Arctera Insight Information Governance Administrator's Guide
- Section I. Getting started
- Introduction to Arctera Insight Information Governance administration
- Configuring Information Governance global settings
- About scanning and event monitoring
- About filtering certain accounts, IP addresses, and paths
- About archiving data
- About Information Governance integration with Data Loss Prevention (DLP)
- Configuring advanced analytics
- About open shares
- About user risk score
- About bulk assignment of custodians
- Configuring Metadata Framework
- Section II. Configuring Information Governance
- Configuring Information Governance product users
- Configuring Information Governance product servers
- About node templates
- About automated alerts for patches and upgrades
- Configuring saved credentials
- Configuring directory service domains
- Adding a directory service domain to Information Governance
- Configuring containers
- Server Pools
- Section III. Configuring native file systems in Information Governance
- Configuring clustered NetApp file server monitoring
- About configuring secure communication between Information Governance and cluster-mode NetApp devices
- Configuring EMC Celerra or VNX monitoring
- Configuring EMC Isilon monitoring
- Configuring EMC Unity VSA file servers
- Configuring Hitachi NAS file server monitoring
- Configuring Windows File Server monitoring
- Configuring Arctera File System (VxFS) file server monitoring
- Configuring monitoring of a generic device
- Managing file servers
- Adding filers
- Adding shares
- Renaming storage devices
- Configuring clustered NetApp file server monitoring
- Section IV. Configuring SharePoint data sources
- Configuring monitoring of SharePoint web applications
- About the Information Governance web service for SharePoint
- Adding web applications
- Adding site collections
- Configuring monitoring of SharePoint Online accounts
- About SharePoint Online account monitoring
- Adding site collections to SharePoint Online accounts
- Configuring monitoring of SharePoint web applications
- Section V. Configuring cloud data sources
- Configuring monitoring of Box accounts
- Configuring OneDrive account monitoring
- Configuring Azure Netapp Files Device
- Managing cloud sources
- Section VI. Configuring Object Storage Sources
- Section VII. Health and monitoring
- Section VIII. Alerts and policies
- Configuring policies
- Managing policies
- Configuring policies
- Section IX. Remediation
- Configuring remediation settings
- Section X. Reference
- Appendix A. Information Governance best practices
- Appendix B. Migrating Information Governance components
- Appendix C. Backing up and restoring data
- Appendix D. Arctera Information Governance health checks
- About Information Governance health checks
- About Information Governance health checks
- Appendix E. Command File Reference
- Appendix F. Arctera Information Governance jobs
- Appendix G. Troubleshooting
- Troubleshooting FPolicy issues on NetApp devices
Configuring application without user impersonation for Microsoft 365
As per Microsoft guidelines, custom app authentication is disabled by default. For Microsoft 365 application to function with application permission scope instead of delegated permission scope, DisableCustomAppAuthentication should be enabled by setting it to false
To set the property DisableCustomAppAuthentication,
- Install Module Pnp.Powershell using command in PowerShell Install-Module -Name PnP.PowerShell
- Run the command Register-PnPManagementShellAccess and provide credentials of Minimum Privileges user Account.
Note:
This step is done to provide PnP PowerShell Authentication with Service Principal and send an interactive authorization request for this user and resource
- Copy the following script in Notepad and save it as DisableCustomAppAuthentication.ps1 file.
param ( [parameter(Mandatory=$true)] [string]$Organization) Import-Module PnP.PowerShell $url = 'https://'+$Organization+'-admin.sharepoint.com' Write-Output $url $userCredential = Get-Credential Connect-PnPOnline -Url $url -Credential $userCredential get-PnPTenant Set-PnPTenant -DisableCustomAppAuthentication $false
This is required for normal functioning of fetching of Advanced Permission, classification of data and scanning local user for SharePoint Online and OneDrive.
- Run the script using .\DisableCustomAppAuthentication.ps1
- When prompted, provide organization name.
- In the Windows Powershell Credential Request pop up, provide Minimum Privileges user credentials and click Ok
- In the list of output, verify if the DisableCustomAppAuthentication property is set to False.
After configuring application, you need to add the created application to the lookup.
To configure created application to the lookup in Microsoft 365,
- Copy the Client ID of the app created in the Azure portal App
- Navigate to https://<organization-name>-admin.sharepoint.com/_layouts/15/appinv.aspx
- Paste the Client ID copied from the Azure portal App in the App Id field
- Click Lookup. Display name of the app will be auto populated in the Title field.
- Add localhost.com in the App Domain field
- Add https://localhost.com/default.aspx in the Redirect URL field
- Add following XML in the App's Permission Request XML
Since this application needs to be able to access all sites and uses search with app-only, it needs below permissions
<AppPermissionRequests AllowAppOnlyPolicy="true">
<AppPermissionRequest Scope="http://sharepoint/content/tenant"
Right="FullControl"/>
</AppPermissionRequests>
- Click Create
- Click Trust It
To provide permissions to specific site collections only,
- Copy the Client ID of the app created in the Azure portal App
- Navigate to https://<org-name>.sharepoint.com/sites/<site-collection-name>/_layouts/15/appinv.aspx
- Paste the Client ID copied from the Azure portal App in the App Id field
- Click Lookup. Display name of the app will be auto populated in the Title field.
- Add localhost.com in the App Domain field
- Add https://localhost.com/default.aspx in the Redirect URL field
- Add following XML in the App's Permission Request XML
Since this application needs to be able to access all sites and uses search with app-only, it needs below permissions
<AppPermissionRequests AllowAppOnlyPolicy="true">
<AppPermissionRequest Scope="http://sharepoint/content/sitecollection" Right="FullControl" />
</AppPermissionRequests>
- Click Create
- Click Trust It
You will be redirected to the SharePoint admin center.