Veritas Data Insight Administrator's Guide
- Section I. Getting started
- Introduction to Veritas Data Insight administration
- Configuring Data Insight global settings
- Overview of Data Insight licensing
- About scanning and event monitoring
- About filtering certain accounts, IP addresses, and paths
- About archiving data
- About Data Insight integration with Symantec Data Loss Prevention (DLP)
- Configuring advanced analytics
- About open shares
- About bulk assignment of custodians
- Section II. Configuring Data Insight
- Configuring Data Insight product users
- Configuring Data Insight product servers
- About node templates
- About automated alerts for patches and upgrades
- Configuring saved credentials
- Configuring directory service domains
- Configuring containers
- Section III. Configuring native file systems in Data Insight
- Configuring NetApp file server monitoring
- Configuring clustered NetApp file server monitoring
- About configuring secure communication between Data Insight and cluster-mode NetApp devices
- Configuring EMC Celerra or VNX monitoring
- Configuring EMC Isilon monitoring
- Configuring EMC Unity VSA file servers
- Configuring Hitachi NAS file server monitoring
- Configuring Windows File Server monitoring
- Configuring Veritas File System (VxFS) file server monitoring
- Configuring monitoring of a generic device
- Managing file servers
- Adding filers
- Adding shares
- Renaming storage devices
- Configuring NetApp file server monitoring
- Section IV. Configuring SharePoint data sources
- Configuring monitoring of SharePoint web applications
- About the Data Insight web service for SharePoint
- Adding web applications
- Adding site collections
- Configuring monitoring of SharePoint Online accounts
- About SharePoint Online account monitoring
- Adding SharePoint Online accounts
- Adding site collections to SharePoint Online accounts
- Configuring monitoring of SharePoint web applications
- Section V. Configuring cloud data sources
- Section VI. Configuring ECM data sources
- Section VII. Health and monitoring
- Section VIII. Alerts and policies
- Section IX. Remediation
- Section X. Reference
- Appendix A. Backing up and restoring data
- Appendix B. Data Insight health checks
- Appendix C. Command File Reference
- Appendix D. Data Insight jobs
- Appendix E. Troubleshooting
- Troubleshooting FPolicy issues on NetApp devices
Configuring Workspace data owner policy
By default, Data Insight infers owners of files or folders based on the access history. The most active user of a file is considered to be the data owner for the purpose of efficient remediation and data management. The Workspace data owner policy is used to infer the probable owner when configuring workflows and reports.
However, you can define a global policy to infer the owners of files or folders based on one of the following criteria:
The number of read events on the file or folder.
The number of write events on the file or folder.
The cumulative count of all activities except for the permission change events on the file or folder.
The creator of the file or folder.
The user account which last accessed the file or folder.
The user account which last modified the file or folder.
Owner of the parent folder.
If Data Insight is not able compute the owner on the basis of read, write, last accessed, last modified, or create events, the owner of the immediate parent folder is displayed as the owner of the file or folder.
For example, you can define a policy to consider the count of read and write events on a file to determine the data owner. In this case, the user with the most read and write accesses is considered to be the data owner.
The criteria that is defined in the global Workspace data owner policy are also considered for determining the data owner when you configure reports and workflows. However, you can choose to override the policy when you create an Inferred Data Owner report.
For information about configuring workflows and reports, see the Veritas Data Insight User's Guide.
To configure a Workspace data owner policy
- In the Management Console, click Settings > Workspace Data Owner Policy.
- The Data Owner Policy details page displays the current policy.
- Use the up and down arrow keys to arrange the criteria in the preferred order.
Data Insight serially evaluates the criteria in the list to compute the data owner.
- Select the check boxes to exclude the following types of users when Data Insight calculates the data owner:
Disabled users - These are the users whose accounts are disabled in the directory service, but are still present in the Data Insight configuration.
Deleted users - These are the users whose accounts are removed from the directory service.
Accounts of users are typically disabled or deleted in the directory service when a user leaves an organization.
Unresolved SIDs - These are accounts for which the corresponding user information is missing in the directory service.
For example, you define a policy that considers the number of write events on a file to compute the data owner. If the user account with the most write events on a particular file is either deleted or disabled, Data Insight excludes such user from the data owner computation. It then considers the next criteria in the list to determine the owner of the file.
- Select the groups or users that you want to exclude from the scope of the policy. Double-click the group or user to select it. The selected data set is listed in the Exclusion List pane.
Use the Domain Filter drop-down to search for specific users, users in a particular domain, built-in user accounts, and SIDs that have been migrated to another domain.
- Click Save.