Veritas Data Insight User's Guide
- Section I. Introduction
- Section II. Data Insight Workspace
- Navigating the Workspace tab
- Analyzing data using the Workspace views
- Viewing access information for files and folders
- About viewing file or folder summary
- Viewing the overview of a data source
- Managing data custodian for paths
- Viewing user activity on files or folders
- Viewing file and folder activity
- Viewing CIFS permissions on folders
- Viewing NFS permissions on folders
- Viewing SharePoint permissions for folders
- Viewing OneDrive permissions for folders
- Viewing Box permissions on folders
- Viewing audit logs for files and folders
- About visualizing collaboration on a share
- Viewing access information for users and user groups
- Viewing the overview of a user
- Viewing the overview of a group
- Managing custodian assignments for users
- Viewing folder activity by users
- Viewing CIFS permissions for users
- Viewing CIFS permissions for user groups
- Viewing NFS permissions for users and user groups
- Viewing SharePoint permissions for users and user groups
- Viewing Box permissions for users and user groups
- Viewing audit logs for users
- Section III. Data Insight reports
- Using Data Insight reports
- About Data Insight reports
- How Data Insight reporting works
- Creating a report
- About Data Insight security reports
- Activity Details report
- Permissions reports
- Inactive Users
- Path Permissions
- Permissions Search report
- About Permissions Query templates
- Creating a Permissions Query Template
- Creating custom rules
- Permissions Query Template actions
- Using Permissions Search report output to remediate permissions
- Entitlement Review
- User/Group Permissions
- Group Change Impact Analysis
- Ownership Reports
- Create/Edit security report options
- About Data Insight storage reports
- Create/Edit storage report options
- About Data Insight custom reports
- Considerations for importing paths using a CSV file
- Managing reports
- About managing Data Insight reports
- Viewing reports
- Filtering a report
- Editing a report
- About sharing reports
- Copying a report
- Running a report
- Viewing the progress of a report
- Customizing a report output
- Configuring a report to generate a truncated output
- Sending a report by email
- Automatically archiving reports
- Canceling a report run
- Deleting a report
- Considerations for viewing reports
- Organizing reports using labels
- Using Data Insight reports
- Section IV. Remediation
- Configuring remediation workflows
- About remediation workflows
- Prerequisites for configuring remediation workflows
- Configuring Self-Service Portal settings
- About workflow templates
- Managing workflow templates
- Creating a workflow using a template
- Managing workflows
- Auditing workflow paths
- Monitoring the progress of a workflow
- Remediating workflow paths
- Using the Self-Service Portal
- About the Self-Service Portal
- Logging in to the Self-Service Portal
- Using the Self-Service Portal to review user entitlements
- Using the Self-Service Portal to manage Data Loss Prevention (DLP) incidents
- Using the Self-Service Portal to confirm ownership of resources
- Using the Self-Service Portal to classify sensitive data
- Managing data
- About managing data using Enterprise Vault and custom scripts
- Managing data from the Shares list view
- Managing inactive data from the Folder Activity tab
- Managing inactive data by using a report
- Archiving workflow paths using Enterprise Vault
- Using custom scripts to manage data
- Pushing classification tags while archiving files into Enterprise Vault
- About adding tags to devices, files, folders, and shares
- Managing permissions
- Configuring remediation workflows
- Appendix A. Command Line Reference
- Index
About visualizing collaboration on a share
To understand the collaboration of users on a share, Data Insight provides a collaboration graph that helps you visualize how a set of users and individual users are collaborating on a share. Data Insight identifies a share as collaborative, if a significant number of users access or change the same or different files directly under a folder within a given time period. For example, if User A creates, reads, modifies, and renames abc.txt under \\g\s\a\b\foo and User B modifies xyz.txt under \\g\s\a\b\foo, then User A and User B are said to be collaborating. Share \\g\s is considered as a collaborative share.
The time period for analyzing collaborative activity on a share is configured on the Settings > Advanced Analytics page. For more information, see Veritas Data Insight Administrator's Guide.
The Social Network Map graph provides you with a global picture of collaborative behavior among users based on their activity on the selected share. It also helps you visualize the various organizational units that may be collaborating on a share. It enables you to identify users who are working closely together or users who stand out because their activity patten is less collaborative as compared to users who are actively collaborating among themselves. Collaborating users are grouped together in clusters and connecting lines are used to show collaboration between the users. Users that are connected with a dense network of lines indicate a high level of collaboration between them. While the users that are loosely connected show low or weak collaboration.
The Social Network Map groups users in clusters based on their collaboration and each cluster has a different color-code. The users in a cluster are classified on the basis of certain attributes. For more information about configuring user attributes, see the Veritas Data Insight Administrator's Guide.
You can use the Social Network Map tool to visualize collaboration per share, and not across your entire storage environment.
You can use the Social Network Map to do the following:
Analyze the activity pattern among users and groups and identify the level of collaboration on a share.
Identify the pattern of collaboration between different cluster groups.
Collaborative activity on a share.
Identify weakly-connected users who are not collaborating within a folder, but have activity on the share.
Visualize the various organizational units that may be collaborating on a share.
Identify and analyze outlier users based on organizational units and other attributes.
Export the graph along with information about user attributes and degree of collaboration to an output file.