Veritas Data Insight User's Guide
- Section I. Introduction
- Section II. Data Insight Workspace
- Navigating the Workspace tab
- Analyzing data using the Workspace views
- Viewing access information for files and folders
- About viewing file or folder summary
- Viewing the overview of a data source
- Managing data custodian for paths
- Viewing user activity on files or folders
- Viewing file and folder activity
- Viewing CIFS permissions on folders
- Viewing NFS permissions on folders
- Viewing SharePoint permissions for folders
- Viewing OneDrive permissions for folders
- Viewing Box permissions on folders
- Viewing audit logs for files and folders
- About visualizing collaboration on a share
- Viewing access information for users and user groups
- Viewing the overview of a user
- Viewing the overview of a group
- Managing custodian assignments for users
- Viewing folder activity by users
- Viewing CIFS permissions for users
- Viewing CIFS permissions for user groups
- Viewing NFS permissions for users and user groups
- Viewing SharePoint permissions for users and user groups
- Viewing Box permissions for users and user groups
- Viewing audit logs for users
- Section III. Data Insight reports
- Using Data Insight reports
- About Data Insight reports
- How Data Insight reporting works
- Creating a report
- About Data Insight security reports
- Activity Details report
- Permissions reports
- Inactive Users
- Path Permissions
- Permissions Search report
- About Permissions Query templates
- Creating a Permissions Query Template
- Creating custom rules
- Permissions Query Template actions
- Using Permissions Search report output to remediate permissions
- Entitlement Review
- User/Group Permissions
- Group Change Impact Analysis
- Ownership Reports
- Create/Edit security report options
- About Data Insight storage reports
- Create/Edit storage report options
- About Data Insight custom reports
- Considerations for importing paths using a CSV file
- Managing reports
- About managing Data Insight reports
- Viewing reports
- Filtering a report
- Editing a report
- About sharing reports
- Copying a report
- Running a report
- Viewing the progress of a report
- Customizing a report output
- Configuring a report to generate a truncated output
- Sending a report by email
- Automatically archiving reports
- Canceling a report run
- Deleting a report
- Considerations for viewing reports
- Organizing reports using labels
- Using Data Insight reports
- Section IV. Remediation
- Configuring remediation workflows
- About remediation workflows
- Prerequisites for configuring remediation workflows
- Configuring Self-Service Portal settings
- About workflow templates
- Managing workflow templates
- Creating a workflow using a template
- Managing workflows
- Auditing workflow paths
- Monitoring the progress of a workflow
- Remediating workflow paths
- Using the Self-Service Portal
- About the Self-Service Portal
- Logging in to the Self-Service Portal
- Using the Self-Service Portal to review user entitlements
- Using the Self-Service Portal to manage Data Loss Prevention (DLP) incidents
- Using the Self-Service Portal to confirm ownership of resources
- Using the Self-Service Portal to classify sensitive data
- Managing data
- About managing data using Enterprise Vault and custom scripts
- Managing data from the Shares list view
- Managing inactive data from the Folder Activity tab
- Managing inactive data by using a report
- Archiving workflow paths using Enterprise Vault
- Using custom scripts to manage data
- Pushing classification tags while archiving files into Enterprise Vault
- About adding tags to devices, files, folders, and shares
- Managing permissions
- Configuring remediation workflows
- Appendix A. Command Line Reference
- Index
Viewing shares summary
The list view of the Shares tile displays the complete list of shares that are configured in Data Insight. Click the plus sign next to a data source to drill down to the folder level details.
Depending on the selected perspective, you may view the following details about your data source:
Information whether a share is an open share.
The type of activity that is reported for the share. For example, none (no activity), single user, multi-user, or collaborative activity.
Number of sensitive files present on the share.
Total number of active users.
The risk score of a share considering the maximum number of users with permissions on the share, the active user count, and the sensitive file count of the share. A higher count of users who access the share and sensitive files on the share contribute to a higher risk for a share.
Total access count reported on the share.
Total number of active files present in the share.
Total files present in the share.
Disk-space occupied by the share.
Inactive data size.
Select a row in the Shares list-view to see a summary of the corresponding share. The Summary panel displays the following information of a share:
Information whether the share is an open share.
For information about open shares and configuring an open share policy, see the Veritas Data Insight Administrator's Guide.
Whether the share is a control point.
See About control points.
The owner of the data source and the Workspace Data Owner Policy that is used to compute the owner.
Total disk-space occupied by the share.
Total number of files present on the share.
Details of the user who owns the share.
Counts of folders, active users, and control points present in the share.
Counts of active, inactive, and sensitive files present in the share.
Risk-score for the share.
The tags assigned to the files on the share. This is a consolidated list of tags derived from Veritas Information Classifier and Symantec Data Loss Prevention.
The custodian assigned on share.
Attributes of the users who have activity on the data source.
You can archive paths direct from the Shares list view.
See Managing data from the Shares list view.
Click on the Summary panel to open the profile panel for the share or site collection. You can do the following on the profile views:
View overview information for the share or site collection.
View and assign custodian
View details of user activity on the paths.
View details of activity by configured users on the paths.
View the details of permissions on the paths.
View audit logs.