Veritas Data Insight User's Guide
- Section I. Introduction
- Section II. Data Insight Workspace
- Navigating the Workspace tab
- Analyzing data using the Workspace views
- Viewing access information for files and folders
- About viewing file or folder summary
- Viewing the overview of a data source
- Managing data custodian for paths
- Viewing user activity on files or folders
- Viewing file and folder activity
- Viewing CIFS permissions on folders
- Viewing NFS permissions on folders
- Viewing SharePoint permissions for folders
- Viewing OneDrive permissions for folders
- Viewing Box permissions on folders
- Viewing audit logs for files and folders
- About visualizing collaboration on a share
- Viewing access information for users and user groups
- Viewing the overview of a user
- Viewing the overview of a group
- Managing custodian assignments for users
- Viewing folder activity by users
- Viewing CIFS permissions for users
- Viewing CIFS permissions for user groups
- Viewing NFS permissions for users and user groups
- Viewing SharePoint permissions for users and user groups
- Viewing Box permissions for users and user groups
- Viewing audit logs for users
- Section III. Data Insight reports
- Using Data Insight reports
- About Data Insight reports
- How Data Insight reporting works
- Creating a report
- About Data Insight security reports
- Activity Details report
- Permissions reports
- Inactive Users
- Path Permissions
- Permissions Search report
- About Permissions Query templates
- Creating a Permissions Query Template
- Creating custom rules
- Permissions Query Template actions
- Using Permissions Search report output to remediate permissions
- Entitlement Review
- User/Group Permissions
- Group Change Impact Analysis
- Ownership Reports
- Create/Edit security report options
- About Data Insight storage reports
- Create/Edit storage report options
- About Data Insight custom reports
- Considerations for importing paths using a CSV file
- Managing reports
- About managing Data Insight reports
- Viewing reports
- Filtering a report
- Editing a report
- About sharing reports
- Copying a report
- Running a report
- Viewing the progress of a report
- Customizing a report output
- Configuring a report to generate a truncated output
- Sending a report by email
- Automatically archiving reports
- Canceling a report run
- Deleting a report
- Considerations for viewing reports
- Organizing reports using labels
- Using Data Insight reports
- Section IV. Remediation
- Configuring remediation workflows
- About remediation workflows
- Prerequisites for configuring remediation workflows
- Configuring Self-Service Portal settings
- About workflow templates
- Managing workflow templates
- Creating a workflow using a template
- Managing workflows
- Auditing workflow paths
- Monitoring the progress of a workflow
- Remediating workflow paths
- Using the Self-Service Portal
- About the Self-Service Portal
- Logging in to the Self-Service Portal
- Using the Self-Service Portal to review user entitlements
- Using the Self-Service Portal to manage Data Loss Prevention (DLP) incidents
- Using the Self-Service Portal to confirm ownership of resources
- Using the Self-Service Portal to classify sensitive data
- Managing data
- About managing data using Enterprise Vault and custom scripts
- Managing data from the Shares list view
- Managing inactive data from the Folder Activity tab
- Managing inactive data by using a report
- Archiving workflow paths using Enterprise Vault
- Using custom scripts to manage data
- Pushing classification tags while archiving files into Enterprise Vault
- About adding tags to devices, files, folders, and shares
- Managing permissions
- Configuring remediation workflows
- Appendix A. Command Line Reference
- Index
Using the match-type criteria
If there are multiple rules in a template, the report output displays the results of the configured rules based on the match type criteria that you select.
The expected results that the ACE search report will return depends on the match type that you select. For example, if the template consists of two rules:
Trustee is user (Rule 1)
Trustee is disabled (Rule 2)
Table: ACE Search match-type criteria
Match type Criteria | Expected Result |
|---|---|
Match any of the rules | The report output returns such paths that match either Rule 1 or Rule 2. Thus, the report displays records (paths) with ACEs where a trustee of type user has Allow or Deny type of permission or where the trustee state is Disabled. In the report, Unmatched Rules column shows the rule that does not match. |
Match all of the rules | The report output displays all such paths with ACEs that match both the rules. Thus, the report displays such paths where a trustee of type user has or type of permission and where the trustee state is . In the report, Unmatched Rules column must not show any configured rules. |
Do not match any of the rules | The report output returns such paths with ACEs, where none of the ACES match any of the configured rules. In the report, Unmatched Rules column shows both the configured rules. |
Do not match all of the rules | The report output returns such paths that do not match every configured rule, but may match some of the rules. Thus, some paths may match Rule 1 and some paths may match Rule 2. In this case, the report returns all such paths where the Trustee is a user or the paths where a disabled user has Allow or Deny type of permission. The Unmatched Rules column should always show at least one rule. |
In case of an ACL search report, the report returns the complete ACL although the rules evaluate the individual ACEs within the ACL.
For example, the template consists of the following rules:
CIFS Permission is (Full) SharePoint Permission is (Full Control) (Rule 1)
Trustee is Everyone (Rule 2)
Trustee is Unresolved (Rule 3)
ACE count = 3 (Rule 4)
Table: ACL Search Match-type criteria
Match type Criteria | Expected Result |
|---|---|
ACLs that match any of the rules | The report output returns such ACLs where at least one ACE within each ACL matches at least one configured rule. The Unmatched Rules column displays the rules that do not match |
ACLs that match all of the rules | The report output returns such ACLs where ACEs across each ACL match all configured rules. Thus, a single ACE within an ACL may fulfill all the rules or all ACES across an ACL may fulfill all the rules. Thus, the report may return ACL 1, ACL 2, and ACL 3 where the ACEs across each ACL match rules 1 to 4. |
ACLs that match exactly all the rules | The report output returns such ACLs where each ACE within the ACL matches either rule 1,2,3, or 4 or all configured rules. All ACEs within an ACL should match at least one rule, and all configured rules should be present within the ACL. Thus, if an ACL has an ACE that does not match any of the configured rules, that ACL will not be displayed in the report. |
ACLs that do not match any of the rules | The report returns such ACLs where for every ACE none of the rules should be matching. All configured rules should ideally show under the Unmatched rules column in the report. |
ACLs that do not match all of the rules | The report output returns such ACLs where the ACEs within the ACL do not match the complete set of configured rules, however the ACEs within the ACL may match some of the rules. Thus, the configured rule set should not match at least one ACE. The Unmatched Rules column should always show at least one rule. |
ACLs that do not match exactly all the rules | The report output returns such paths where at least one ACE within the ACL should not match the configured rule set. Or at least one rule should not be present within the ACL. |