Veritas Data Insight User's Guide
- Section I. Introduction
- Section II. Data Insight Workspace
- Navigating the Workspace tab
- Analyzing data using the Workspace views
- Viewing access information for files and folders
- About viewing file or folder summary
- Viewing the overview of a data source
- Managing data custodian for paths
- Viewing user activity on files or folders
- Viewing file and folder activity
- Viewing CIFS permissions on folders
- Viewing NFS permissions on folders
- Viewing SharePoint permissions for folders
- Viewing OneDrive permissions for folders
- Viewing Box permissions on folders
- Viewing audit logs for files and folders
- About visualizing collaboration on a share
- Viewing access information for users and user groups
- Viewing the overview of a user
- Viewing the overview of a group
- Managing custodian assignments for users
- Viewing folder activity by users
- Viewing CIFS permissions for users
- Viewing CIFS permissions for user groups
- Viewing NFS permissions for users and user groups
- Viewing SharePoint permissions for users and user groups
- Viewing Box permissions for users and user groups
- Viewing audit logs for users
- Section III. Data Insight reports
- Using Data Insight reports
- About Data Insight reports
- How Data Insight reporting works
- Creating a report
- About Data Insight security reports
- Activity Details report
- Permissions reports
- Inactive Users
- Path Permissions
- Permissions Search report
- About Permissions Query templates
- Creating a Permissions Query Template
- Creating custom rules
- Permissions Query Template actions
- Using Permissions Search report output to remediate permissions
- Entitlement Review
- User/Group Permissions
- Group Change Impact Analysis
- Ownership Reports
- Create/Edit security report options
- About Data Insight storage reports
- Create/Edit storage report options
- About Data Insight custom reports
- Considerations for importing paths using a CSV file
- Managing reports
- About managing Data Insight reports
- Viewing reports
- Filtering a report
- Editing a report
- About sharing reports
- Copying a report
- Running a report
- Viewing the progress of a report
- Customizing a report output
- Configuring a report to generate a truncated output
- Sending a report by email
- Automatically archiving reports
- Canceling a report run
- Deleting a report
- Considerations for viewing reports
- Organizing reports using labels
- Using Data Insight reports
- Section IV. Remediation
- Configuring remediation workflows
- About remediation workflows
- Prerequisites for configuring remediation workflows
- Configuring Self-Service Portal settings
- About workflow templates
- Managing workflow templates
- Creating a workflow using a template
- Managing workflows
- Auditing workflow paths
- Monitoring the progress of a workflow
- Remediating workflow paths
- Using the Self-Service Portal
- About the Self-Service Portal
- Logging in to the Self-Service Portal
- Using the Self-Service Portal to review user entitlements
- Using the Self-Service Portal to manage Data Loss Prevention (DLP) incidents
- Using the Self-Service Portal to confirm ownership of resources
- Using the Self-Service Portal to classify sensitive data
- Managing data
- About managing data using Enterprise Vault and custom scripts
- Managing data from the Shares list view
- Managing inactive data from the Folder Activity tab
- Managing inactive data by using a report
- Archiving workflow paths using Enterprise Vault
- Using custom scripts to manage data
- Pushing classification tags while archiving files into Enterprise Vault
- About adding tags to devices, files, folders, and shares
- Managing permissions
- Configuring remediation workflows
- Appendix A. Command Line Reference
- Index
About the risk score for users
Data Insight enables you to monitor malicious activity in your storage environment. Data Insight profiles all users by assigning a risk-score to every configured user. It displays the riskiness of a user in terms of a numerical score that ranges from 0 to 100. Higher the risk score of a user, higher is the perceived risk posed by the user.
The risk score places each user at a relative distance from other users and orders them in accordance with how risky a user is in comparison to other users.
A risky user typically displays anomalies such as:
The fraction of the total number of data sources that a user has permissions on. (Access)
Abrupt deviation in activity pattern where deviation on activity on sensitive files is given more weightage. (Anomaly)
Abnormal increase in number of alerts against the user. (Alerts)
Note that the user risk score is computed by considering the individual scores of different parameters for the last 15 days by default. The user risk score is calculated on a daily basis and stored for the last 180 days.
The risk score assigned to a user helps you do the following:
Identify potentially malicious users.
Review the permissions that are granted to the users.
Review if a risky user is a custodian on any storage resource.
Review the top active and sensitive data that is being accessed by the risky user.
Add a user with a high risk score to a watchlist to enable you to closely monitor the user's activities.
Data Insight computes the risk-score for a user based on the weighted sum of individual scores of the following parameters.
Table: Components for computing user risk score
Components | Descriptions |
|---|---|
Deviation in accesses pattern on sensitive and non-sensitive files. | The overall deviation score is the weighted sum of the deviation values for sensitive and non-sensitive files. |
Number of alerts against the user. | Percentage of alerts for a user against the total number of alerts, weighted by the severity of the policy that was violated. |
Number of shares the user has read access on. | Percentage of shares on which the user has read access, against the total shares across all the storage devices. |
Number of shares the user has write access on. | Percentage of shares on which the user has write access, against the total shares across all the storage devices. |
Number of shares the user is custodian on. | Percentage of shares for which the user is a custodian, against the total shares across all the storage devices. |
Deviation in the number of unique files that are accessed by the user. (Considering sensitive and non-sensitive files) | Overall score is the weighted sum of unique files that are accessed during past 15 days. |
Deviation in the number of unique files that are accessed by the user. (Considering sensitive files only) | Overall score is the weighted sum of unique files that are accessed during past 15 days. |
Deviation in the number of distinct DLP policies violated by the files accessed by the user. | Overall score is weighted sum of DLP policies. The weights are proportional to the severity level of the policies. |
Data Insight assigns a default priority to these parameters when calculating their weighted sum.
The User Risk Dossier provides the next level of details of the factors that contribute towards the user risk score.
Note:
Accessing AIP/MIP labeled files will add to the user risk score.