Arctera Insight Information Governance Administrator's Guide

Last Published:
Product(s): Data Insight (7.2)
Platform: Windows
  1. Section I. Getting started
    1. Introduction to Arctera Insight Information Governance administration
      1. About Arctera Insight Information Governance administration
        1.  
          Operation icons on the Management Console
        2.  
          Information Governance administration tasks
    2. Configuring Information Governance global settings
      1.  
        About Information Governance licensing
      2.  
        SQLite WAL mode
      3.  
        Configuring SMTP server settings
      4. About scanning and event monitoring
        1. Configuring scanning and event monitoring
          1.  
            Considerations for running a parallel scan
      5.  
        Monitoring Indexer Node Storage Utilization
      6. About filtering certain accounts, IP addresses, and paths
        1.  
          About exclude rules for access events
        2.  
          About exclude rules for Scanner
        3. Adding exclude rules to Information Governance
          1.  
            Add/Edit Exclude rule for access events options
          2.  
            Add/Edit Exclude rule for Scanner options
      7. About archiving data
        1.  
          About purging data
        2.  
          Configuring data retention settings
        3.  
          Parameterized Purging of access data using Data Retention
        4.  
          Purging indexes by date/whitespace for deleted files
      8. About Information Governance integration with Data Loss Prevention (DLP)
        1.  
          About configuring Information Governance to integrate with Data Loss Prevention (DLP)
        2.  
          Configuring Data Loss Prevention settings
        3.  
          Importing SSL certificate from the DLP Enforce Server to Information Governance Management Server
        4.  
          About Data Loss Prevention (DLP) integration with Information Governance
      9.  
        Importing sensitive files information through CSV
      10. Configuring advanced analytics
        1.  
          Choosing custom attributes for advanced analytics
      11. About open shares
        1.  
          Configuring an open share policy
      12. About user risk score
        1.  
          User risk weight configuration
      13.  
        Configuring file groups
      14.  
        Configuring Workspace data owner policy
      15.  
        Configuring Management Console settings
      16. About bulk assignment of custodians
        1.  
          Assigning custodians in bulk using a CSV file
        2.  
          Assigning custodians based on data ownership
      17.  
        Configuring Watchlist settings
      18. Configuring Metadata Framework
        1.  
          Using the metadata framework for classification and remediation
      19.  
        Proof of concept
  2. Section II. Configuring Information Governance
    1. Configuring Information Governance product users
      1.  
        About Information Governance users and roles
      2.  
        Reviewing current users and privileges
      3. Adding a user
        1.  
          Add or edit Information Governance user options
      4.  
        Editing users
      5.  
        Deleting users
      6.  
        Configuring authorization for Data Loss Prevention users
      7.  
        Configuring single sign-on (SSO) using security assertion markup language (SAML)
      8.  
        Disabling single sign-on (SSO)
    2. Configuring Information Governance product servers
      1.  
        About Information Governance product servers
      2.  
        Adding a new Information Governance server
      3.  
        Managing Information Governance product servers
      4.  
        Viewing Information Governance server details
      5. About node templates
        1.  
          Managing node templates
        2.  
          Adding or editing node templates
      6.  
        Adding Portal role to a Information Governance server
      7.  
        Adding Classification Server role to a Information Governance server
      8.  
        Assigning Classification Server to a Collector
      9.  
        Associating a Classification Server pool to a Collector
      10.  
        Viewing in-progress scans
      11.  
        Configuring Information Governance services
      12.  
        Configuring advanced settings
      13.  
        Monitoring Information Governance jobs
      14.  
        Rotating the encryption keys
      15.  
        Viewing Information Governance server statistics
      16. About automated alerts for patches and upgrades
        1.  
          Viewing and installing recommended upgrades and patches
      17.  
        Deploying upgrades and patches remotely
      18.  
        Using the Upload Manager utility
      19.  
        About migrating storage devices across Indexers
      20.  
        Viewing the status of a remote installation
    3. Configuring saved credentials
      1. About saved credentials
        1.  
          Managing saved credentials
      2.  
        Handling changes in account password
      3.  
        Information Governance Hash Utility
    4. Configuring directory service domains
      1.  
        About directory domain scans
      2. Adding a directory service domain to Information Governance
        1.  
          Add/Edit Active Directory options
        2.  
          Add/Edit LDAP domain options
        3.  
          Add/Edit NIS domain options
        4.  
          Add/Edit NIS+ domain options
        5. Add/Edit Azure active directory service
          1.  
            Prerequisites for configuring Azure AD
          2.  
            Registering Information Governance with Microsoft to scan Azure AD
          3.  
            Configuring application without user impersonation for Microsoft 365
          4.  
            Creating an application in the Microsoft Azure portal
      3.  
        Managing directory service domains
      4.  
        Fetching users and groups data from NIS+ scanner
      5.  
        Configuring attributes for advanced analytics
      6.  
        Deleting directory service domains
      7.  
        Scheduling scans
      8.  
        Configuring business unit mappings
      9.  
        Importing additional attributes for users and user groups
    5. Configuring containers
      1.  
        About containers
      2. Adding containers
        1.  
          Add new container/Edit container options
      3.  
        Managing containers
    6. Server Pools
      1.  
        About Server Pools
      2.  
        Adding Server Pools
      3.  
        Managing Server Pools
  3. Section III. Configuring native file systems in Information Governance
    1. Configuring clustered NetApp file server monitoring
      1.  
        About configuring a clustered NetApp file server
      2.  
        About configuring FPolicy in Cluster-Mode
      3.  
        Pre-requisites for configuring clustered NetApp file servers
      4.  
        Credentials required for configuring a clustered NetApp file server
      5.  
        Preparing a non-administrator local user on the clustered NetApp filer
      6.  
        Preparing a non-administrator domain user on a NetApp cluster for Information Governance
      7.  
        Persistent Store
      8.  
        Preparing Information Governance for FPolicy in NetApp Cluster-Mode
      9.  
        Preparing the ONTAP cluster for FPolicy
      10. About configuring secure communication between Information Governance and cluster-mode NetApp devices
        1.  
          Generating SSL certificates for NetApp cluster-mode authentication
        2.  
          Preparing the NetApp cluster for SSL authentication
      11.  
        Enabling export of NFS shares on a NetApp Cluster-Mode file server
      12.  
        Enabling SSL support for Cluster Mode NetApp auditing
    2. Configuring EMC Celerra or VNX monitoring
      1. About configuring EMC Celerra or VNX filers
        1.  
          About EMC Common Event Enabler (CEE)
        2.  
          Preparing the EMC filer for CEPA
        3.  
          Preparing Information Governance to receive event notification
      2.  
        Credentials required for configuring EMC Celerra filers
    3. Configuring EMC Isilon monitoring
      1.  
        About configuring EMC Isilon filers
      2.  
        Prerequisites for configuration of Isilon or Unity VSA file server monitoring
      3.  
        Credentials required for configuring an EMC Isilon cluster
      4.  
        Configuring audit settings on EMC Isilon cluster using OneFS GUI console
      5.  
        Configuring audit settings on EMC Isilon cluster using the OneFS CLI
      6.  
        Configuring Isilon audit settings for performance improvement
      7.  
        Preparing Arctera Insight Information Governance to receive event notifications from an EMC Isilon or Unity VSA cluster
      8.  
        Creating a non-administrator user for an EMC Isilon cluster
      9.  
        Utilizing access zone's SmartConnect Zone/Alias mappings
      10.  
        Purging the audit logs in an Isilon filer
    4. Configuring EMC Unity VSA file servers
      1.  
        About configuring Dell EMC Unity storage platform
      2.  
        Credentials required for configuring an EMC Unity VSA file server
      3.  
        Configuring audit settings on EMC Unity cluster using Unisphere VSA Unity console
    5. Configuring Hitachi NAS file server monitoring
      1.  
        About configuring Hitachi NAS
      2.  
        Credentials required for configuring a Hitachi NAS EVS
      3.  
        Creating a domain user on a Hitachi NAS file server for Information Governance
      4.  
        Preparing a Hitachi NAS file server for file system auditing
      5.  
        Advanced configuration parameters for Hitachi NAS
    6. Configuring Windows File Server monitoring
      1.  
        About configuring Windows file server monitoring
      2.  
        Credentials required for configuring Windows File Servers
      3.  
        Using the installcli.exe utility to configure multiple Windows file servers
      4.  
        Upgrading the Windows File Server agent
    7. Configuring Arctera File System (VxFS) file server monitoring
      1.  
        About configuring Arctera File System (AxFS) file servers
      2.  
        Credentials required for configuring Arctera File System (AxFS) servers
      3.  
        Enabling export of UNIX/Linux NFS shares on AxFS filers
    8. Configuring monitoring of a generic device
      1.  
        About configuring a generic device
      2.  
        Credentials required for scanning a generic device
    9. Managing file servers
      1.  
        About configuring filers
      2.  
        Viewing configured filers
      3. Adding filers
        1.  
          Add/Edit NetApp cluster file server options
        2.  
          Add/Edit EMC Celerra filer options
        3.  
          Add/Edit EMC Isilon file server options
        4.  
          Add/Edit EMC Unity VSA file server options
        5.  
          Add/Edit Windows File Server options
        6.  
          Add/Edit Arctera File System server options
        7.  
          Add/Edit a generic storage device options
        8.  
          Add/Edit Hitachi NAS file server options
      4.  
        Custom schedule options
      5.  
        Editing filer configuration
      6.  
        Deleting filers
      7.  
        Viewing performance statistics for file servers
      8.  
        About disabled shares
      9. Adding shares
        1.  
          Add New Share/Edit Share options
      10.  
        Managing shares
      11.  
        Editing share configuration
      12.  
        Deleting shares
      13.  
        About configuring a DFS target
      14.  
        Adding a configuration attribute for devices
      15.  
        Configuring a DFS target
      16.  
        About the DFS utility
      17.  
        Running the DFS utility
      18.  
        Importing DFS mapping
    10. Renaming storage devices
      1.  
        About renaming a storage device
      2.  
        Viewing the device rename status
      3.  
        Considerations for renaming a storage device
  4. Section IV. Configuring SharePoint data sources
    1. Configuring monitoring of SharePoint web applications
      1.  
        About SharePoint server monitoring
      2.  
        Credentials required for configuring SharePoint servers
      3.  
        Configuring a web application policy
      4. About the Information Governance web service for SharePoint
        1.  
          Installing the Information Governance web service for SharePoint
      5.  
        Viewing configured SharePoint data sources
      6. Adding web applications
        1.  
          Add/Edit web application options
      7.  
        Editing web applications
      8.  
        Deleting web applications
      9. Adding site collections
        1.  
          Add/Edit site collection options
      10.  
        Managing site collections
      11.  
        Removing a configured web application
    2. Configuring monitoring of SharePoint Online accounts
      1. About SharePoint Online account monitoring
        1.  
          Prerequisites for configuring SharePoint Online account
      2.  
        Configuring user with minimum privileges in Microsoft 365
      3.  
        Creating an application in the Microsoft Azure portal
      4.  
        Configuring application without user impersonation for Microsoft 365
      5.  
        Adding SharePoint Online accounts
      6.  
        Managing a SharePoint Online account
      7. Adding site collections to SharePoint Online accounts
        1.  
          Add/Edit site collection options
      8.  
        Managing site collections
  5. Section V. Configuring cloud data sources
    1. Configuring monitoring of Box accounts
      1.  
        About configuring Box monitoring
      2.  
        Using a co-admin account to monitor Box resources
      3. Configuring monitoring of cloud sources in Information Governance
        1.  
          Add/Edit Box account
      4.  
        Configuring Box cloud resources through proxy server
      5.  
        Information Governance limitations for Box permissions
    2. Configuring OneDrive account monitoring
      1.  
        About configuring OneDrive monitoring
      2.  
        Configuring user with minimum privileges in Microsoft 365
      3.  
        Creating an application in the Microsoft Azure portal
      4.  
        Configuring application without user impersonation for Microsoft 365
      5.  
        Add/Edit OneDrive account
      6. Adding OneDrive cloud accounts
        1.  
          Add/edit OneDrive user accounts
    3. Configuring Azure Netapp Files Device
      1.  
        About Azure Netapp Files
      2.  
        Configuring Azure Netapp Files Device
    4. Managing cloud sources
      1.  
        Viewing configured cloud sources
      2.  
        Managing cloud sources
  6. Section VI. Configuring Object Storage Sources
    1. Amazon S3
      1.  
        About Amazon Simple Storage Service (Amazon S3)
      2.  
        Configuring Amazon S3 account monitoring
      3.  
        Configuring Audit Events in AWS
      4.  
        Creating an Athena table
      5.  
        Adding Amazon S3 account
      6.  
        Limitations for Amazon S3 in Information Governance
      7. Managing Amazon S3 data source
        1.  
          Monitored Buckets
        2.  
          Classification
  7. Section VII. Health and monitoring
    1. Using Arctera Insight Information Governance dashboards
      1.  
        Viewing the system health overview
      2.  
        Viewing the scanning overview
      3.  
        Viewing the scan status of storage devices
      4.  
        Viewing the scan history of storage devices
    2. Monitoring Information Governance
      1.  
        Viewing events
      2.  
        About high availability notifications
      3.  
        Monitoring the performance of Information Governance servers
      4.  
        Configuring email notifications
      5.  
        Enabling Windows event logging
      6.  
        Viewing scan errors
  8. Section VIII. Alerts and policies
    1. Configuring policies
      1.  
        About Information Governance policies
      2. Managing policies
        1.  
          Create Data Activity Trigger policy options
        2.  
          Create User Activity Deviation policy options
        3.  
          Create Real-time Data Activity Policy options
        4.  
          Create Real-time Permitted User-based Activity Policy options
        5.  
          Create Real-time Restricted User-based Activity Policy options
        6.  
          Create Real-time Sensitive Data Activity policy options
      3.  
        Managing alerts
  9. Section IX. Remediation
    1. Configuring remediation settings
      1. About configuring permission remediation
        1.  
          Managing and configuring permission remediation
        2.  
          Configuring exclusions for permission recommendation
      2.  
        About managing data
      3.  
        About deleting files
      4. About configuring archive options for Enterprise Vault
        1.  
          Adding new Enterprise Vault servers
        2.  
          Managing Enterprise Vault servers
        3.  
          Mapping file server host names
      5. Configuring Microsoft Purview Information Protection (MIP) Label
        1.  
          Removing MIP Label
      6.  
        Using custom scripts to manage data
      7.  
        Viewing and managing the status of an operation
  10. Section X. Reference
    1. Appendix A.  Information Governance best practices
      1.  
        Understanding Information Governance best practices
    2. Appendix B.  Migrating Information Governance components
      1.  
        Migrating Information Governance components
    3. Appendix C. Backing up and restoring data
      1.  
        Selecting the backup and restore order
      2.  
        Backing up and restoring the Information Governance Management Server
      3.  
        Backing up and restoring the Indexer node
      4.  
        Understanding Information Governance best practices
    4. Appendix D. Arctera Information Governance health checks
      1. About Information Governance health checks
        1.  
          Services checks
        2.  
          Deployment details checks
        3.  
          Generic checks
        4.  
          Information Governance Management Server checks
        5.  
          Information Governance Indexer checks
        6.  
          Information Governance Collector checks
        7.  
          Information Governance Windows File Server checks
        8.  
          Information Governance SharePoint checks
        9.  
          Classification server health checks
        10.  
          Information Governance self service portal server health checks
    5. Appendix E. Command File Reference
      1.  
        fg.exe
      2.  
        indexcli.exe
      3.  
        reportcli.exe
      4.  
        scancli.exe
      5.  
        installcli.exe
    6. Appendix F. Arctera Information Governance jobs
      1.  
        Scheduled Information Governance jobs
    7. Appendix G. Troubleshooting
      1.  
        About general troubleshooting procedures
      2.  
        About the Health Audit report
      3.  
        Location of Information Governance logs
      4.  
        Downloading Information Governance logs
      5.  
        Migrating the data directory to a new location
      6. Troubleshooting FPolicy issues on NetApp devices
        1.  
          Viewing FPolicy-related errors and warnings
        2.  
          Resolving FPolicy connection issues
      7.  
        Troubleshooting EMC Celera or VNX configuration issues
      8.  
        Troubleshooting EMC Isilon configuration issues
      9.  
        Troubleshooting SharePoint configuration issues
      10.  
        Troubleshooting Hitachi NAS configuration issues
      11.  
        Troubleshooting installation of Tesseract software
      12.  
        Troubleshooting RHEL 9 upgrade issue
      13.  
        Troubleshooting CyberArk Password Manager Configuration Issues

Add/Edit NetApp cluster file server options

Use this dialog box to add a new NetApp filer in cluster mode to Arctera Insight Information Governance or to edit the configuration of an existing filer.

Table: Add/Edit NetApp cluster file server options

Field

Description

Cluster Management Host

Enter the host name or IP address NetApp Cluster Management host interface that is used to manage the nodes in the cluster.

Collector

Use Collector Pool for Scanning

Do the following:

  1. Click Select Collector.

  2. The Select Collector pop-up displays the configured Windows and Linux Collectors that are available for selection.

  3. Review the performance parameters such as disk and CPU utilization and backlog of files accumulating on the configured nodes. You can also view the number of devices, shares or site collections assigned to each configured node. It is recommended that you assign a node on which the resource utilization is low.

  4. Click Select to assign the Collector to the filer.

Information Governance connects to the NetApp Cluster Management host from this server. Arctera recommends that the Collector worker node share a fast network with the cluster management host.

On collector selection page, Select Collector pop-up will display Linux Collector as well, which can be identified from Operating System Column.

Check the Use Collector Pool for Scanning box if you want to assign a collector pool. The Collector Pool is typically treated as a single logical unit for load balancing, high availability, or scalability purposes. See About Server Pools. for more details.

Enter a number in the Maximum number of shares to scan in parallel field.

Maximum number of shares to scan in parallel is a configuration setting that controls how many file shares (like SMB/CIFS shares) the system scans simultaneously for a specific filer. Higher values can increase scanning speed but may consume more CPU and network bandwidth while lower values reduce resource usage but may slow down scanning. Set this value based on the filer's performance capacity and network conditions.

Indexer

Do the following:

  1. Click Select Indexer.

  2. The Select Indexer pop-up displays the configured indexers that are available for selection.

  3. Review the performance parameters such as disk and CPU utilization and backlog of files accumulating on the configured nodes. It is recommended that you assign a node on which the resource utilization is low.

  4. Click Select to assign the Indexer to the filer.

Events and metadata that are collected from the cluster are processed and stored on the Indexer node.

You can also migrate the file server to another Indexer.

Cluster Management Interface credentials

Information Governance uses the credentials that you specify to discover the following:

  • The SVMs in the cluster and the CIFS server underneath each SVM.

  • The CIFS shares for each of the CIFS servers.

  • The NFSv3/NFSv4 exports on the NetApp cluster.

To enable Information Governance to successfully discover shares, ensure that HTTP port 80 is not blocked between Information Governance Collector and NetApp cluster management host.

Specifying the filer administrator credentials is optional, if you choose to not monitor events on the filer, nor enable share discovery.

See Credentials required for configuring a clustered NetApp file server.

Cluster Management SSL Certificate

Optionally, you can use an SSL certificate instead of the Cluster Management Interface credentials.

  • Select the radio button if you want to authenticate the communication between Information Governance and the NetApp cluster using a digitally signed certificate.

  • You must generate a self-signed or a CA signed certificate and install the SSL certificate on the cluster Admin Vserver to use this option.

    See Generating SSL certificates for NetApp cluster-mode authentication.

    See Preparing the NetApp cluster for SSL authentication.

  • From the drop-down, select the a saved SSL certificate, or click Add New.

  • On the Add SSL Certificate pop-up, do the following:

    • In the Saved SSL Certificate Identifier field, enter a logical name to identify the filers for which the certificate is used.

    • Browse to the location of the .pem and .key files to select each of them.

    • Click Upload to upload the SSL certificate to the Information Governance Collector assigned to the filer.

Note:

If you choose to use SSL authentication, use local user credentials. Do not choose this option if you are using domain user credentials to configure the NetApp cluster-mode filer. The SVMs with NFS protocol enabled are not be discovered if you are using domain user credentials authenticated using SSL.

Test credentials

Click to test the availability of network connection between the Collector worker node and the filer, and to test the validity of specified credentials.

Arctera recommends that you test the connection before proceeding to ensure that Information Governance is able to connect to the cluster management host.

By default, Information Governance does not test credentials for the following HOMEDIR shares:

  • ~

  • ~CIFS.HOMEDIR

  • CIFS.HOMEDIR

  • %w

  • %d

CIFS Server / Storage Virtual Machine (SVM)

Every SVM node in the cluster has a CIFS server configured on it. The CIFS server represents a file server for Information Governance.

If both CIFS and NFS protocols are enabled, Information Governance automatically discovers the CIFS server name. If only CIFs protocol is enabled, Information Governance discovers all the CIFS servers that are configured in the cluster. If only NFS protocol is enabled then Information Governance fetches the SVM name.

From the drop-down, select the CIFS server/SVM that you want Information Governance to monitor.

Ensure that you can resolve the CIFS server host name from the Collector node.

Note:

For Linux Collector, SVMs which supports NFS protocol will be discovered. Any SVM supporting CIFS and NFS will be discovered but monitoring will be done only for NFS .

If you select Linux Collector, SVMs which supports NFS protocol will be discovered. Any SVM supporting CIFS and NFS both will be discovered but only NFS monitoring will be done.

Storage Virtual Machine (SVM) Alias

Information Governance can exclusively support CIFS on Windows collector and NFSv4 on Linux Collector. However, NFSv3 can be supported on both Windows and Linux Collector. To support a SVM which is having hybrid configuration of CIFS + NFSv4 load or CIFS + NFSv3 or CIFS + NFSv3 + NFSv4, Information Governance will allow addition of same SVM again on different OS collector using Alias functionality. Based on various conditions mentioned in below table CIFS Server / Storage Virtual Machine (SVM) drop-down can also show SVM which is already added in Information Governance. If you select that SVM, a new free-text box will be visible to add Storage Virtual Machine (SVM) Alias. This SVM will be saved in Information Governance with that alias name and will be used with that alias name at all other places in Information Governance.

If you are saving a SVM with an alias name based on type of monitoring enabled, Use CIFS Data LIF hostname for scanning / Use NFS Data LIF hostname for scanning options will become mandatory.

For more information about the Storage Virtual Machine (SVM) Alias, refer to the table at the end of this section.

Enable CIFS Monitoring

Check the box to monitor CIFS shares. This checkbox will be disabled for Linux Collector.

Enable NFS Monitoring

Check the box to monitor NFS exports on the Isilon.

Select Domain

Select domain from the drop-down.

Use CIFS Data LIF hostname for scanning (Optional) / Use NFS Data LIF hostname for scanning

You can use a Logical Interface (LIF) associated with the SVM to communicate with Information Governance.

Information Governance uses the Data LIF to access data from the CIFS and NFS servers . If the Admin LIF and Data LIF are associated with two different networks, then you must specify the Data LIF name while scanning the CIFS shares or NFS exports that reside on configured CIFS servers.

Providing a Data LIF hostname is also useful if the Admin LIF for the cluster is not configured for CIFS or NFS protocol access.

Selecting the LIF hostname is optional if the name of the CIFS server and the Data LIF is the same.

Note:

This option will be disabled for Linux Collector.

Use CIFS Data LIF hostname for scanning option will be disabled in case Linux Collector is selected.

Discover shares automatically

Check the box to allow Information Governance to automatically discover shares of the filer and add them to the configuration.

Discovery of shares takes place as soon as you add a new filer and then twice each day at 2:00 A.M. and 2:00 P.M.

You can also choose to add shares manually.

Exclude shares from discovery

Enter the details of shares which should not be included during discovery.

This option is available if you select Discover shares automatically Specify comma-separated patterns that you want to ignore. Patterns can have 0 or more wildcard * characters. For example, tmp* ignores tmp_A, tmp_abc, *$ ignores shares C$, EXT$, and others.

Enable storage utilization analytics

Select the check box to allow Information Governance to gather storage utilization information from the filer. This information is used when you generate Filer Utilization and Filer Growth Trend reports.

Note:

The Filer utilization and Filer Growth Trend reports are available only for NetApp and Windows File Server.

The DataInsightFpolicyCmod service running on the Collector node gathers information about storage utilization on the filer.

See About configuring FPolicy in Cluster-Mode.

Enable file system event monitoring

Select to enable event monitoring on the filer.

Enable FPolicy automatically

Select to automatically enable FPolicy on the filer.

Once you enable FPolicy, the Clustered Data ONTAP SVM node server initiates a TCP connection to the Information Governance FPolicy server. Ensure that the communication port in the firewall between the FPolicy server and the cluster management host is open.

If you clear this check box, you must manually enable FPolicy on the filer.

Register for security events

Select if you want Information Governance to monitor the changes to permissions in your storage environment.

By default, this option is not selected because it has a significant impact on the performance of the file server.

Enable filer scanning

Select the check box to enable filer scanning according to the specified schedule.

Scan new shares immediately

Select this option to scan newly added shares immediately, instead of waiting for the normal scan schedule. Scanning proceeds only when scanning is permitted on the Collector node.

Scanner credentials

See Credentials required for configuring a clustered NetApp file server. This option will not be available for Linux Collector.

Scanning schedule for full scans

Select one of the following to define a scanning schedule for shares of this filer:

  • Use Collector's default scanning schedule.

  • Use custom schedule.

See Custom schedule options.

Arctera Insight Information Governance periodically scans shares of the filer to obtain file metadata and security descriptors. Each Collector worker node by default initiates a full scan of shares at 7:00 P.M. on the last Friday of each month.

Details about the Storage Virtual Machine (SVM) Alias are as follows:

SVM Type

Previous Collector OS

Current Collector OS

Alias Visible

Notes

CIFS ONLY

Windows

Windows

No

Already added on Windows

CIFS ONLY

Windows

Linux

No

CIFS is not supported on Linux

NFS Only

Windows

Linux

Yes

Allowing as it can have NFSv4 shares which are not supported on Windows

NFS Only

Linux

Windows

No

As already added on best supported OS

NFS Only

Windows

Windows

No

Already added on Windows

NFS Only

Linux

Linux

No

Already added on Linux

CIFS + NFS

Windows

Linux

Yes

Allowing as it can have NFSv4 shares which are not supported on Windows

CIFS + NFS

Linux

Windows

Yes

Only CIFS monitoring is allowed