Veritas Data Insight Administrator's Guide
- Section I. Getting started
- Introduction to Veritas Data Insight administration
- Configuring Data Insight global settings
- Overview of Data Insight licensing
- About scanning and event monitoring
- About filtering certain accounts, IP addresses, and paths
- About archiving data
- About Data Insight integration with Symantec Data Loss Prevention (DLP)
- Configuring advanced analytics
- About open shares
- About bulk assignment of custodians
- Section II. Configuring Data Insight
- Configuring Data Insight product users
- Configuring Data Insight product servers
- About node templates
- About automated alerts for patches and upgrades
- Configuring saved credentials
- Configuring directory service domains
- Configuring containers
- Section III. Configuring native file systems in Data Insight
- Configuring NetApp file server monitoring
- Configuring clustered NetApp file server monitoring
- About configuring secure communication between Data Insight and cluster-mode NetApp devices
- Configuring EMC Celerra or VNX monitoring
- Configuring EMC Isilon monitoring
- Configuring EMC Unity VSA file servers
- Configuring Hitachi NAS file server monitoring
- Configuring Windows File Server monitoring
- Configuring Veritas File System (VxFS) file server monitoring
- Configuring monitoring of a generic device
- Managing file servers
- Adding filers
- Adding shares
- Renaming storage devices
- Configuring NetApp file server monitoring
- Section IV. Configuring SharePoint data sources
- Configuring monitoring of SharePoint web applications
- About the Data Insight web service for SharePoint
- Adding web applications
- Adding site collections
- Configuring monitoring of SharePoint Online accounts
- About SharePoint Online account monitoring
- Adding SharePoint Online accounts
- Adding site collections to SharePoint Online accounts
- Configuring monitoring of SharePoint web applications
- Section V. Configuring cloud data sources
- Section VI. Configuring ECM data sources
- Section VII. Health and monitoring
- Section VIII. Alerts and policies
- Section IX. Remediation
- Section X. Reference
- Appendix A. Backing up and restoring data
- Appendix B. Data Insight health checks
- Appendix C. Command File Reference
- Appendix D. Data Insight jobs
- Appendix E. Troubleshooting
- Troubleshooting FPolicy issues on NetApp devices
About exclude rules for access events
You can configure the following types of exclude rules for access events:
Filters for account names or SIDs | Typically, used to mask service accounts from registering data accesses into Veritas Data Insight. For example, if an antivirus software performs scans on a mounted share using a specific user account, you can add that user account to a filter. Data Insight omits all accesses made by that service user account. |
Filters for IP addresses | Used to filter data accesses from specific IP addresses. Such filters are useful if you have file system scanners configured on certain machines in your environment, whose accesses you want to ignore. Note: IP addresses for events are not available for Windows File Servers and SharePoint. |
Filters for path names | Filters for path names are of two types, file extension based and path based. The file extension based filter specifies the file extensions to be filtered. The path based filter specifies the path of a folder and filters out all events which have that path prefix. For path-based filtering, you must specify a fully qualified path prefix or a path relative to the root of each share. You can also use the wildcard (*) with a prefix string to exclude paths that have the string in the path name. |
Filter for URLs | Used to filter data accesses from specified web applications or from SharePoint sites. Use fo wildcard (*) in exclude rules for access events is not supported. |