Veritas Data Insight Administrator's Guide
- Section I. Getting started
- Introduction to Veritas Data Insight administration
- Configuring Data Insight global settings
- About Data Insight licensing
- Configuring SMTP server settings
- About scanning and event monitoring
- About filtering certain accounts, IP addresses, and paths
- About archiving data
- About Data Insight integration with Symantec Data Loss Prevention (DLP)
- Importing sensitive files information through CSV
- Configuring advanced analytics
- About open shares
- About user risk score
- Configuring file groups
- Configuring Workspace data owner policy
- Configuring Management Console settings
- About bulk assignment of custodians
- Configuring Watchlist settings
- Configuring Metadata Framework
- Proof of concept
- Section II. Configuring Data Insight
- Configuring Data Insight product users
- Configuring Data Insight product servers
- About Data Insight product servers
- Adding a new Data Insight server
- Managing Data Insight product servers
- Viewing Data Insight server details
- About node templates
- Adding Portal role to a Data Insight server
- Adding Classification Server role to a Data Insight server
- Assigning Classification Server to a Collector
- Associating a Classification Server pool to a Collector
- Viewing in-progress scans
- Configuring Data Insight services
- Configuring advanced settings
- Monitoring Data Insight jobs
- Rotating the encryption keys
- Viewing Data Insight server statistics
- About automated alerts for patches and upgrades
- Deploying upgrades and patches remotely
- Using the Upload Manager utility
- About migrating storage devices across Indexers
- Viewing the status of a remote installation
- Configuring saved credentials
- Configuring directory service domains
- About directory domain scans
- Adding a directory service domain to Data Insight
- Managing directory service domains
- Fetching users and groups data from NIS+ scanner
- Configuring attributes for advanced analytics
- Deleting directory service domains
- Scheduling scans
- Configuring business unit mappings
- Importing additional attributes for users and user groups
- Configuring containers
- Section III. Configuring native file systems in Data Insight
- Configuring NetApp 7-mode file server monitoring
- About configuring NetApp file server monitoring
- Prerequisites for configuring NetApp file servers
- Credentials required for configuring NetApp filers
- Credentials required for configuring NetApp NFS filers
- Configuring SMB signing
- About FPolicy
- Preparing Data Insight for FPolicy
- Preparing the NetApp filer for Fpolicy
- Preparing the NetApp vfiler for Fpolicy
- Configuring NetApp audit settings for performance improvement
- Preparing a non-administrator domain user on the NetApp filer for Data Insight
- Enabling export of NFS shares on a NetApp file server
- Excluding volumes on a NetApp file server
- Handling NetApp home directories in Data Insight
- Configuring clustered NetApp file server monitoring
- About configuring a clustered NetApp file server
- About configuring FPolicy in Cluster-Mode
- Pre-requisites for configuring clustered NetApp file servers
- Credentials required for configuring a clustered NetApp file server
- Preparing a non-administrator local user on the clustered NetApp filer
- Preparing a non-administrator domain user on a NetApp cluster for Data Insight
- Preparing Data Insight for FPolicy in NetApp Cluster-Mode
- Preparing the ONTAP cluster for FPolicy
- About configuring secure communication between Data Insight and cluster-mode NetApp devices
- Enabling export of NFS shares on a NetApp Cluster-Mode file server
- Enabling SSL support for Cluster Mode NetApp auditing
- Configuring EMC Celerra or VNX monitoring
- Configuring EMC Isilon monitoring
- About configuring EMC Isilon filers
- Prerequisites for configuration of Isilon or Unity VSA file server monitoring
- Credentials required for configuring an EMC Isilon cluster
- Configuring audit settings on EMC Isilon cluster using OneFS GUI console
- Configuring audit settings on EMC Isilon cluster using the OneFS CLI
- Configuring Isilon audit settings for performance improvement
- Preparing Veritas Data Insight to receive event notifications from an EMC Isilon or Unity VSA cluster
- Creating a non-administrator user for an EMC Isilon cluster
- Utilizing access zone's SmartConnect Zone/Alias mappings
- Purging the audit logs in an Isilon filer
- Configuring EMC Unity VSA file servers
- Configuring Hitachi NAS file server monitoring
- Configuring Windows File Server monitoring
- Configuring Veritas File System (VxFS) file server monitoring
- Configuring monitoring of a generic device
- Managing file servers
- About configuring filers
- Viewing configured filers
- Adding filers
- Add/Edit NetApp filer options
- Add/Edit NetApp cluster file server options
- Add/Edit EMC Celerra filer options
- Add/Edit EMC Isilon file server options
- Add/Edit EMC Unity VSA file server options
- Add/Edit Windows File Server options
- Add/Edit Veritas File System server options
- Add/Edit a generic storage device options
- Add/Edit Hitachi NAS file server options
- Custom schedule options
- Editing filer configuration
- Deleting filers
- Viewing performance statistics for file servers
- About disabled shares
- Adding shares
- Managing shares
- Editing share configuration
- Deleting shares
- About configuring a DFS target
- Adding a configuration attribute for devices
- Configuring a DFS target
- About the DFS utility
- Running the DFS utility
- Importing DFS mapping
- Renaming storage devices
- Configuring NetApp 7-mode file server monitoring
- Section IV. Configuring SharePoint data sources
- Configuring monitoring of SharePoint web applications
- About SharePoint server monitoring
- Credentials required for configuring SharePoint servers
- Configuring a web application policy
- About the Data Insight web service for SharePoint
- Viewing configured SharePoint data sources
- Adding web applications
- Editing web applications
- Deleting web applications
- Adding site collections
- Managing site collections
- Removing a configured web application
- Configuring monitoring of SharePoint Online accounts
- About SharePoint Online account monitoring
- Registering Data Insight with Microsoft to enable SharePoint Online account monitoring
- Configuring application without user impersonation for Office 365
- Creating an application in the SharePoint Admin Center
- Configuring an administrator account for Data Insight
- Adding SharePoint Online accounts
- Managing a SharePoint Online account
- Adding site collections to SharePoint Online accounts
- Managing site collections
- Configuring monitoring of SharePoint web applications
- Section V. Configuring cloud data sources
- Configuring monitoring of Box accounts
- Configuring OneDrive account monitoring
- Managing cloud sources
- Section VI. Configuring Object Storage Sources
- Section VII. Health and monitoring
- Section VIII. Alerts and policies
- Section IX. Remediation
- Configuring remediation settings
- Section X. Reference
- Appendix A. Data Insight best practices
- Appendix B. Migrating Data Insight components
- Appendix C. Backing up and restoring data
- Appendix D. Data Insight health checks
- About Data Insight health checks
- Services checks
- Deployment details checks
- Generic checks
- Data Insight Management Server checks
- Data Insight Indexer checks
- Data Insight Collector checks
- Data Insight Windows File Server checks
- Data Insight SharePoint checks
- Classification server health checks
- Data Insight self service portal server health checks
- About Data Insight health checks
- Appendix E. Command File Reference
- Appendix F. Data Insight jobs
- Appendix G. Troubleshooting
- About general troubleshooting procedures
- About the Health Audit report
- Location of Data Insight logs
- Downloading Data Insight logs
- Migrating the data directory to a new location
- Troubleshooting FPolicy issues on NetApp devices
- Troubleshooting EMC Celera or VNX configuration issues
- Troubleshooting EMC Isilon configuration issues
- Troubleshooting SharePoint configuration issues
- Troubleshooting Hitachi NAS configuration issues
- Troubleshooting installation of Tesseract software
Setting Microsoft Purview Information Protection (MIP) Label
Microsoft Purview Information Protection (MIP) is a built in, intelligent, unified and extensible solution to protect sensitive data. MIP technology integration allows adding labels to the documents. The label might have a policy to restrict access to the sensitive documents.
Note:
Set MIP label action is supported only for CIFS devices.
In Data Insight, you can set MIP Labels in Online and Offline mode. In case of Online mode, if you are using proxy servers, setting Microsoft Purview Information Protection (MIP) Label functionality will not be supported.
Data Insight recommend Online mode because of ease in configuration and support encryption mode.
If you need to Set MIP on a collector node:
For a new collector node, ensure Azure Unified Client is installed on the node before installing Data Insight.
For an existing collector node where workflow services are running,
Install Azure Unified Client
Restart the workflow service
Prerequisites
On the Management Server,
install Azure Unified Client executable using https://learn.microsoft.com/en-us/azure/information-protection/rms-client/install-unifiedlabelingclient-app
install .NET Framework 4.6.2 or higher
Create Azure Application by following the steps given at https://learn.microsoft.com/en-us/azure/information-protection/rms-client/clientv2-admin-guide-powershell#create-and-configure-azure-ad-applications-for-set-aipauthentication
To set MIP labels in Online mode,
- Log in to Data Insight console and click Remediation > Data management in the left pane.
- Click Set Microsoft Purview Information Protection (MIP) Label and then click Edit in the right pane.
- You can select either User scan credentials or Select user in the Run As field. If your choice is Select user, make sure the selected user has access to the filer.
- Click MIP Action Mode and select Online
- Enter Tenant Id,Client Id Client Secret Key and Microsoft Administrator Account details.
Note:
User Microsoft Administrator Account which is either Global Administrator account or Minimum Privilege Account with Information Protector reader and Sensitivity Label reader privileges. For more information See Creating Minimum Privilege Account Role in Compliance Center .
- In the Run Set MIP Action on field, select the option where you want to run the set MIP action, either Management Server or Collector
Note:
If you are opting for Collector node, you need to perform all pre-requisite steps on the Collector node as well.
- Click OK
Note:
Encrypted labels are supported only in the Online mode.
Supported file extensions for encrypted labels are as follows:
Supported file extension |
|---|
.txt |
.xml |
.jpg |
.jpeg |
.png |
.tif |
.tiff |
.bmp |
.gif |
.jpe |
All Microsoft Office files |
After completing the steps above,
See Creating MIP label related policies in Veritas Information Classifier (VIC).
Prerequisites
On the Management Server,
install Azure Unified Client executable using https://learn.microsoft.com/en-us/azure/information-protection/rms-client/install-unifiedlabelingclient-app
install .NET Framework 4.6.2 or higher
Modify the Data Insight Workflow Service to run under a different account
To set MIP label, run the workflow service with the Domain user account, which is a part of Local Administrator group on the Management server.
To change the account, open Service Control Manager (run services.msc), locate the Data Insight Workflow Service and open the properties.
In the 'Log on' tab, change from 'Localsystem' to 'This account' and enter the domain\username and password.
Now restart the Workflow service and ensure it is in a 'running' state.
Assigning required rights to the user
You need to elevate the rights of the accounting calling CreateProcessAsUser with the Replace a process level token rights. To elevate the rights, navigate to Control Panel > Administrative Tools > Local Security Policy and add the user account to the Replace a process level token rights. To implement the changes, log out of the system.
Downloading list of MIP Labels
You can fetch MIP Labels either using PowerShell scripts or manual steps.
Downloading list of MIP Labels using PowerShell scripts
- If you want to download list of MIP labels using App Authentication method, create Azure Application by following the steps given at https://learn.microsoft.com/en-us/azure/information-protection/rms-client/clientv2-admin-guide-powershell#create-and-configure-azure-ad-applications-for-set-aipauthentication and then execute the following script
param ( [parameter(Mandatory=$true)] [string]$filePath, [parameter(Mandatory=$true)] [string]$AppID, [parameter(Mandatory=$true)] [string]$AppSecret, [parameter(Mandatory=$true)] [string]$TenantId, [parameter(Mandatory=$true)] [string]$DelegatedUser ) $creds = Get-Credential Set-AIPAuthentication -AppId $AppID -AppSecret $AppSecret -TenantId $TenantId -DelegatedUser $DelegatedUser Export-AIPLogs -FileName $filePath Clear-AIPAuthenticationNote:
Make sure the following string in point 1, comes in a single line.
Set-AIPAuthentication -AppId $AppID -AppSecret $AppSecret -TenantId $TenantId -DelegatedUser $DelegatedUser
After running the script, you will be prompted to enter the location where you want to download .zip file. For example, c:\temp\MIPlabel.zip
Enter Admin credentials of the machine where PowerShell is running.
Enter App ID, App Secret, Tenant ID and Delegate User credentials
- If you want to fetch labels by User Authentication method , execute the following script
param ( [parameter(Mandatory=$true)] [string]$filePath ) $creds = Get-Credential Set-AIPAuthentication -OnBehalfOf $creds Export-AIPLogs -FileName $filePath Clear-AIPAuthenticationAfter running the script, you will be prompted to enter the location where you want to download .zip file. For example, c:\temp\MIPlabel.zip
Enter Admin credentials of the machine where PowerShell is running.
After authentication, one more Microsoft pop up will appear.
Enter Azure User credentials, having minimum roles of Information Protection Reader and Sensitivity Label Reader.
- After fetching MIP Labels, open the ZIP file.
- Navigate to the MSIP folder and copy any files that have an .xml file name extension.
- Paste these files into the %localappdata%\Microsoft\MSIP folder on the Management Server node.
Downloading list of MIP Labels using manual steps
- Login to machine with internet connection and open PowerShell in elevated mode (Run as administrator)
Note:
The machine should have Azure Unified Client and .NET Framework 4.6.2 or higher installed.
- To Set AIP Authentication in the PowerShell, you have 2 options. Using App Authentication or Using User Authentication.
Using App Authentication
Create Azure Application by following the steps given at https://learn.microsoft.com/en-us/azure/information-protection/rms-client/clientv2-admin-guide-powershell#create-and-configure-azure-ad-applications-for-set-aipauthentication
Using User Authentication
Execute the following command Set-AIPAuthentication -OnBehalfOf .
A command pop up will appear.
Enter Admin credentials of the machine where PowerShell is running.
After authentication, one more Microsoft pop up will appear.
Enter Azure User credentials, having minimum roles of Information Protection Reader and Sensitivity Label Reader.
See Creating Minimum Privilege Account Role in Compliance Center .
- Execute the following command Export-AIPLogs -FileName <File location where we want to export logs>
Note:
The file extension should be .ZIP. For example: C:\policy.zip
- Execute the following command Clear-AIPAuthentication
- Navigate to the MSIP folder and copy any files that have an .xml file name extension.
- On the Management Server node, paste these files into the %localappdata%\Microsoft\MSIP folder, where %localappdata% is the AppData folder of the domain user account, through which the workflow services are running. For example, c:\Users\<domain user>\AppData
Note:
- You will not be able add any protected label (properties like encrypted mode) to files.
- You will not be able set any MIP label to encrypted files.
- Labels which have Allow offline access property set to Never or Some days, will not be applied as Data Insight supports only offline mode.
To set MIP labels in Offline mode,
- Log in to Data Insight console and click Remediation > Data management in the left pane.
- Click Set Microsoft Purview Information Protection (MIP) Label and then click Edit in the right pane.
- Click MIP Action Mode and select Online
- You can select either User scan credentials or Select user in the Run As field. If your choice is Select user, make sure the selected user must have access to the filer.
- In the Run Set MIP Action on field, select the option where you want to run the set MIP action, either Management Server or Collector
Note:
If you are opting for Collector node, you need to perform all pre-requisite steps on the Collector node as well.
- Click OK
For more information about this topic, refer to Configuring Policies in Veritas Information Classifier for MIP Labels section in the Data Insight Classification Guide.