Veritas Data Insight User's Guide
- Section I. Introduction
- Section II. Data Insight Workspace
- Navigating the Workspace tab
- Analyzing data using the Workspace views
- Viewing access information for files and folders
- About viewing file or folder summary
- Viewing the overview of a data source
- Managing data custodian for paths
- Viewing user activity on files or folders
- Viewing file and folder activity
- Viewing CIFS permissions on folders
- Viewing NFS permissions on folders
- Viewing SharePoint permissions for folders
- Viewing OneDrive permissions for folders
- Viewing Box permissions on folders
- Viewing audit logs for files and folders
- About visualizing collaboration on a share
- Viewing access information for users and user groups
- Viewing the overview of a user
- Viewing the overview of a group
- Managing custodian assignments for users
- Viewing folder activity by users
- Viewing CIFS permissions for users
- Viewing CIFS permissions for user groups
- Viewing NFS permissions for users and user groups
- Viewing SharePoint permissions for users and user groups
- Viewing Box permissions for users and user groups
- Viewing audit logs for users
- Section III. Data Insight reports
- Using Data Insight reports
- About Data Insight reports
- How Data Insight reporting works
- Creating a report
- About Data Insight security reports
- Activity Details report
- Permissions reports
- Inactive Users
- Path Permissions
- Permissions Search report
- About Permissions Query templates
- Creating a Permissions Query Template
- Creating custom rules
- Permissions Query Template actions
- Using Permissions Search report output to remediate permissions
- Entitlement Review
- User/Group Permissions
- Group Change Impact Analysis
- Ownership Reports
- Create/Edit security report options
- About Data Insight storage reports
- Create/Edit storage report options
- About Data Insight custom reports
- Considerations for importing paths using a CSV file
- Managing reports
- About managing Data Insight reports
- Viewing reports
- Filtering a report
- Editing a report
- About sharing reports
- Copying a report
- Running a report
- Viewing the progress of a report
- Customizing a report output
- Configuring a report to generate a truncated output
- Sending a report by email
- Automatically archiving reports
- Canceling a report run
- Deleting a report
- Considerations for viewing reports
- Organizing reports using labels
- Using Data Insight reports
- Section IV. Remediation
- Configuring remediation workflows
- About remediation workflows
- Prerequisites for configuring remediation workflows
- Configuring Self-Service Portal settings
- About workflow templates
- Managing workflow templates
- Creating a workflow using a template
- Managing workflows
- Auditing workflow paths
- Monitoring the progress of a workflow
- Remediating workflow paths
- Using the Self-Service Portal
- About the Self-Service Portal
- Logging in to the Self-Service Portal
- Using the Self-Service Portal to review user entitlements
- Using the Self-Service Portal to manage Data Loss Prevention (DLP) incidents
- Using the Self-Service Portal to confirm ownership of resources
- Using the Self-Service Portal to classify sensitive data
- Managing data
- About managing data using Enterprise Vault and custom scripts
- Managing data from the Shares list view
- Managing inactive data from the Folder Activity tab
- Managing inactive data by using a report
- Archiving workflow paths using Enterprise Vault
- Using custom scripts to manage data
- Pushing classification tags while archiving files into Enterprise Vault
- About adding tags to devices, files, folders, and shares
- Managing permissions
- Configuring remediation workflows
- Appendix A. Command Line Reference
- Index
Creating a Permissions Query Template
The Permissions Query Template is an integral part of the Permissions Search report. A Permissions Query Template enables you to save the frequently-used rules that define a permission search criteria. You can save a combination of multiple predefined and custom rules in a template.
You can create or use a saved Permissions Query Template to create a Permissions Search report.
To create a Permissions Query Template
- On the Management Console, click Reports > Permissions Reports > Permissions Search.
- On the Create Permissions Search Report page, click the Configuration tab.
- From the Select Template drop-down, select Manage Templates.
- On the Manage Templates page, do the following:
Name - Enter a logical name for the template.
Before you can select a predefined rule or create a custom rule, you must select whether you want to search for a specific Access Control Entries (ACEs) or Access Control Lists (ACLs) that match or violate the rules that are defined in the template.
From the drop-down, select ACE/ACL that Match/Do not match Any/All/ Exactly rules in the template.
These options dictate how the rules are evaluated when the report is run.
Rule - Click the Add Rule drop-down to select one or more predefined rules.
Or click Add Rule > Custom Rule to create a rule with custom conditions.
The following predefined rules that are available for selection.
Rule
Description
Trustee is user
Search for all users with any type of permission.
Trustee is unresolved
Search for the paths on which Unresolved SIDs (the SIDs which cannot be mapped to any of the domains) have been granted permissions. In case of Unresolved SIDs, you cannot determine whether the SID belongs to a user or group.
Trustee is Everyone
Search for all ACEs where the group of type Everyone has permission.
Trustee is Disabled
Search the paths where disabled users have been granted any permission of type Allow or Deny.
Trustee is Deleted
Search the paths where deleted users have been granted any permission of type Allow or Deny.
Trustee is non-domain account
Search for all users or groups which do not belong to any configured domain in the directory service. For example, this search query fetches all users or groups that do not belong to either Domain Local, Global, or Universal group.
Trustee is empty group
Search for all groups that have permissions on paths but do not have any members.
Trustee is open group
Search for the user groups that are specified in an open share policy.
For more information about open share policy, see the Veritas Data Insight Administration Guide.
Permission is Full
Search for the users or groups which have the Full Control (Allow) on a file or folder.
Permission is Deny
Search for the users or groups that have the Deny setting for any kind of permission.
- Click Share Template to enable specific users to reuse the template.
- Click Save.