Veritas Data Insight User's Guide
- Section I. Introduction
- Section II. Data Insight Workspace
- Navigating the Workspace tab
- Analyzing data using the Workspace views
- Viewing access information for files and folders
- About viewing file or folder summary
- Viewing the overview of a data source
- Managing data custodian for paths
- Viewing user activity on files or folders
- Viewing file and folder activity
- Viewing CIFS permissions on folders
- Viewing NFS permissions on folders
- Viewing SharePoint permissions for folders
- Viewing OneDrive permissions for folders
- Viewing Box permissions on folders
- Viewing audit logs for files and folders
- About visualizing collaboration on a share
- Viewing access information for users and user groups
- Viewing the overview of a user
- Viewing the overview of a group
- Managing custodian assignments for users
- Viewing folder activity by users
- Viewing CIFS permissions for users
- Viewing CIFS permissions for user groups
- Viewing NFS permissions for users and user groups
- Viewing SharePoint permissions for users and user groups
- Viewing Box permissions for users and user groups
- Viewing audit logs for users
- Section III. Data Insight reports
- Using Data Insight reports
- About Data Insight reports
- How Data Insight reporting works
- Creating a report
- About Data Insight security reports
- Activity Details report
- Permissions reports
- Inactive Users
- Path Permissions
- Permissions Search report
- About Permissions Query templates
- Creating a Permissions Query Template
- Creating custom rules
- Permissions Query Template actions
- Using Permissions Search report output to remediate permissions
- Entitlement Review
- User/Group Permissions
- Group Change Impact Analysis
- Ownership Reports
- Create/Edit security report options
- About Data Insight storage reports
- Create/Edit storage report options
- About Data Insight custom reports
- Considerations for importing paths using a CSV file
- Managing reports
- About managing Data Insight reports
- Viewing reports
- Filtering a report
- Editing a report
- About sharing reports
- Copying a report
- Running a report
- Viewing the progress of a report
- Customizing a report output
- Configuring a report to generate a truncated output
- Sending a report by email
- Automatically archiving reports
- Canceling a report run
- Deleting a report
- Considerations for viewing reports
- Organizing reports using labels
- Using Data Insight reports
- Section IV. Remediation
- Configuring remediation workflows
- About remediation workflows
- Prerequisites for configuring remediation workflows
- Configuring Self-Service Portal settings
- About workflow templates
- Managing workflow templates
- Creating a workflow using a template
- Managing workflows
- Auditing workflow paths
- Monitoring the progress of a workflow
- Remediating workflow paths
- Using the Self-Service Portal
- About the Self-Service Portal
- Logging in to the Self-Service Portal
- Using the Self-Service Portal to review user entitlements
- Using the Self-Service Portal to manage Data Loss Prevention (DLP) incidents
- Using the Self-Service Portal to confirm ownership of resources
- Using the Self-Service Portal to classify sensitive data
- Managing data
- About managing data using Enterprise Vault and custom scripts
- Managing data from the Shares list view
- Managing inactive data from the Folder Activity tab
- Managing inactive data by using a report
- Archiving workflow paths using Enterprise Vault
- Using custom scripts to manage data
- Pushing classification tags while archiving files into Enterprise Vault
- About adding tags to devices, files, folders, and shares
- Managing permissions
- Configuring remediation workflows
- Appendix A. Command Line Reference
- Index
About remediation workflows
In large storage environments, it can become difficult to assign the responsibility of remediating data resources to data owners and custodians. Security and storage administrators have to manually inform data owners about issues with the resources that they own. Also, it can be tedious to track remediation actions on such resources.
Remediation workflows provide an easy way to fan out remediation tasks among configured custodians and data owners. The custodians are responsible for the data resources and can take a decision about the best way to remediate them. To understand how custodians are assigned in Data Insight, refer to the Veritas Data Insight User's Guide.
You can use workflows to define a process to distribute remediation tasks to custodians. You can create the following workflows for different remediation tasks:
Entitlement Review
Review the user permissions on the folders that the custodians are responsible for and attest the permissions or suggest changes. The entitlement information for this workflow is generated by the Entitlement Review report.
You can send the change request to a ticketing system or Identity and Access Management (IAM) tool, or use custom scripts to remediate the permissions.
Data Loss Prevention (DLP) Incident Remediation
View policy violations and take action on the files that violate policies. The policy information is pulled into Data Insight from Symantec Data Loss Prevention (DLP). The actions are Smart Response rules defined by DLP administrators. DLP uses the Smart Response rules to remediate the resources that violate configured DLP policies.
Data Insight uses two DLP Web services for incident remediation - the Response Rules Listing Service and the Response Rule Execution Service. The Response Rule Listing Service provides a list of available response rules in DLP, such as delete or quarantine, for a given incident. The Response Rule Execution Service takes the response rule requests submitted by users from the Self-Service Portal and executes them in DLP. By default, the Response Rule Execution Service is disabled. You must enable the service to allow the portal users to remediate incidents.
Note:
Data Insight does not let you create an incident remediation workflow for sensitive paths that are imported into Data Insight using a CSV file. This is because the workflow requires data from DLP, such as Smart Response rules and incident IDs and severity information for paths that violate a policy.
For more information about DLP incidents, see the Symantec Data Loss Prevention Administrator's Guide.
Ownership Confirmation
Confirm the ownership of files and folders in your storage environment.
Records Classification
Classify the sensitive files that must be retained for a legally mandated period. The workflow helps you classify files based on their business value and manage the life cycle of sensitive documents by applying data management rules to the classified data.
You can choose to archive the files that are marked as record and apply retention categories that define how long the files must be stored before being deleted. The files that are marked as record are retained based on the file classification policies that they violate.
You can use the workflow to trigger automatic actions only if your organization uses Enterprise Vault™ to archive data and if Enterprise Vault is configured in Data Insight.
Note:
Creating workflows for the Documentum data sources is not supported.
Depending on the type of workflow, the custodian may perform the following actions:
Workflow | Action |
|---|---|
Entitlement Review | Review the user permissions on folders that the custodian owns and automatically trigger a permission remediation workflow to execute the changes. To trigger a permission remediation action, you must first configure the permission remediation settings. For information about configuring permission remediation settings, see the Veritas Data Insight Administrator's Guide. |
DLP Incident Remediation | Choose the configured remediation actions, and submit the same for execution by the DLP Enforce Server. |
Ownership Confirmation | Confirm the ownership of resources. Once the custodians confirm or deny the ownership, and the workflow is complete, the status summary is displayed in the Data Insight Management Console. A Data Insight administrator may review the status and take further actions based on it. |
Records Classification | Mark a file as Record or No record. When the custodians submit their response and a file marked as Record, Data Insight automatically sends a request to Enterprise Vault™ to archive the document. and apply configured post-processing actions on the document if the following conditions are fulfilled:
|
Once you submit a workflow from the Data Insight console, the custodians receive an email notification with a link to the Self-Service Portal. They can log in to the portal, choose the necessary remediation actions, and submit the same for execution by the DLP Enforce Server, Enterprise Vault server, or the Data Insight Management Server, depending on the type of workflow.
Note:
If you do not have a valid portal license or if your base or portal license has expired, Data Insight disables the option to create workflows.