Important Update: Cohesity Products Documentation
All Cohesity product documentation are now managed via the Cohesity Docs Portal: https://docs.cohesity.com/HomePage/Content/home.htm. Some documentation available here may not reflect the latest information or may no longer be accessible.
Arctera Insight Information Governance User's Guide
- Section I. Introduction
- Section II. Information Governance Workspace
- Navigating the Workspace tab
- Analyzing data using the Workspace views
- Viewing access information for files and folders
- About viewing file or folder summary
- Viewing the overview of a data source
- Viewing the overview of a filer or Web application
- Managing data custodian for paths
- Viewing active users of a file or folder
- Viewing inactive users
- Viewing folder activity by time
- Viewing activity on sub-folders and files
- Viewing inactive sub-folders
- Viewing user activity by time
- Viewing user activity by folders
- Viewing user activity on files or folders
- Viewing file and folder activity
- Viewing CIFS permissions on folders
- Viewing NFS permissions on folders
- Viewing SharePoint permissions for folders
- Viewing OneDrive permissions for folders
- Viewing Box permissions on folders
- Viewing audit logs for files and folders
- About visualizing collaboration on a share
- Viewing access information for users and user groups
- Viewing the overview of a user
- Viewing the overview of a group
- Managing custodian assignments for users
- Viewing folder activity by users
- Viewing CIFS permissions for users
- Viewing CIFS permissions for user groups
- Viewing NFS permissions for users and user groups
- Viewing SharePoint permissions for users and user groups
- Viewing Box permissions for users and user groups
- Viewing audit logs for users
- Section III. Information Governance reports
- Using Information Governance reports
- About Information Governance reports
- How Information Governance reporting works
- Creating a report
- About Information Governance security reports
- Activity Details report
- Permissions reports
- Inactive Users
- Path Permissions
- Permissions Search report
- About Permissions Query templates
- Creating a Permissions Query Template
- Creating custom rules
- Permissions Query Template actions
- Using Permissions Search report output to remediate permissions
- Entitlement Review
- User/Group Permissions
- Group Change Impact Analysis
- Ownership Reports
- Create/Edit security report options
- About Information Governance storage reports
- Create/Edit storage report options
- About Information Governance custom reports
- Considerations for importing paths using a CSV file
- Managing reports
- About managing Information Governance reports
- Viewing reports
- Filtering a report
- Editing a report
- About sharing reports
- Copying a report
- Running a report
- Viewing the progress of a report
- Customizing a report output
- Configuring a report to generate a truncated output
- Sending a report by email
- How does number of records field work differently from the truncate output records field?
- Automatically archiving reports
- Canceling a report run
- Deleting a report
- Considerations for viewing reports
- Organizing reports using labels
- Using Information Governance reports
- Section IV. Remediation
- Configuring remediation workflows
- About remediation workflows
- Prerequisites for configuring remediation workflows
- Configuring Self-Service Portal settings
- About workflow templates
- Managing workflow templates
- Creating a workflow using a template
- Managing workflows
- Auditing workflow paths
- Monitoring the progress of a workflow
- Remediating workflow paths
- Using the Self-Service Portal
- About the Self-Service Portal
- Logging in to the Self-Service Portal
- Using the Self-Service Portal to review user entitlements
- Using the Self-Service Portal to manage Data Loss Prevention (DLP) incidents
- Using the Self-Service Portal to confirm ownership of resources
- Using the Self-Service Portal to classify sensitive data
- Managing data
- About managing data using Arctera Enterprise Vault and custom scripts
- Managing data from the Shares list view
- Managing inactive data from the Folder Activity tab
- Managing inactive data by using a report
- Archiving workflow paths using Arctera Enterprise Vault
- Using custom scripts to manage data
- Pushing classification tags while archiving files into Arctera Enterprise Vault
- About adding tags to devices, files, folders, and shares
- Managing permissions
- Configuring remediation workflows
- Appendix A. Command Line Reference
- Index
About data custodian
A Information Governance user assigned server administrator role can designate one or more persons as the custodian of a data location. The assigned custodian does not require access to files or folders.
Information Governance uses information about custodians to infer persons responsible for remediation and to determine report recipients. Tagging data repositories with custodians also provides you an explicit point-of-contact for data ownership queries.
A custodian is a user who has a record within Active Directory, NIS, NIS+ or LDAP, Azure AD, or any other implementation that keeps user records. A group cannot be assigned as a custodian. The custodian tags are assigned at the parent level and are automatically inherited by all subfolders and files. Custodian tags are only assigned at filer, share, or folder level for CIFS and NFS file systems and web application, site collection, or folder level for SharePoint. For SharePoint Online, you can assign custodians at the account, site collection, and folder level, while for Microsoft OneDrive custodians can be assigned at the account, user account, or folder level. You cannot directly assign a custodian to files. In addition to physical paths, custodians can also be assigned on DFS paths.
Information Governance applies custodian assignment at any level in the following ways:
If a subfolder is renamed within the same parent, no changes apply to custodian tags on that subfolder.
If a subfolder is moved from one parent to another, then the inherited tags of the previous parent are removed and the tags of the new parent are automatically inherited.
Tags that are explicitly assigned move with the subfolder. This also applies to everything under the sub-tree of the moved subfolder.
You must manually remove the custodian assignment from Information Governance. For example, if an assigned custodian's record is deleted from Active Directory, Information Governance does not automatically remove that custodian from the data location to which the custodian is assigned.
See Managing data custodian for paths.
You can automatically assign custodians on various paths and generate a comma-separated values (CSV) file with information about data custodian assignments using the mxcustodian.exe utility. For more details,
As a Information Governance administrator, you can assign custodians to multiple paths at once. For more infomation about assigning custodians in bulk, see the Arctera Insight Information Governance Administrator's Guide.
More Information