Veritas Data Insight User's Guide

Last Published:
Product(s): Data Insight (6.1.2)
  1. Section I. Introduction
    1. Introducing Veritas Data Insight
      1.  
        About Veritas Data Insight
      2.  
        About data custodian
      3.  
        About permissions
      4.  
        About SharePoint permissions
      5.  
        About Box permissions
      6.  
        About audit logs
      7.  
        About migrated domains
      8.  
        Applications for Symantec Data Loss Prevention
      9.  
        Content classification using Veritas Information Classifier
    2. Using the Veritas Data Insight Management Console
      1. About the Veritas Data Insight Management Console
        1.  
          Header
        2.  
          Tabs
        3.  
          Navigation pane
        4.  
          Content pane
      2.  
        Operation icons on the Management Console
      3.  
        Logging in to the Data Insight Management Console
      4.  
        Logging out of the Data Insight Management Console
      5.  
        Accessing online Help
  2. Section II. Data Insight Workspace
    1. Navigating the Workspace tab
      1.  
        About the Data Insight Workspace
      2.  
        Using the Workspace filters
      3.  
        Managing the Workspace
      4.  
        Searching the storage device hierarchy
      5.  
        Searching for users and user groups
    2. Analyzing data using the Workspace views
      1.  
        About information risk
      2.  
        Viewing summary of data sources
      3. Viewing shares summary
        1.  
          About control points
      4.  
        About the risk score for users
      5. About the Risk Dossier
        1.  
          Assessing risky users - an example scenario
      6.  
        Viewing user summary
      7.  
        Viewing details of Watchlist users
      8.  
        Viewing details of alert notifications
    3. Viewing access information for files and folders
      1.  
        About viewing file or folder summary
      2.  
        Viewing the overview of a data source
      3.  
        Managing data custodian for paths
      4.  
        Viewing the summary of user activity on a file or folder
      5. Viewing user activity on files or folders
        1.  
          Assigning an inferred data owner as custodian
        2.  
          Assigning an active user as custodian
        3.  
          Assigning a custodian from the Permissions tab
      6.  
        Viewing file and folder activity
      7.  
        Viewing CIFS permissions on folders
      8.  
        Viewing NFS permissions on folders
      9.  
        Viewing SharePoint permissions for folders
      10.  
        Viewing Box permissions on folders
      11.  
        Viewing audit logs for files and folders
      12. About visualizing collaboration on a share
        1.  
          Analyzing activity on collaborative shares
    4. Viewing access information for users and user groups
      1.  
        Viewing the overview of a user
      2.  
        Viewing the overview of a group
      3.  
        Managing custodian assignments for users
      4.  
        Viewing folder activity by users
      5.  
        Viewing CIFS permissions for users
      6.  
        Viewing CIFS permissions for user groups
      7.  
        Viewing NFS permissions for users and user groups
      8.  
        Viewing SharePoint permissions for users and user groups
      9.  
        Viewing Box permissions for users and user groups
      10.  
        Viewing audit logs for users
  3. Section III. Data Insight reports
    1. Using Data Insight reports
      1.  
        About Data Insight reports
      2.  
        How Data Insight reporting works
      3.  
        Creating a report
      4. About Data Insight security reports
        1.  
          Activity Details report
        2. Permissions reports
          1.  
            Inactive Users
          2.  
            Path Permissions
          3. Permissions Search report
            1.  
              Create Permissions Search report
          4.  
            About Permissions Query templates
          5. Creating a Permissions Query Template
            1.  
              Using the match-type criteria
          6.  
            Creating custom rules
          7. Permissions Query Template actions
            1.  
              Editing or deleting a Permissions Query Template
            2.  
              Copying a Permissions Query Template
            3.  
              About sharing a Permissions Query Template
          8.  
            Using Permissions Search report output to remediate permissions
          9.  
            Entitlement Review
          10.  
            User/Group Permissions
          11.  
            Group Change Impact Analysis
        3. Ownership Reports
          1.  
            Data Custodian Summary
          2.  
            Inferred Owner
          3.  
            Data Inventory Report
      5.  
        Create/Edit security report options
      6.  
        Data Insight limitations for Box permissions
      7. About Data Insight storage reports
        1.  
          Activity Summary reports
        2. Capacity reports
          1.  
            Filer Utilization
          2.  
            Filer Growth Trend
        3. Data Lifecycle reports
          1.  
            Inactive Data by File Group
          2.  
            Inactive Data by Owner
          3.  
            Data Aging
          4.  
            Inactive Folders
        4. Consumption Reports
          1.  
            Potential Duplicate Files
          2.  
            Consumption by Folders
          3.  
            Consumption by Department
          4.  
            Consumption by File Group
          5.  
            Consumption by Owner
          6.  
            Consumption by File Group and Owner
      8.  
        Create/Edit storage report options
      9. About Data Insight custom reports
        1.  
          About DQL query templates
        2.  
          Creating custom templates for DQL queries
        3.  
          Create/Edit DQL report options
      10.  
        Considerations for importing paths using a CSV file
    2. Managing reports
      1.  
        About managing Data Insight reports
      2. Viewing reports
        1.  
          About stale information in reports
      3.  
        Filtering a report
      4.  
        Editing a report
      5.  
        About sharing reports
      6.  
        Copying a report
      7.  
        Running a report
      8.  
        Viewing the progress of a report
      9.  
        Customizing a report output
      10.  
        Configuring a report to generate a truncated output
      11.  
        Sending a report by email
      12.  
        Automatically archiving reports
      13.  
        Canceling a report run
      14.  
        Deleting a report
      15.  
        Considerations for viewing reports
      16.  
        Organizing reports using labels
  4. Section IV. Remediation
    1. Configuring remediation workflows
      1.  
        About remediation workflows
      2.  
        Prerequisites for configuring remediation workflows
      3.  
        Configuring Self-Service Portal settings
      4.  
        About workflow templates
      5. Managing workflow templates
        1.  
          Create/Edit Entitlement Review workflow template
        2.  
          Create/Edit DLP Incident Remediation workflow template
        3.  
          Create/Edit Ownership Confirmation workflow template
        4.  
          Create/Edit Records Classification workflow template
      6. Creating a workflow using a template
        1. Create Entitlement Review workflow options
          1.  
            Customizing Entitlement Review report output
        2.  
          Create DLP Incident Remediation workflow options
        3.  
          Create Ownership Confirmation workflow options
        4.  
          Create Records Classification workflow options
      7. Managing workflows
        1.  
          Viewing details of submitted workflows
        2.  
          Extending the deadline of a workflow
        3.  
          Copying a workflow
        4.  
          Managing submitted workflows
        5.  
          Canceling or deleting a workflow
      8.  
        Auditing workflow paths
      9.  
        Monitoring the progress of a workflow
      10.  
        Remediating workflow paths
    2. Using the Self-Service Portal
      1. About the Self-Service Portal
        1.  
          About Entitlement Review
      2.  
        Logging in to the Self-Service Portal
      3.  
        Using the Self-Service Portal to review user entitlements
      4.  
        Using the Self-Service Portal to manage Data Loss Prevention (DLP) incidents
      5.  
        Using the Self-Service Portal to confirm ownership of resources
      6.  
        Using the Self-Service Portal to classify sensitive data
    3. Managing data
      1. About managing data using Enterprise Vault and custom scripts
        1.  
          About Retention categories
        2.  
          About post-processing actions
      2.  
        Managing data from the Shares list view
      3.  
        Managing inactive data from the Folder Activity tab
      4.  
        Managing inactive data by using a report
      5.  
        Archiving workflow paths using Enterprise Vault
      6.  
        Using custom scripts to manage data
      7.  
        Pushing classification tags while archiving files into Enterprise Vault
      8. About adding tags to files, folders, and shares
        1.  
          Using the metadata framework for classification and remediation
    4. Managing permissions
      1.  
        About permission visibility
      2.  
        About recommending permission changes
      3. About recommending permissions changes for inactive users
        1.  
          Reviewing permission recommendations
        2.  
          Analyzing permission recommendations and applying changes
      4.  
        Making permission changes directly from Workspace
      5.  
        Removing permissions for Entitlement Review workflow paths
  5. Appendix A. Command Line Reference
    1.  
      mxcustodian

Using the Workspace filters

Data Insight provides extensive filters to sort through the data on the list view pages. You can use the filters to limit the scope of the data that is displayed on the list views of the Workspace tab. When filters are applied, the list views display the data that satisfies the selected filter criteria.

Figure: Workspace filters

Workspace filters

To use the filters

  1. Navigate to the list view of the tile for which you want to view analytics data.
  2. On the list view, click on the filter icon.

    The filter panel expands to show the available filters.

    To display only the frequently-used filters, click the Filter drop-down, and select the filters that you want to display.

  3. Click on any option and enter or select the values for the filter criteria.

    For example, you want to review all the open shares in your storage environment that have a risk score between 80 to 100. Navigate to the Shares list view and expand the filter panel. Select the Open check box; click Risk, and slide the score slider to select the range of the risk score.

    If a filter has many possible values, you can enter specific value in the search bar for that filter.

    For example, if there are multiple tags, you can enter that name of the tag that you are interested in the Tags filter. Or select the tag(s) to review the files that match the selected tags.

    Note:

    If you select more than one filter criteria, the conditions are evaluated using a logical AND operator. However, if you select multiple values for a single filter criteria, Data Insight evaluates the values using the logical OR operator.

  4. Click Apply.
  5. Click Reset to clear the filters.

Note that different filters are available for the Data Sources, Shares, DFS, Users, Groups, Watchlist, and Alerts list views.

Note:

An orange Filter icon indicates that a filter is applied to the displayed data set.

Filter

Description

Disabled

Displays disabled users, filers, shares, or equivalent data sources.

Deleted

Displays all users that have been deleted from the directory service.

This filter is only available on the Users list view.

Custodian

On the Dataand Shares list view, the filter displays all users who are assigned as custodians on paths.

On the Users list view, select Custodian check box to displays all paths on which a user is assigned as custodians.

Control Point

Displays the number of control points across configured shares or site collections.

On the Shares list view, select the Control point check box to display all paths in the file system hierarchy where the permissions differ from that of the parent folder or where the active users differ significantly from active users of its sibling folders.

User Name / Group Name

Displays analytics pertaining to the specific user or group.

Open Shares

This filter option is only available on the Data Sources and Shares list view. On the Data Sources list view, you can further refine the condition by selecting the size of the share and the number of files on the open shares.

Displays all open shares across all configured filers or on selected filers.

Path

For a share, enter the full or part of the path name, IP address, or URL as the case may be.

Risk

Use the slider to enter a value for the risk score. The threshold for the risk score for users and data sources is 50. A risk score more than 50 may be a cause for concern.

This filter condition is available for the Data Sources, Shares, and Users list view.

Device Type

Select the type of device for which you want to view analytics.

Activity

Use the slider to specify the number of accesses. For example, you can use the Activity filter with the Device Type condition to search for all NetApp filers that have accesses between 50000 and 700000.

On the Data list view, you can also select the type of activity for which you want to view analytics - None (No activity), Collaborative, or Single user.

Files

Use the slider to choose the number of sensitive, active, or inactive files in a content repository.

For example, you can use the Files criteria along with the Device Type filter to find the number of sensitive files on a Box share.

Size

Use the slider to choose the size of active and inactive files. The size criteria refers to the logical size of the files.

For example, you can choose to view analytics for active files that more than 2 GB in size.

Tags

Select one or more policies that are matched by files or folders being monitored by Data Insight.

For example, you can search for all files that violate the conditions specified by the US-PII policy and match the tags configured for that policy.

Domain

From the list of configured domains, select the domain for which you want analytics data. Click More to display all domains configured in Data Insight.

Or enter the name of a domain in the search bar to search for a specific domain.

Owner

Enter the name or part of a name of the owner of a file or folder.

The criteria for computing the owner of a data resource is configured in the Workspace Data Owner Policy. For more information, see the Veritas Data Insight Administrator's Guide.

Custom attributes

Select one or more values for all or any custom attribute.

The attributes that are displayed as filters depend on the custom attributes that are configured in Data Insight.