Veritas Data Insight User's Guide

Last Published:
Product(s): Data Insight (6.1.2)
  1. Section I. Introduction
    1. Introducing Veritas Data Insight
      1.  
        About Veritas Data Insight
      2.  
        About data custodian
      3.  
        About permissions
      4.  
        About SharePoint permissions
      5.  
        About Box permissions
      6.  
        About audit logs
      7.  
        About migrated domains
      8.  
        Applications for Symantec Data Loss Prevention
      9.  
        Content classification using Veritas Information Classifier
    2. Using the Veritas Data Insight Management Console
      1. About the Veritas Data Insight Management Console
        1.  
          Header
        2.  
          Tabs
        3.  
          Navigation pane
        4.  
          Content pane
      2.  
        Operation icons on the Management Console
      3.  
        Logging in to the Data Insight Management Console
      4.  
        Logging out of the Data Insight Management Console
      5.  
        Accessing online Help
  2. Section II. Data Insight Workspace
    1. Navigating the Workspace tab
      1.  
        About the Data Insight Workspace
      2.  
        Using the Workspace filters
      3.  
        Managing the Workspace
      4.  
        Searching the storage device hierarchy
      5.  
        Searching for users and user groups
    2. Analyzing data using the Workspace views
      1.  
        About information risk
      2.  
        Viewing summary of data sources
      3. Viewing shares summary
        1.  
          About control points
      4.  
        About the risk score for users
      5. About the Risk Dossier
        1.  
          Assessing risky users - an example scenario
      6.  
        Viewing user summary
      7.  
        Viewing details of Watchlist users
      8.  
        Viewing details of alert notifications
    3. Viewing access information for files and folders
      1.  
        About viewing file or folder summary
      2.  
        Viewing the overview of a data source
      3.  
        Managing data custodian for paths
      4.  
        Viewing the summary of user activity on a file or folder
      5. Viewing user activity on files or folders
        1.  
          Assigning an inferred data owner as custodian
        2.  
          Assigning an active user as custodian
        3.  
          Assigning a custodian from the Permissions tab
      6.  
        Viewing file and folder activity
      7.  
        Viewing CIFS permissions on folders
      8.  
        Viewing NFS permissions on folders
      9.  
        Viewing SharePoint permissions for folders
      10.  
        Viewing Box permissions on folders
      11.  
        Viewing audit logs for files and folders
      12. About visualizing collaboration on a share
        1.  
          Analyzing activity on collaborative shares
    4. Viewing access information for users and user groups
      1.  
        Viewing the overview of a user
      2.  
        Viewing the overview of a group
      3.  
        Managing custodian assignments for users
      4.  
        Viewing folder activity by users
      5.  
        Viewing CIFS permissions for users
      6.  
        Viewing CIFS permissions for user groups
      7.  
        Viewing NFS permissions for users and user groups
      8.  
        Viewing SharePoint permissions for users and user groups
      9.  
        Viewing Box permissions for users and user groups
      10.  
        Viewing audit logs for users
  3. Section III. Data Insight reports
    1. Using Data Insight reports
      1.  
        About Data Insight reports
      2.  
        How Data Insight reporting works
      3.  
        Creating a report
      4. About Data Insight security reports
        1.  
          Activity Details report
        2. Permissions reports
          1.  
            Inactive Users
          2.  
            Path Permissions
          3. Permissions Search report
            1.  
              Create Permissions Search report
          4.  
            About Permissions Query templates
          5. Creating a Permissions Query Template
            1.  
              Using the match-type criteria
          6.  
            Creating custom rules
          7. Permissions Query Template actions
            1.  
              Editing or deleting a Permissions Query Template
            2.  
              Copying a Permissions Query Template
            3.  
              About sharing a Permissions Query Template
          8.  
            Using Permissions Search report output to remediate permissions
          9.  
            Entitlement Review
          10.  
            User/Group Permissions
          11.  
            Group Change Impact Analysis
        3. Ownership Reports
          1.  
            Data Custodian Summary
          2.  
            Inferred Owner
          3.  
            Data Inventory Report
      5.  
        Create/Edit security report options
      6.  
        Data Insight limitations for Box permissions
      7. About Data Insight storage reports
        1.  
          Activity Summary reports
        2. Capacity reports
          1.  
            Filer Utilization
          2.  
            Filer Growth Trend
        3. Data Lifecycle reports
          1.  
            Inactive Data by File Group
          2.  
            Inactive Data by Owner
          3.  
            Data Aging
          4.  
            Inactive Folders
        4. Consumption Reports
          1.  
            Potential Duplicate Files
          2.  
            Consumption by Folders
          3.  
            Consumption by Department
          4.  
            Consumption by File Group
          5.  
            Consumption by Owner
          6.  
            Consumption by File Group and Owner
      8.  
        Create/Edit storage report options
      9. About Data Insight custom reports
        1.  
          About DQL query templates
        2.  
          Creating custom templates for DQL queries
        3.  
          Create/Edit DQL report options
      10.  
        Considerations for importing paths using a CSV file
    2. Managing reports
      1.  
        About managing Data Insight reports
      2. Viewing reports
        1.  
          About stale information in reports
      3.  
        Filtering a report
      4.  
        Editing a report
      5.  
        About sharing reports
      6.  
        Copying a report
      7.  
        Running a report
      8.  
        Viewing the progress of a report
      9.  
        Customizing a report output
      10.  
        Configuring a report to generate a truncated output
      11.  
        Sending a report by email
      12.  
        Automatically archiving reports
      13.  
        Canceling a report run
      14.  
        Deleting a report
      15.  
        Considerations for viewing reports
      16.  
        Organizing reports using labels
  4. Section IV. Remediation
    1. Configuring remediation workflows
      1.  
        About remediation workflows
      2.  
        Prerequisites for configuring remediation workflows
      3.  
        Configuring Self-Service Portal settings
      4.  
        About workflow templates
      5. Managing workflow templates
        1.  
          Create/Edit Entitlement Review workflow template
        2.  
          Create/Edit DLP Incident Remediation workflow template
        3.  
          Create/Edit Ownership Confirmation workflow template
        4.  
          Create/Edit Records Classification workflow template
      6. Creating a workflow using a template
        1. Create Entitlement Review workflow options
          1.  
            Customizing Entitlement Review report output
        2.  
          Create DLP Incident Remediation workflow options
        3.  
          Create Ownership Confirmation workflow options
        4.  
          Create Records Classification workflow options
      7. Managing workflows
        1.  
          Viewing details of submitted workflows
        2.  
          Extending the deadline of a workflow
        3.  
          Copying a workflow
        4.  
          Managing submitted workflows
        5.  
          Canceling or deleting a workflow
      8.  
        Auditing workflow paths
      9.  
        Monitoring the progress of a workflow
      10.  
        Remediating workflow paths
    2. Using the Self-Service Portal
      1. About the Self-Service Portal
        1.  
          About Entitlement Review
      2.  
        Logging in to the Self-Service Portal
      3.  
        Using the Self-Service Portal to review user entitlements
      4.  
        Using the Self-Service Portal to manage Data Loss Prevention (DLP) incidents
      5.  
        Using the Self-Service Portal to confirm ownership of resources
      6.  
        Using the Self-Service Portal to classify sensitive data
    3. Managing data
      1. About managing data using Enterprise Vault and custom scripts
        1.  
          About Retention categories
        2.  
          About post-processing actions
      2.  
        Managing data from the Shares list view
      3.  
        Managing inactive data from the Folder Activity tab
      4.  
        Managing inactive data by using a report
      5.  
        Archiving workflow paths using Enterprise Vault
      6.  
        Using custom scripts to manage data
      7.  
        Pushing classification tags while archiving files into Enterprise Vault
      8. About adding tags to files, folders, and shares
        1.  
          Using the metadata framework for classification and remediation
    4. Managing permissions
      1.  
        About permission visibility
      2.  
        About recommending permission changes
      3. About recommending permissions changes for inactive users
        1.  
          Reviewing permission recommendations
        2.  
          Analyzing permission recommendations and applying changes
      4.  
        Making permission changes directly from Workspace
      5.  
        Removing permissions for Entitlement Review workflow paths
  5. Appendix A. Command Line Reference
    1.  
      mxcustodian

About the Risk Dossier

The Risk Dossier for a user provides the next level of detail into the user risk score. The Risk Dossier displays visualizations that provide more insight into the factors that contribute to the risk score and explains why a user is considered risky. The Risk Dossier also helps you investigate reasons for a spike in the risk score in the past by answering questions such as:

  • What is the historical risk landscape for a user?

  • Why is risk score high for a user on a given date?

  • What contributes to the risk score?

  • How can we mitigate the risk?

You can navigate to the user Risk Dossier from any of the following pages in the UI.

  • On the Users tile of the Data Insight Dashboard, click the graph icon.

  • Click Workspace > Users. On the Users list page, select a user and click Expand Profile, and then click Risk Dossier.

  • Alternately, on the Users list page, click the graph icon in the Summary panel to maximize the risk dossier view. Close the view to return to the previous page.

Note:

The Risk Dossier view is visible only to the users assigned the Server Administrator role.

Risk Dossier visualizations

The Risk Dossier tab provides the following visualizations for a user's risk score:

  • The risk history graph shows the risk score of a user for the configured analytics period. The graph gives you an idea of how the risk score for a user is moving. A sudden spike in the risk score may warrant an investigation. You can click on a date on the risk history graph to know the composition of the risk score for the Access, Anomaly, and Alerts factors as of that date.

    See About the risk score for users.

  • Cards that display the breakup of a user's risk score on a date selected in the Risk History graph, with details of the individual scores of the different factors that constitute the risk score (Access, Anomaly, and Alerts). The cards also let you compare the risk score factors for a historical date with the factors as of the current date.

    Click on any of the three risk score factors, namely Access, Anomaly, and Alerts to get to further details about the nature of the risk score factor contributing to the score on that day.

  • The user risk factor (Access) displays the potential for damage from a high-risk user. The view provides a bar graph that displays the top accessible and sensitive shares and compares the number of accessible files to total files. The graph also compares the access information from the current date with that on a historical date. Additionally, it provides the count of accessible shares.

    To further assess the permissions on a share, click on the share names in the Accessible Shares or the Sensitive Shares graphs to navigate to the permissions view for that user for the share.

    The graphs provide the following insight into what is at stake if a user were to become malicious:

    • The Accessible Shares graph shows the top five shares based on the number of accessible files by the user in a particular share. This graph gives you an idea of the amount of data that a high risk user has access to. You can use the information to protect against any malicious activity that the user may perform. You can also perform a comparative analysis of the number of files accessible to the user during the current date and a historical date on the risk history graph.

    • The Sensitive Shares graph gives you a comparative analysis of the total sensitive files on the top 5 sensitive shares and the number of sensitive files that the user can access on those shares.

  • Data Insight takes into account the deviation in the activity pattern (anomaly) observed in the last 15 days for calculating the risk score for a user. The anomaly spectrum displays the deviation (over average of the last 180 days) for each counter that Data Insight monitors - read, write, create, delete, security, and file count.

    Click on a day in the Risk History graph and the anomaly spectrum is calculated for the last 15 days from the current day.

  • Click on the Alerts card to review the alerts raised against the selected user. The Alerts Overview graph displays the frequency of alerts based on severity (low, medium, high) for the last 15 days from the date selected on the Risk History graph.

    The list of policies that the user has violated along with the policy configuration details are also displayed below the graph.

You can choose to disable the user risk dossier computation which provides the data for the Risk Dossier graphs. Run the following command on the Management Server to set a global configuration property:

configdb -O -J disable_dossier -j true

The Risk Dossier database is deleted by default after 3 months. The purging period can be changed by running the following command on the Management Server.

configdb  - O  - J purge_dossier_months  - j <number in months>

For example, to set the purging period to 3 months, run the command:

configdb  - O  - J purge_dossier_months  - j 6 

Note:

If you configure a higher purge period, you will need to provision more storage on the Management Server for storing the dossier data.