

Note:

You can search for a particular Built-in user or group by using the Domain Filter.

You can also filter a user or group from the Select Filter field.

Select the All Filtered Users check box in the Selected Users/Group pane to include all filtered users in the report.

You can also import user information using a CSV file for creating reports. Only valid users in the CSV file are displayed in the Selected Users/Groups pane. You must enter the users and groups in the following format: user@domain or group@domain.

Exclusion List

Select the groups or users that you want to exclude from the scope of the report.

Click the group or user to select it. The selected data set is listed in the Selected Groups/Users pane.

Note:

You can search for a particular Built-in user or group by using the Domain Filter.

Notification

Enter email addresses of users you want to send the report to.

If the size of the attachment is above the configured limit, an email is sent without the attachment. You can configure the size of the attachment under Settings > SMTP Settings.

Remediation

Use this tab to instruct Data Insight to execute predefined actions on a report output.

Select Take action on data generated by report to enable automatic processing of data generated by a report.

Select any of the following:

  • Archiving (Enterprise Vault) - Select this option to archive data using Enterprise Vault. If you select this option you must specify a retention category and a post-processing action.

    You can add classification tags while archiving files into Enterprise Vault to enable faster search from Enterprise Vault. Select the Add Custom Index Property check box. You can select a Property type from the drop-down box like Text, Integer, or Date. Depending on what you select, text boxes corresponding to Set, Name and Value appear. You must specify the name of the property set, the name of the property and the value of the property which will constitute the classification tag that will be pushed while archiving files into Enterprise Vault.

    See Pushing classification tags while archiving files into Enterprise Vault.

  • Custom Action 1 / Custom Action 2 - Select this option to specify a custom action defined by a custom script.

See About managing data using Enterprise Vault and custom scripts .

Some limitations exist when creating certain Permissions reports for Box resources. See Data Insight limitations for Box permissions .