Arctera Insight Information Governance Administrator's Guide
- Section I. Getting started
- Introduction to Arctera Insight Information Governance administration
- Configuring Information Governance global settings
- About scanning and event monitoring
- About filtering certain accounts, IP addresses, and paths
- About archiving data
- About Information Governance integration with Data Loss Prevention (DLP)
- Configuring advanced analytics
- About open shares
- About user risk score
- About bulk assignment of custodians
- Configuring Metadata Framework
- Section II. Configuring Information Governance
- Configuring Information Governance product users
- Configuring Information Governance product servers
- About node templates
- About automated alerts for patches and upgrades
- Configuring saved credentials
- Configuring directory service domains
- Adding a directory service domain to Information Governance
- Configuring containers
- Server Pools
- Section III. Configuring native file systems in Information Governance
- Configuring clustered NetApp file server monitoring
- About configuring secure communication between Information Governance and cluster-mode NetApp devices
- Configuring EMC Celerra or VNX monitoring
- Configuring EMC Isilon monitoring
- Configuring EMC Unity VSA file servers
- Configuring Hitachi NAS file server monitoring
- Configuring Windows File Server monitoring
- Configuring Arctera File System (VxFS) file server monitoring
- Configuring monitoring of a generic device
- Managing file servers
- Adding filers
- Adding shares
- Renaming storage devices
- Configuring clustered NetApp file server monitoring
- Section IV. Configuring SharePoint data sources
- Configuring monitoring of SharePoint web applications
- About the Information Governance web service for SharePoint
- Adding web applications
- Adding site collections
- Configuring monitoring of SharePoint Online accounts
- About SharePoint Online account monitoring
- Adding site collections to SharePoint Online accounts
- Configuring monitoring of SharePoint web applications
- Section V. Configuring cloud data sources
- Configuring monitoring of Box accounts
- Configuring OneDrive account monitoring
- Configuring Azure Netapp Files Device
- Managing cloud sources
- Section VI. Configuring Object Storage Sources
- Section VII. Health and monitoring
- Section VIII. Alerts and policies
- Configuring policies
- Managing policies
- Configuring policies
- Section IX. Remediation
- Configuring remediation settings
- Section X. Reference
- Appendix A. Information Governance best practices
- Appendix B. Migrating Information Governance components
- Appendix C. Backing up and restoring data
- Appendix D. Arctera Information Governance health checks
- About Information Governance health checks
- About Information Governance health checks
- Appendix E. Command File Reference
- Appendix F. Arctera Information Governance jobs
- Appendix G. Troubleshooting
- Troubleshooting FPolicy issues on NetApp devices
Create Real-time Sensitive Data Activity policy options
Use this dialog to create a new Real-time Sensitive Data Activity policy. Options selected in the respective tabs are displayed in the Summary panel on the right of the page.
Table: Create Real-time Sensitive Data Activity policy options
Option | Description |
---|---|
Policy Information | Enter the following information:
Select the check box to enforce the policy.The policy is not evaluated if the check box is not selected. |
Configure Policy | Select Activity - Select the type of accesses to be monitored on the selected data set. Select the radio button to monitor only the high-level access events that Information Governance maps from the detailed file system and SharePoint access events.Select the radio button to monitor specific file system and SharePoint access events.From the DLP Policies violated drop-down list, select a set of DLP policies to be considered for alerting. From the VIC Tags violated drop-down list, select appropriate tags to be considered for alerting. |
User Selection | Use this tab to directly select the users. Do the following:
|
User Selection Using Attributes | You can also select users by using the attribute query. Do the following:
You can add multiple conditions. For evaluating a query, Information Governance uses the logical AND operation between multiple conditions. Note: If you select the email ID attribute, the value of the email ID must exactly match the one configured in Active Directory. Since the email ID is case-sensitive, you must maintain the correct case while configuring it. Any deviation from the exact value will cause the policy to fail. |
User Exclusion | Select the users you want to exclude from the policy. Any activity performed by these users will be ignored and will not be used to trigger an alert. Use this tab to directly select the excluded users. Do the following:
|
User Exclusion Using Attributes | You can also exclude users by using the attribute query. Do the following:
You can add multiple conditions. For evaluating a query, Information Governance uses the logical AND operation between multiple conditions. |
Notification | Enter one or more specific email addresses for people to whom you want to send the alerts that are generated for the policy. |