Veritas Data Insight User's Guide
- Section I. Introduction
- Section II. Data Insight Workspace
- Navigating the Workspace tab
- Analyzing data using the Workspace views
- Viewing access information for files and folders
- Viewing user activity on files or folders
- About visualizing collaboration on a share
- Viewing access information for users and user groups
- Section III. Data Insight reports
- Using Data Insight reports
- About Data Insight security reports
- Permissions reports
- Permissions Search report
- Creating a Permissions Query Template
- Permissions Query Template actions
- Ownership Reports
- About Data Insight storage reports
- About Data Insight custom reports
- Managing reports
- Viewing reports
- Using Data Insight reports
- Section IV. Remediation
- Configuring remediation workflows
- Managing workflow templates
- Creating a workflow using a template
- Managing workflows
- Using the Self-Service Portal
- About the Self-Service Portal
- Managing data
- About managing data using Enterprise Vault and custom scripts
- About adding tags to files, folders, and shares
- Managing permissions
- Configuring remediation workflows
- Appendix A. Command Line Reference
Group Change Impact Analysis
Use this report to analyze the business impact of revoking permissions of users and groups on paths. You can choose to run this report for the permission recommendations that are provided by Data Insight on the
tab. Or, you can manually create this report from the tab.The Group Change Impact Analysis report helps you evaluate the repercussions of the following actions:
Revoking the permissions of a group or a set of groups on a selected path.
Modifying groups by removing users from the group.
The report gives the information about the active users who will lose access to the selected path because they are part of the group whose permission is revoked.
The number of inactive users who have gained access to the selected path.
Note:
The Group Change Impact Analysis report also takes into account all the permissions based on SID history. It takes into account all the activity performed from the current and all previous domains.
Drill down the summary table to view the detailed report. Click on a control point to view the detailed analysis.