Arctera Insight Information Governance Administrator's Guide
- Section I. Getting started
- Introduction to Arctera Insight Information Governance administration
- Configuring Information Governance global settings
- About Information Governance licensing
- SQLite WAL mode
- Configuring SMTP server settings
- About scanning and event monitoring
- Monitoring Indexer Node Storage Utilization
- About filtering certain accounts, IP addresses, and paths
- About archiving data
- About Information Governance integration with Data Loss Prevention (DLP)
- Importing sensitive files information through CSV
- Configuring advanced analytics
- About open shares
- About user risk score
- Configuring file groups
- Configuring Workspace data owner policy
- Configuring Management Console settings
- About bulk assignment of custodians
- Configuring Watchlist settings
- Configuring Metadata Framework
- Proof of concept
- Section II. Configuring Information Governance
- Configuring Information Governance product users
- Configuring Information Governance product servers
- About Information Governance product servers
- Adding a new Information Governance server
- Managing Information Governance product servers
- Viewing Information Governance server details
- About node templates
- Adding Portal role to a Information Governance server
- Adding Classification Server role to a Information Governance server
- Assigning Classification Server to a Collector
- Associating a Classification Server pool to a Collector
- Viewing in-progress scans
- Configuring Information Governance services
- Configuring advanced settings
- Monitoring Information Governance jobs
- Rotating the encryption keys
- Viewing Information Governance server statistics
- About automated alerts for patches and upgrades
- Deploying upgrades and patches remotely
- Using the Upload Manager utility
- About migrating storage devices across Indexers
- Viewing the status of a remote installation
- Configuring saved credentials
- Configuring directory service domains
- About directory domain scans
- Adding a directory service domain to Information Governance
- Managing directory service domains
- Fetching users and groups data from NIS+ scanner
- Configuring attributes for advanced analytics
- Deleting directory service domains
- Scheduling scans
- Configuring business unit mappings
- Importing additional attributes for users and user groups
- Configuring containers
- Server Pools
- Section III. Configuring native file systems in Information Governance
- Configuring clustered NetApp file server monitoring
- About configuring a clustered NetApp file server
- About configuring FPolicy in Cluster-Mode
- Pre-requisites for configuring clustered NetApp file servers
- Credentials required for configuring a clustered NetApp file server
- Preparing a non-administrator local user on the clustered NetApp filer
- Preparing a non-administrator domain user on a NetApp cluster for Information Governance
- Persistent Store
- Preparing Information Governance for FPolicy in NetApp Cluster-Mode
- Preparing the ONTAP cluster for FPolicy
- About configuring secure communication between Information Governance and cluster-mode NetApp devices
- Enabling export of NFS shares on a NetApp Cluster-Mode file server
- Enabling SSL support for Cluster Mode NetApp auditing
- Configuring EMC Celerra or VNX monitoring
- Configuring EMC Isilon monitoring
- About configuring EMC Isilon filers
- Prerequisites for configuration of Isilon or Unity VSA file server monitoring
- Credentials required for configuring an EMC Isilon cluster
- Configuring audit settings on EMC Isilon cluster using OneFS GUI console
- Configuring audit settings on EMC Isilon cluster using the OneFS CLI
- Configuring Isilon audit settings for performance improvement
- Preparing Arctera Insight Information Governance to receive event notifications from an EMC Isilon or Unity VSA cluster
- Creating a non-administrator user for an EMC Isilon cluster
- Utilizing access zone's SmartConnect Zone/Alias mappings
- Purging the audit logs in an Isilon filer
- Configuring EMC Unity VSA file servers
- Configuring Hitachi NAS file server monitoring
- Configuring Windows File Server monitoring
- Configuring Arctera File System (VxFS) file server monitoring
- Configuring monitoring of a generic device
- Managing file servers
- About configuring filers
- Viewing configured filers
- Adding filers
- Add/Edit NetApp cluster file server options
- Add/Edit EMC Celerra filer options
- Add/Edit EMC Isilon file server options
- Add/Edit EMC Unity VSA file server options
- Add/Edit Windows File Server options
- Add/Edit Arctera File System server options
- Add/Edit a generic storage device options
- Add/Edit Hitachi NAS file server options
- Custom schedule options
- Editing filer configuration
- Deleting filers
- Viewing performance statistics for file servers
- About disabled shares
- Adding shares
- Managing shares
- Editing share configuration
- Deleting shares
- About configuring a DFS target
- Adding a configuration attribute for devices
- Configuring a DFS target
- About the DFS utility
- Running the DFS utility
- Importing DFS mapping
- Renaming storage devices
- Configuring clustered NetApp file server monitoring
- Section IV. Configuring SharePoint data sources
- Configuring monitoring of SharePoint web applications
- About SharePoint server monitoring
- Credentials required for configuring SharePoint servers
- Configuring a web application policy
- About the Information Governance web service for SharePoint
- Viewing configured SharePoint data sources
- Adding web applications
- Editing web applications
- Deleting web applications
- Adding site collections
- Managing site collections
- Removing a configured web application
- Configuring monitoring of SharePoint Online accounts
- About SharePoint Online account monitoring
- Configuring user with minimum privileges in Microsoft 365
- Creating an application in the Microsoft Azure portal
- Configuring application without user impersonation for Microsoft 365
- Adding SharePoint Online accounts
- Managing a SharePoint Online account
- Adding site collections to SharePoint Online accounts
- Managing site collections
- Configuring monitoring of SharePoint web applications
- Section V. Configuring cloud data sources
- Configuring monitoring of Box accounts
- Configuring OneDrive account monitoring
- Configuring Azure Netapp Files Device
- Managing cloud sources
- Section VI. Configuring Object Storage Sources
- Section VII. Health and monitoring
- Section VIII. Alerts and policies
- Configuring policies
- About Information Governance policies
- Managing policies
- Create Data Activity Trigger policy options
- Create User Activity Deviation policy options
- Create Real-time Data Activity Policy options
- Create Real-time Permitted User-based Activity Policy options
- Create Real-time Restricted User-based Activity Policy options
- Create Real-time Sensitive Data Activity policy options
- Managing alerts
- Configuring policies
- Section IX. Remediation
- Configuring remediation settings
- Section X. Reference
- Appendix A. Information Governance best practices
- Appendix B. Migrating Information Governance components
- Appendix C. Backing up and restoring data
- Appendix D. Arctera Information Governance health checks
- About Information Governance health checks
- Services checks
- Deployment details checks
- Generic checks
- Information Governance Management Server checks
- Information Governance Indexer checks
- Information Governance Collector checks
- Information Governance Windows File Server checks
- Information Governance SharePoint checks
- Classification server health checks
- Information Governance self service portal server health checks
- About Information Governance health checks
- Appendix E. Command File Reference
- Appendix F. Arctera Information Governance jobs
- Appendix G. Troubleshooting
- About general troubleshooting procedures
- About the Health Audit report
- Location of Information Governance logs
- Downloading Information Governance logs
- Migrating the data directory to a new location
- Troubleshooting FPolicy issues on NetApp devices
- Troubleshooting EMC Celera or VNX configuration issues
- Troubleshooting EMC Isilon configuration issues
- Troubleshooting SharePoint configuration issues
- Troubleshooting Hitachi NAS configuration issues
- Troubleshooting installation of Tesseract software
- Troubleshooting RHEL 9 upgrade issue
- Troubleshooting CyberArk Password Manager Configuration Issues
About configuring OneDrive monitoring
Information Governance monitors Microsoft OneDrive cloud accounts to provide information about who owns the data, who is performing activity on the data, and what data should it be archived or deleted. OneDrive uses the Open Authorization 2 (OAuth2) protocol to permit access to a third-party application.
Information Governance scans the OneDrive account for metadata such as path of the file or folder, created by, modified by, modified date, and also fetches audit events for the OneDrive user accounts.
In the Information Governance configuration, the OneDrive tenant account (your organization's OneDrive account) corresponds to a file server and the individual user accounts correspond to shares on a filer. To scan the OneDrive tenant account and the underlying user accounts, Information Governance uses the access token provided by the Microsoft app. To get the access token from the app, you must provide the credentials of an Office 365 Minimum Privilege user on the redirect URL page.
Before you configure OneDrive monitoring in Information Governance, complete the following prerequisites:
Table:
Prerequisite | How to |
|---|---|
Network connectivity | Ensure you have sufficient network connectivity for configuration, especially on Management Server, which is required for authorization. |
Create an app and register it with Microsoft to enable communication between Information Governance and the OneDrive account. | |
Create credentials in Office 365 Admin Center that Information Governance uses to monitor access events on the OneDrive accounts. | Do the following:
|
Enable auditing in Office 365 Admin Center. |
For more information, see https://support.office.com/en-us/article/Turn-off-audit-log-search-in-Office-365. |
Create a role with View-only audit log privilege. These user credentials are used by Information Governance to collect OneDrive audit logs. | Do the following:
|
Grant permissions to Information Governance to scan a user's OneDrive account. | |
The DataInsightOneDrive service is configured and running on the Collector node. This service is responsible for collecting metadata the audit events for OneDrive accounts. | |
If your organization requires internet connections to pass through a proxy server, edit the | Do the following:
Note: Password should always be encrypted using the Information Governance Hash Utility. For more information about encrypting password, See Information Governance Hash Utility. After completing the steps, add the following properties and restart the DataInsightOneDrive service. APP_CONFIG_PROXY_HOST= <Hostname/ip of the proxy> APP_CONFIG_PROXY_PORT=<Port of the proxy> APP_CONFIG_PROXY_SCHEME=<Schema = http> APP_CONFIG_PROXY_AUTH_TYPE=<proxy credentials are NTLM/Basic/empty> APP_CONFIG_PROXY_PASSWORD= <Proxy credentials: Password> APP_CONFIG_PROXY_USER= <Proxy credentials: User name > |
Configure the proxy server in your LAN settings. | In the Windows Control Panel, click > >. Select and enter the IP of your proxy server. Run the following command to verify if the proxy settings have already been configured: netsh winhttp show proxy If a proxy server is not configured, you must import the settings. To import the proxy settings from Internet Explorer (IE), run the following command: netsh winhttp import proxy source=ie |
Ensure that the following URLs are allowed by your organization's proxy server and firewall settings: | https://login.microsoftonline.com/ https://manage.office.com/ |
Ensure that the incoming and outgoing traffic is routed through a single IP and port. Usually systems with multiple NICs have mismatch in incoming and outgoing IP/Port used. This is important because the login request response from Microsoft has to be routed through the IP/Port configured in the redirect URL. In this scenario, Information Governance will not be able to fetch any audit data. |
The following Information Governance limitations apply when monitoring OneDrive accounts:
The ability to add OneDrive tenant accounts and user accounts in bulk using CSV is not supported.
Audit exclude rules are not supported.
Scan errors are not reported on the Scanning dashboard for OneDrive scan failures. However, the onedrive_connector_service and commd logs will contain information about these errors and exceptions.
You cannot create Data Loss Prevention (DLP) Incident Remediation workflows and the Records Classification workflows for OneDrive paths.
On the Settings > Scan Status page, ability to pause or cancel an in-progress scan job is not available. The jobs that are in the queues can be paused or canceled.
Certain audit events such as folder create, folder modified, and folder copies are not fetched for OneDrive accounts. This limitation is observed because Microsoft Office 365 does not support these event types.
Move Audit events are not supported.