Veritas Data Insight User's Guide

Last Published:
Product(s): Data Insight (6.1.2)
  1. Section I. Introduction
    1. Introducing Veritas Data Insight
      1.  
        About Veritas Data Insight
      2.  
        About data custodian
      3.  
        About permissions
      4.  
        About SharePoint permissions
      5.  
        About Box permissions
      6.  
        About audit logs
      7.  
        About migrated domains
      8.  
        Applications for Symantec Data Loss Prevention
      9.  
        Content classification using Veritas Information Classifier
    2. Using the Veritas Data Insight Management Console
      1. About the Veritas Data Insight Management Console
        1.  
          Header
        2.  
          Tabs
        3.  
          Navigation pane
        4.  
          Content pane
      2.  
        Operation icons on the Management Console
      3.  
        Logging in to the Data Insight Management Console
      4.  
        Logging out of the Data Insight Management Console
      5.  
        Accessing online Help
  2. Section II. Data Insight Workspace
    1. Navigating the Workspace tab
      1.  
        About the Data Insight Workspace
      2.  
        Using the Workspace filters
      3.  
        Managing the Workspace
      4.  
        Searching the storage device hierarchy
      5.  
        Searching for users and user groups
    2. Analyzing data using the Workspace views
      1.  
        About information risk
      2.  
        Viewing summary of data sources
      3. Viewing shares summary
        1.  
          About control points
      4.  
        About the risk score for users
      5. About the Risk Dossier
        1.  
          Assessing risky users - an example scenario
      6.  
        Viewing user summary
      7.  
        Viewing details of Watchlist users
      8.  
        Viewing details of alert notifications
    3. Viewing access information for files and folders
      1.  
        About viewing file or folder summary
      2.  
        Viewing the overview of a data source
      3.  
        Managing data custodian for paths
      4.  
        Viewing the summary of user activity on a file or folder
      5. Viewing user activity on files or folders
        1.  
          Assigning an inferred data owner as custodian
        2.  
          Assigning an active user as custodian
        3.  
          Assigning a custodian from the Permissions tab
      6.  
        Viewing file and folder activity
      7.  
        Viewing CIFS permissions on folders
      8.  
        Viewing NFS permissions on folders
      9.  
        Viewing SharePoint permissions for folders
      10.  
        Viewing Box permissions on folders
      11.  
        Viewing audit logs for files and folders
      12. About visualizing collaboration on a share
        1.  
          Analyzing activity on collaborative shares
    4. Viewing access information for users and user groups
      1.  
        Viewing the overview of a user
      2.  
        Viewing the overview of a group
      3.  
        Managing custodian assignments for users
      4.  
        Viewing folder activity by users
      5.  
        Viewing CIFS permissions for users
      6.  
        Viewing CIFS permissions for user groups
      7.  
        Viewing NFS permissions for users and user groups
      8.  
        Viewing SharePoint permissions for users and user groups
      9.  
        Viewing Box permissions for users and user groups
      10.  
        Viewing audit logs for users
  3. Section III. Data Insight reports
    1. Using Data Insight reports
      1.  
        About Data Insight reports
      2.  
        How Data Insight reporting works
      3.  
        Creating a report
      4. About Data Insight security reports
        1.  
          Activity Details report
        2. Permissions reports
          1.  
            Inactive Users
          2.  
            Path Permissions
          3. Permissions Search report
            1.  
              Create Permissions Search report
          4.  
            About Permissions Query templates
          5. Creating a Permissions Query Template
            1.  
              Using the match-type criteria
          6.  
            Creating custom rules
          7. Permissions Query Template actions
            1.  
              Editing or deleting a Permissions Query Template
            2.  
              Copying a Permissions Query Template
            3.  
              About sharing a Permissions Query Template
          8.  
            Using Permissions Search report output to remediate permissions
          9.  
            Entitlement Review
          10.  
            User/Group Permissions
          11.  
            Group Change Impact Analysis
        3. Ownership Reports
          1.  
            Data Custodian Summary
          2.  
            Inferred Owner
          3.  
            Data Inventory Report
      5.  
        Create/Edit security report options
      6.  
        Data Insight limitations for Box permissions
      7. About Data Insight storage reports
        1.  
          Activity Summary reports
        2. Capacity reports
          1.  
            Filer Utilization
          2.  
            Filer Growth Trend
        3. Data Lifecycle reports
          1.  
            Inactive Data by File Group
          2.  
            Inactive Data by Owner
          3.  
            Data Aging
          4.  
            Inactive Folders
        4. Consumption Reports
          1.  
            Potential Duplicate Files
          2.  
            Consumption by Folders
          3.  
            Consumption by Department
          4.  
            Consumption by File Group
          5.  
            Consumption by Owner
          6.  
            Consumption by File Group and Owner
      8.  
        Create/Edit storage report options
      9. About Data Insight custom reports
        1.  
          About DQL query templates
        2.  
          Creating custom templates for DQL queries
        3.  
          Create/Edit DQL report options
      10.  
        Considerations for importing paths using a CSV file
    2. Managing reports
      1.  
        About managing Data Insight reports
      2. Viewing reports
        1.  
          About stale information in reports
      3.  
        Filtering a report
      4.  
        Editing a report
      5.  
        About sharing reports
      6.  
        Copying a report
      7.  
        Running a report
      8.  
        Viewing the progress of a report
      9.  
        Customizing a report output
      10.  
        Configuring a report to generate a truncated output
      11.  
        Sending a report by email
      12.  
        Automatically archiving reports
      13.  
        Canceling a report run
      14.  
        Deleting a report
      15.  
        Considerations for viewing reports
      16.  
        Organizing reports using labels
  4. Section IV. Remediation
    1. Configuring remediation workflows
      1.  
        About remediation workflows
      2.  
        Prerequisites for configuring remediation workflows
      3.  
        Configuring Self-Service Portal settings
      4.  
        About workflow templates
      5. Managing workflow templates
        1.  
          Create/Edit Entitlement Review workflow template
        2.  
          Create/Edit DLP Incident Remediation workflow template
        3.  
          Create/Edit Ownership Confirmation workflow template
        4.  
          Create/Edit Records Classification workflow template
      6. Creating a workflow using a template
        1. Create Entitlement Review workflow options
          1.  
            Customizing Entitlement Review report output
        2.  
          Create DLP Incident Remediation workflow options
        3.  
          Create Ownership Confirmation workflow options
        4.  
          Create Records Classification workflow options
      7. Managing workflows
        1.  
          Viewing details of submitted workflows
        2.  
          Extending the deadline of a workflow
        3.  
          Copying a workflow
        4.  
          Managing submitted workflows
        5.  
          Canceling or deleting a workflow
      8.  
        Auditing workflow paths
      9.  
        Monitoring the progress of a workflow
      10.  
        Remediating workflow paths
    2. Using the Self-Service Portal
      1. About the Self-Service Portal
        1.  
          About Entitlement Review
      2.  
        Logging in to the Self-Service Portal
      3.  
        Using the Self-Service Portal to review user entitlements
      4.  
        Using the Self-Service Portal to manage Data Loss Prevention (DLP) incidents
      5.  
        Using the Self-Service Portal to confirm ownership of resources
      6.  
        Using the Self-Service Portal to classify sensitive data
    3. Managing data
      1. About managing data using Enterprise Vault and custom scripts
        1.  
          About Retention categories
        2.  
          About post-processing actions
      2.  
        Managing data from the Shares list view
      3.  
        Managing inactive data from the Folder Activity tab
      4.  
        Managing inactive data by using a report
      5.  
        Archiving workflow paths using Enterprise Vault
      6.  
        Using custom scripts to manage data
      7.  
        Pushing classification tags while archiving files into Enterprise Vault
      8. About adding tags to files, folders, and shares
        1.  
          Using the metadata framework for classification and remediation
    4. Managing permissions
      1.  
        About permission visibility
      2.  
        About recommending permission changes
      3. About recommending permissions changes for inactive users
        1.  
          Reviewing permission recommendations
        2.  
          Analyzing permission recommendations and applying changes
      4.  
        Making permission changes directly from Workspace
      5.  
        Removing permissions for Entitlement Review workflow paths
  5. Appendix A. Command Line Reference
    1.  
      mxcustodian

About the Data Insight Workspace

The Workspace tab of the Data Insight Management Console gives you in-depth analytics of the configured data sources and users who have activity on these data sources. When you log on to Data Insight, you are automatically directed to the Data Insight dashboard. The dashboard enables interactive navigation and it lets you drill down to the deepest level of the file system hierarchy to view analytics for configured data sources and users. The information on the dashboard is summarized in tile-like panels. You can view details of the displayed data by navigating to the List View of the tile.

Note:

Data Insight recommends that you use a resolution of 1600 * 1024 to be able to view all columns on the Dashboard properly.

The dashboard helps you do the following:

  • Visualize complex analytics about activity, risk, and storage.

  • Review access pattern of watch-listed users.

  • Review the alerts that are generated when configured policies are violated.

  • Analyze the dashboard data from different perspectives.

You can use the Security, Activity, or the Storage views to change the perspective of the data that is displayed on the dashboard. For example, the Security view displays information about the number of sensitive files in a storage repository, number of active users on these data sources, and the risk score of the most active users. Whereas, the Activity view provides the information about the number of access events, the number of active files, the most active users. By default, the dashboard opens the Security view.

Note:

By default, the Users, Watchlist, and Alerts list views display data only for the Security perspective.

The tiles on the dashboard display all configured data sources, shares, and users listed in order of their risk score. Scroll to view all configured entities on a tile or click More to review the details of a specific entity.

By default, the information displayed by the Workspace is refreshed once every day. However, you can compute the dashboard data on the Workspace any time by running the dashboard report manually from the Advanced Analytics settings. Click Actions > Refresh to reflect the most current data on the dashboard.

For information about the configuring advanced analytics, see the Data Insight Administrator's Guide.

The Data Insight Dashboard displays the following tiles:

Table: Workspace Dashboard tiles

Tile

Description

Data Sources

Displays all the configured data sources such as filers, SharePoint web applications, Documentum repositories, and cloud storage accounts. The data sources are listed in order of their risk score. Depending on the view that you select, the tile displays the following information:

  • Number of sensitive files on the data source.

  • The number of shares with sensitive data on them.

  • The risk score assigned to a share after considering the number of open shares, active user count, and the number of sensitive files on the share.

  • The size of inactive data on a data source.

  • The number of active users on the data source.

See Viewing summary of data sources.

Shares

Displays all shares that Data Insight monitors. Depending on the view that you select, the tile displays the following data:

  • The number of sensitive and active files on a share and the number of open shares.

  • The risk score of a share considering the active user count and the sensitive file count of the share, and the maximum permitted user count for the share. A higher count of active users and sensitive files contributes to a higher risk for a share.

    See About information risk.

  • The activity (number of accesses) on the share.

  • The total files on the share and the total size of the data on the share.

See Viewing shares summary.

You can manage inactive data from the Shares list view.

See Managing data from the Shares list view.

Users

Displays all configured users in Data Insight. The tile displays the following information:

  • The risk score of a user based on parameters such as abnormal access pattern, accesses made on sensitive data, and the number of alerts raised against the user.

    See About the risk score for users.

  • The number of shares on which the user has permissions.

  • The number of sensitive files that are accessed by the user.

  • Th total accesses by the user across all configured devices in he last 15 days (default).

  • The number of unique files accessed by the user in the last 15 days (default).

See Viewing user summary.

Watchlist

Displays the list of users on the administrator's watch list, sorted according to the risk score assigned to them.

For information about configuring a the watch list settings, see the Data Insight Administrator's Guide.

See Viewing details of Watchlist users.

Note:

The Watchlist tile and list views are only visible to the user assigned the Server Administrator role.

Alerts

Displays the summary count of alert notifications raised against configured policies and the severity of the alerts.

See Viewing details of alert notifications.

Note:

The Alerts tile and list views are only visible to the user assigned the Server Administrator role.

Note:

Data Insight persists the last view that is open on the Workspace tab when you log out. You can start where you left off when you log in to Data Insight again.

See Using the Workspace filters.

More Information

Managing the Workspace