Important Update: Cohesity Products Documentation
All Cohesity product documentation are now managed via the Cohesity Docs Portal: https://docs.cohesity.com/HomePage/Content/home.htm. Some documentation available here may not reflect the latest information or may no longer be accessible.
Arctera Insight Information Governance User's Guide
- Section I. Introduction
- Information Governance Dashboard
- Information Governance Workspace
- Section II. Information Governance reports
- Using Information Governance reports
- About Information Governance reports
- How Information Governance reporting works
- Creating a report
- About Information Governance security reports
- Activity Details report
- Permissions reports
- Inactive Users
- Path Permissions
- Permissions Search report
- About Permissions Query templates
- Creating a Permissions Query Template
- Creating custom rules
- Permissions Query Template actions
- Using Permissions Search report output to remediate permissions
- Entitlement Review
- User/Group Permissions
- Group Change Impact Analysis
- Ownership Reports
- Create/Edit security report options
- About Information Governance storage reports
- Create/Edit storage report options
- About Information Governance custom reports
- Considerations for importing paths using a CSV file
- Managing reports
- About managing Information Governance reports
- Viewing reports
- Filtering a report
- Editing a report
- About sharing reports
- Copying a report
- Running a report
- Viewing the progress of a report
- Customizing a report output
- Configuring a report to generate a truncated output
- Sending a report by email
- How does number of records field work differently from the truncate output records field?
- Automatically archiving reports
- Canceling a report run
- Deleting a report
- Considerations for viewing reports
- Organizing reports using labels
- Using Information Governance reports
- Section III. Remediation
- Configuring remediation workflows
- About remediation workflows
- Prerequisites for configuring remediation workflows
- Configuring Self-Service Portal settings
- About workflow templates
- Managing workflow templates
- Creating a workflow using a template
- Managing workflows
- Auditing workflow paths
- Monitoring the progress of a workflow
- Remediating workflow paths
- Using the Self-Service Portal
- About the Self-Service Portal
- Logging in to the Self-Service Portal
- Using the Self-Service Portal to review user entitlements
- Using the Self-Service Portal to manage Data Loss Prevention (DLP) incidents
- Using the Self-Service Portal to confirm ownership of resources
- Using the Self-Service Portal to classify sensitive data
- Managing data
- About managing data using Arctera Enterprise Vault and custom scripts
- Managing data from the Shares list view
- Managing inactive data from the Folder Activity tab
- Managing inactive data by using a report
- Archiving workflow paths using Arctera Enterprise Vault
- Using custom scripts to manage data
- Pushing classification tags while archiving files into Arctera Enterprise Vault
- About adding tags to devices, files, folders, and shares
- Managing permissions
- Configuring remediation workflows
- Appendix A. Command Line Reference
- Index
Users
The Users option provides a comprehensive overview of individual user profiles and their associated data risks. The table includes the following columns:
Name: Displays the name or identifier of the specific user within the monitored environment.
Status: Indicates the current account status or monitoring state for the user.
Manager: Identifies the assigned supervisor or manager for the user, as synchronized from the directory services.
Active Shares: Tracks the number of file shares where the user has demonstrated recent activity.
Accessible Shares: Lists the total number of network shares the user has been granted permission to access.
Activity: Quantifies the volume of actions (such as read, write, or delete) performed by the user across the environment.
Files: Shows the total count of files owned by or attributed to the specific user.
Sensitive Files: Flags the number of files accessible by the user that contain potentially sensitive information or restricted data.
Risk: Provides a calculated risk score or indicator based on the user's access to sensitive data and their overall activity patterns.
User Workspace Actions
Administrators can manage the user list using the tools located above the table:
User Search Capabilities: In the ownership views, you can utilize the search bar to quickly identify specific individuals. The system performs this lookup based on username, providing an efficient way to isolate the storage footprint or activity associated with a particular member of the organization.
Refresh: Click this icon to update user activity and risk metrics with the most current scan results.
Download: Click this icon to export the current user table for security audits or HR reporting.
For granular info, click More Details. This pane provides a deeper look into user metadata, including security identifiers (SID), account status, and detailed permission inheritance that may not be visible in the main table view. It serves as a quick-reference tool for verifying user attributes without leaving the Workspace.
Note:
Cross-referencing to other sections is not supported within the More Details pane. Please use the main table of contents or search functionality to navigate to related documentation topics.