Arctera Insight Information Governance Administrator's Guide
- Section I. Getting started
- Introduction to Arctera Insight Information Governance administration
- Configuring Information Governance global settings
- About scanning and event monitoring
- About filtering certain accounts, IP addresses, and paths
- About archiving data
- About Information Governance integration with Data Loss Prevention (DLP)
- Configuring advanced analytics
- About open shares
- About user risk score
- About bulk assignment of custodians
- Configuring Metadata Framework
- Section II. Configuring Information Governance
- Configuring Information Governance product users
- Configuring Information Governance product servers
- About node templates
- About automated alerts for patches and upgrades
- Configuring saved credentials
- Configuring directory service domains
- Adding a directory service domain to Information Governance
- Configuring containers
- Server Pools
- Section III. Configuring native file systems in Information Governance
- Configuring clustered NetApp file server monitoring
- About configuring secure communication between Information Governance and cluster-mode NetApp devices
- Configuring EMC Celerra or VNX monitoring
- Configuring EMC Isilon monitoring
- Configuring EMC Unity VSA file servers
- Configuring Hitachi NAS file server monitoring
- Configuring Windows File Server monitoring
- Configuring Arctera File System (VxFS) file server monitoring
- Configuring monitoring of a generic device
- Managing file servers
- Adding filers
- Adding shares
- Renaming storage devices
- Configuring clustered NetApp file server monitoring
- Section IV. Configuring SharePoint data sources
- Configuring monitoring of SharePoint web applications
- About the Information Governance web service for SharePoint
- Adding web applications
- Adding site collections
- Configuring monitoring of SharePoint Online accounts
- About SharePoint Online account monitoring
- Adding site collections to SharePoint Online accounts
- Configuring monitoring of SharePoint web applications
- Section V. Configuring cloud data sources
- Configuring monitoring of Box accounts
- Configuring OneDrive account monitoring
- Configuring Azure Netapp Files Device
- Managing cloud sources
- Section VI. Configuring Object Storage Sources
- Section VII. Health and monitoring
- Section VIII. Alerts and policies
- Configuring policies
- Managing policies
- Configuring policies
- Section IX. Remediation
- Configuring remediation settings
- Section X. Reference
- Appendix A. Information Governance best practices
- Appendix B. Migrating Information Governance components
- Appendix C. Backing up and restoring data
- Appendix D. Arctera Information Governance health checks
- About Information Governance health checks
- About Information Governance health checks
- Appendix E. Command File Reference
- Appendix F. Arctera Information Governance jobs
- Appendix G. Troubleshooting
- Troubleshooting FPolicy issues on NetApp devices
Configuring attributes for advanced analytics
Information Governance lists the custom attributes along with their display names or aliases that are configured for a domain. It also provides you the ability to edit configured attributes and add new custom attributes to Information Governance. Certain well-known custom attributes such as Email are added to Information Governance by default. The Email attribute is used to send emails for reporting and remediation.
Information Governance also uses the configured attributes for the following purposes:
For advanced analytics, included in reports, and displayed on the console.
To sort users in a Social Network Map cluster based on the attribute distribution.
To group users who have activity on any given level in the hierarchy. This attribute-based grouping is displayed in the Dashboard view of the Workspace tab.
To create attribute-based filters. These filters are used to drill down the Social Network Map to identify specific user(s) with the selected attribute.
Information Governance adds the following user attributes implicitly:
LatestSID: This attribute is used to keep a track of migration of users across domains. Its value is the SID of the user in the new domain after migration.
Watchlisted: This attribute indicates whether a user is watch-listed. Its value is 1 for the users that are watch-listed.
Information Governance adds the following group attributes implicitly:
LatestSID: This attribute is used to keep a track of migration of groups across domains. Its value is the SID of the group in the new domain after migration.
groupType: This is an Active Directory attribute that defines the type and scope of the group.
Ensure that the names of configured attributes, including the ones fetched through CSV file, are not the same as any of the implicitly added user or group attributes. If the attributes are same, the process of updating user information in the GUI slows down.
To configure user attributes
- In the Management Console, click Settings > Directory Services. The Domains page that lists all configured domains opens by default.
- Click the Attributes sub-tab.
The page lists certain well-known attributes, such as Email and Manager. You can edit these attributes, but you cannot delete them.
- Click Add New Custom Attribute to add the additional attributes that you want Information Governance to extract from the directory service.
- On the Custom Attributes pop-up, enter the following details:
The logical name for the attribute as displayed in Information Governance. You can enter a display name of the attribute.
From the Type of custom attribute drop-down, select whether the attribute applies to a user or a group.
Information Governance extracts the following attributes from Active Directory for users :
displayName
distinguishedName
givenName
objectSid
sAMAccountName
memberOf
primaryGroupID
userAccountControl
sn
Whereas, for user groups,Information Governance extracts the following attributes from Active Directory:
distinguishedName
sAMAccountName
memberOf
objectSid
- To edit a well-known custom attribute, click Edit and do the following:
Enter the default name of the attribute as used by your directory service.
Select the domain for which you want to specify an alias for the attribute.
Enter the name of the attribute. An attribute can be referred to by many different names across domains. Specify the alias by which the attribute is named in the selected domain.
The Domain Specific LDAP Attibute Names field supports the auto-complete feature. Information Governance provides suggestions for custom attributes when you enter part of an attribute name in the field.
For example, the attribute name, Department, can map to the alias Dept in domain A and Department in domain B. In this example, select A and enter the Dept as the alias.
- Select the Do not fetch attribute check box if the value for the attribute does not exist in the selected domain.
- Click Add New LDAP Attribute Name to add other domain-specific names for the custom attribute.
- Click Save.
For Azure AD scan reference property and display information details, refer to the following table:
Reference property | Type | Display information |
---|---|---|
Manager | User | User Principal Name |
MemberOf | Group | Display Name |
appRoleAssignments | Without name or user principal name field | ID |
More Information