Important Update: Cohesity Products Documentation
All Cohesity product documentation are now managed via the Cohesity Docs Portal: https://docs.cohesity.com/HomePage/Content/home.htm. Some documentation available here may not reflect the latest information or may no longer be accessible.
Arctera Insight Information Governance User's Guide
- Section I. Introduction
- Information Governance Dashboard
- Information Governance Workspace
- Section II. Information Governance reports
- Using Information Governance reports
- About Information Governance reports
- How Information Governance reporting works
- Creating a report
- About Information Governance security reports
- Activity Details report
- Permissions reports
- Inactive Users
- Path Permissions
- Permissions Search report
- About Permissions Query templates
- Creating a Permissions Query Template
- Creating custom rules
- Permissions Query Template actions
- Using Permissions Search report output to remediate permissions
- Entitlement Review
- User/Group Permissions
- Group Change Impact Analysis
- Ownership Reports
- Create/Edit security report options
- About Information Governance storage reports
- Create/Edit storage report options
- About Information Governance custom reports
- Considerations for importing paths using a CSV file
- Managing reports
- About managing Information Governance reports
- Viewing reports
- Filtering a report
- Editing a report
- About sharing reports
- Copying a report
- Running a report
- Viewing the progress of a report
- Customizing a report output
- Configuring a report to generate a truncated output
- Sending a report by email
- How does number of records field work differently from the truncate output records field?
- Automatically archiving reports
- Canceling a report run
- Deleting a report
- Considerations for viewing reports
- Organizing reports using labels
- Using Information Governance reports
- Section III. Remediation
- Configuring remediation workflows
- About remediation workflows
- Prerequisites for configuring remediation workflows
- Configuring Self-Service Portal settings
- About workflow templates
- Managing workflow templates
- Creating a workflow using a template
- Managing workflows
- Auditing workflow paths
- Monitoring the progress of a workflow
- Remediating workflow paths
- Using the Self-Service Portal
- About the Self-Service Portal
- Logging in to the Self-Service Portal
- Using the Self-Service Portal to review user entitlements
- Using the Self-Service Portal to manage Data Loss Prevention (DLP) incidents
- Using the Self-Service Portal to confirm ownership of resources
- Using the Self-Service Portal to classify sensitive data
- Managing data
- About managing data using Arctera Enterprise Vault and custom scripts
- Managing data from the Shares list view
- Managing inactive data from the Folder Activity tab
- Managing inactive data by using a report
- Archiving workflow paths using Arctera Enterprise Vault
- Using custom scripts to manage data
- Pushing classification tags while archiving files into Arctera Enterprise Vault
- About adding tags to devices, files, folders, and shares
- Managing permissions
- Configuring remediation workflows
- Appendix A. Command Line Reference
- Index
Data
The Data tab serves as the default workspace view, providing a comprehensive inventory and analysis of all integrated data repositories. It allows administrators to monitor the health, scale, and risk profile of diverse storage environments from a single interface.
The Data tab features a view selection dropdown menu that allows you to change the focus of the dashboard based on your current task. By selecting one of the three available views, the table updates to show the most relevant metrics for that specific governance goal:
Storage: Use this default view for capacity planning and identifying data growth. This perspective highlights space consumption and identifies "cold" data through the Inactive Files and Inactive Size columns, which is essential for reclaiming storage and reducing costs.
Security: Use this view to assess risk and protect sensitive information. It prioritizes visibility into potential vulnerabilities by showing the number of Open Share points and the Open Share Size. It also flags Sensitive Files that may contain restricted data.
Activity: Use this view to understand how your data is being utilized in real-time. This perspective tracks "hot" data by showing Active Files and Active Users to help administrators identify resources critical to daily operations.
Using Search and Filters
To quickly locate specific data repositories or refine the list of displayed sources, follow these procedures:
Search path: Enter a specific server name, IP address, or file path (e.g., Example: Filer/Share/) into the search bar. The table updates in real-time to display only the sources that match your criteria.
Apply a Filter: Click the Filter icon (funnel) next to the search bar to set specific governance parameters and narrow down the list of data sources.
Adjust Items Per Page: Use the Items per page drop-down menu to select how many rows are visible at once (e.g., 20, 50, or 100).
Refresh: Represented by a circular arrow icon, this tool updates the dashboard metrics in real-time to ensure counts reflect the most recent data collected.
Download: Represented by an arrow pointing down to a horizontal line, this tool allows you to export the information currently displayed in the table for external reporting or offline analysis.
For granular info, click More Details. This pane provides a deeper look into data metadata, including specific file system attributes, access control lists (ACLs), and last-accessed timestamp that may not be visible in the main table view. It serves as a quick-reference tool for verifying object-level details without leaving the Workspace.
Note:
Cross-referencing to other sections is not supported within the More Details pane. Please use the main table of contents or search functionality to navigate to related documentation topics.