Veritas Data Insight User's Guide
- Section I. Introduction
- Section II. Data Insight Workspace
- Navigating the Workspace tab
- Analyzing data using the Workspace views
- Viewing access information for files and folders
- About viewing file or folder summary
- Viewing the overview of a data source
- Managing data custodian for paths
- Viewing the summary of user activity on a file or folder
- Viewing user activity on files or folders
- Viewing file and folder activity
- Viewing CIFS permissions on folders
- Viewing NFS permissions on folders
- Viewing SharePoint permissions for folders
- Viewing Box permissions on folders
- Viewing audit logs for files and folders
- About visualizing collaboration on a share
- Viewing access information for users and user groups
- Viewing the overview of a user
- Viewing the overview of a group
- Managing custodian assignments for users
- Viewing folder activity by users
- Viewing CIFS permissions for users
- Viewing CIFS permissions for user groups
- Viewing NFS permissions for users and user groups
- Viewing SharePoint permissions for users and user groups
- Viewing Box permissions for users and user groups
- Viewing audit logs for users
- Section III. Data Insight reports
- Using Data Insight reports
- About Data Insight reports
- How Data Insight reporting works
- Creating a report
- About Data Insight security reports
- Activity Details report
- Permissions reports
- Inactive Users
- Path Permissions
- Permissions Search report
- About Permissions Query templates
- Creating a Permissions Query Template
- Creating custom rules
- Permissions Query Template actions
- Using Permissions Search report output to remediate permissions
- Entitlement Review
- User/Group Permissions
- Group Change Impact Analysis
- Ownership Reports
- Create/Edit security report options
- Data Insight limitations for Box permissions
- About Data Insight storage reports
- Create/Edit storage report options
- About Data Insight custom reports
- Considerations for importing paths using a CSV file
- Managing reports
- About managing Data Insight reports
- Viewing reports
- Filtering a report
- Editing a report
- About sharing reports
- Copying a report
- Running a report
- Viewing the progress of a report
- Customizing a report output
- Configuring a report to generate a truncated output
- Sending a report by email
- Automatically archiving reports
- Canceling a report run
- Deleting a report
- Considerations for viewing reports
- Organizing reports using labels
- Using Data Insight reports
- Section IV. Remediation
- Configuring remediation workflows
- About remediation workflows
- Prerequisites for configuring remediation workflows
- Configuring Self-Service Portal settings
- About workflow templates
- Managing workflow templates
- Creating a workflow using a template
- Managing workflows
- Auditing workflow paths
- Monitoring the progress of a workflow
- Remediating workflow paths
- Using the Self-Service Portal
- About the Self-Service Portal
- Logging in to the Self-Service Portal
- Using the Self-Service Portal to review user entitlements
- Using the Self-Service Portal to manage Data Loss Prevention (DLP) incidents
- Using the Self-Service Portal to confirm ownership of resources
- Using the Self-Service Portal to classify sensitive data
- Managing data
- About managing data using Enterprise Vault and custom scripts
- Managing data from the Shares list view
- Managing inactive data from the Folder Activity tab
- Managing inactive data by using a report
- Archiving workflow paths using Enterprise Vault
- Using custom scripts to manage data
- Pushing classification tags while archiving files into Enterprise Vault
- About adding tags to files, folders, and shares
- Managing permissions
- Configuring remediation workflows
- Appendix A. Command Line Reference
Viewing summary of data sources
The list view of the Data Sources displays the complete list of configured data sources such as file servers, SharePoint web applications, and cloud storage accounts. Click the plus sign next to a data source to drill down the hierarchy of a data source such as share and site collection.
Depending on the perspective that you have selected, you may view the following details about a data source:
The total number of files on the open shares on a data source.
The disk space occupied by the open shares.
Number of sensitive files present in a data source.
Number of users with activity on the data source.
Risk score assigned to the shares or site collections under the data source.
The bubble chart is divided into ten buckets, with each bubble signifies a risk range. The higher five buckets are orange and signify a higher risk range. The size of the bubble signifies the percentage of shares or site collections on a data source that are in a particular risk range.
Total activity reported for the data source.
Total number of files with activity and the number of active users.
Total number of files contained, the disk space occupied by the contents, the inactive users, and inactive data size on the data source.
Select a row in the Data Sources page to see a summary of the corresponding data source. Depending upon currently selected the level of the file system hierarchy, Summary panel displays the following information:
Total number of open shares on the data source.
Open shares are the shares that are accessible to global access groups, like Everyone, domain users, and Authenticated Users on the network, or shares that match the criteria defined in the open share policy. Such open shares may contain sensitive data.
For information about configuring open share policy, see the Veritas Data Insight Administrator's Guide.
Whether it is a control point and the number of control points in the data source hierarchy.
The size on disk.
This size can be different from the logical size of the share or site collection. If a path is archived by Enterprise Vault, its on-disk size is much lower than its logical size.
The owner of the data source and the Workspace Data Owner Policy used to compute the owner.
The type of the data source. For example NetApp, EMC Isilon, Windows File Server, cloud storage account etc.
Number of shares, folder, and active users present.
Graphical view of risk range.
The Data Loss Prevention policies that have been violated.
The Veritas Information Classifier (VIC) tags which have been matched.
The custodian assigned on the data source or on any path in the hierarchy of the data source.
Details of the attributes of the users who have activity on the data source.
Click on the Summary panel to open the profile panel for the data source. The profile panel lets you view the following:
Details of active, inactive, and sensitive files.
The overview of the data source
Details of custodians assigned for the data source.