Arctera Insight Information Governance Administrator's Guide
- Section I. Getting started
- Introduction to Arctera Insight Information Governance administration
- Configuring Information Governance global settings
- About Information Governance licensing
- SQLite WAL mode
- Configuring SMTP server settings
- About scanning and event monitoring
- Monitoring Indexer Node Storage Utilization
- About filtering certain accounts, IP addresses, and paths
- About archiving data
- About Information Governance integration with Data Loss Prevention (DLP)
- Importing sensitive files information through CSV
- Configuring advanced analytics
- About open shares
- About user risk score
- Configuring file groups
- Configuring Workspace data owner policy
- Configuring Management Console settings
- About bulk assignment of custodians
- Configuring Watchlist settings
- Configuring Metadata Framework
- Proof of concept
- Section II. Configuring Information Governance
- Configuring Information Governance product users
- Configuring Information Governance product servers
- About Information Governance product servers
- Adding a new Information Governance server
- Managing Information Governance product servers
- Viewing Information Governance server details
- About node templates
- Adding Portal role to a Information Governance server
- Adding Classification Server role to a Information Governance server
- Assigning Classification Server to a Collector
- Associating a Classification Server pool to a Collector
- Viewing in-progress scans
- Configuring Information Governance services
- Configuring advanced settings
- Monitoring Information Governance jobs
- Rotating the encryption keys
- Viewing Information Governance server statistics
- About automated alerts for patches and upgrades
- Deploying upgrades and patches remotely
- Using the Upload Manager utility
- About migrating storage devices across Indexers
- Viewing the status of a remote installation
- Configuring saved credentials
- Configuring directory service domains
- About directory domain scans
- Adding a directory service domain to Information Governance
- Managing directory service domains
- Fetching users and groups data from NIS+ scanner
- Configuring attributes for advanced analytics
- Deleting directory service domains
- Scheduling scans
- Configuring business unit mappings
- Importing additional attributes for users and user groups
- Configuring containers
- Server Pools
- Section III. Configuring native file systems in Information Governance
- Configuring clustered NetApp file server monitoring
- About configuring a clustered NetApp file server
- About configuring FPolicy in Cluster-Mode
- Pre-requisites for configuring clustered NetApp file servers
- Credentials required for configuring a clustered NetApp file server
- Preparing a non-administrator local user on the clustered NetApp filer
- Preparing a non-administrator domain user on a NetApp cluster for Information Governance
- Persistent Store
- Preparing Information Governance for FPolicy in NetApp Cluster-Mode
- Preparing the ONTAP cluster for FPolicy
- About configuring secure communication between Information Governance and cluster-mode NetApp devices
- Enabling export of NFS shares on a NetApp Cluster-Mode file server
- Enabling SSL support for Cluster Mode NetApp auditing
- Configuring EMC Celerra or VNX monitoring
- Configuring EMC Isilon monitoring
- About configuring EMC Isilon filers
- Prerequisites for configuration of Isilon or Unity VSA file server monitoring
- Credentials required for configuring an EMC Isilon cluster
- Configuring audit settings on EMC Isilon cluster using OneFS GUI console
- Configuring audit settings on EMC Isilon cluster using the OneFS CLI
- Configuring Isilon audit settings for performance improvement
- Preparing Arctera Insight Information Governance to receive event notifications from an EMC Isilon or Unity VSA cluster
- Creating a non-administrator user for an EMC Isilon cluster
- Utilizing access zone's SmartConnect Zone/Alias mappings
- Purging the audit logs in an Isilon filer
- Configuring EMC Unity VSA file servers
- Configuring Hitachi NAS file server monitoring
- Configuring Windows File Server monitoring
- Configuring Arctera File System (VxFS) file server monitoring
- Configuring monitoring of a generic device
- Managing file servers
- About configuring filers
- Viewing configured filers
- Adding filers
- Add/Edit NetApp cluster file server options
- Add/Edit EMC Celerra filer options
- Add/Edit EMC Isilon file server options
- Add/Edit EMC Unity VSA file server options
- Add/Edit Windows File Server options
- Add/Edit Arctera File System server options
- Add/Edit a generic storage device options
- Add/Edit Hitachi NAS file server options
- Custom schedule options
- Editing filer configuration
- Deleting filers
- Viewing performance statistics for file servers
- About disabled shares
- Adding shares
- Managing shares
- Editing share configuration
- Deleting shares
- About configuring a DFS target
- Adding a configuration attribute for devices
- Configuring a DFS target
- About the DFS utility
- Running the DFS utility
- Importing DFS mapping
- Renaming storage devices
- Configuring clustered NetApp file server monitoring
- Section IV. Configuring SharePoint data sources
- Configuring monitoring of SharePoint web applications
- About SharePoint server monitoring
- Credentials required for configuring SharePoint servers
- Configuring a web application policy
- About the Information Governance web service for SharePoint
- Viewing configured SharePoint data sources
- Adding web applications
- Editing web applications
- Deleting web applications
- Adding site collections
- Managing site collections
- Removing a configured web application
- Configuring monitoring of SharePoint Online accounts
- About SharePoint Online account monitoring
- Configuring user with minimum privileges in Microsoft 365
- Creating an application in the Microsoft Azure portal
- Configuring application without user impersonation for Microsoft 365
- Adding SharePoint Online accounts
- Managing a SharePoint Online account
- Adding site collections to SharePoint Online accounts
- Managing site collections
- Configuring monitoring of SharePoint web applications
- Section V. Configuring cloud data sources
- Configuring monitoring of Box accounts
- Configuring OneDrive account monitoring
- Configuring Azure Netapp Files Device
- Managing cloud sources
- Section VI. Configuring Object Storage Sources
- Section VII. Health and monitoring
- Section VIII. Alerts and policies
- Configuring policies
- About Information Governance policies
- Managing policies
- Create Data Activity Trigger policy options
- Create User Activity Deviation policy options
- Create Real-time Data Activity Policy options
- Create Real-time Permitted User-based Activity Policy options
- Create Real-time Restricted User-based Activity Policy options
- Create Real-time Sensitive Data Activity policy options
- Managing alerts
- Configuring policies
- Section IX. Remediation
- Configuring remediation settings
- Section X. Reference
- Appendix A. Information Governance best practices
- Appendix B. Migrating Information Governance components
- Appendix C. Backing up and restoring data
- Appendix D. Arctera Information Governance health checks
- About Information Governance health checks
- Services checks
- Deployment details checks
- Generic checks
- Information Governance Management Server checks
- Information Governance Indexer checks
- Information Governance Collector checks
- Information Governance Windows File Server checks
- Information Governance SharePoint checks
- Classification server health checks
- Information Governance self service portal server health checks
- About Information Governance health checks
- Appendix E. Command File Reference
- Appendix F. Arctera Information Governance jobs
- Appendix G. Troubleshooting
- About general troubleshooting procedures
- About the Health Audit report
- Location of Information Governance logs
- Downloading Information Governance logs
- Migrating the data directory to a new location
- Troubleshooting FPolicy issues on NetApp devices
- Troubleshooting EMC Celera or VNX configuration issues
- Troubleshooting EMC Isilon configuration issues
- Troubleshooting SharePoint configuration issues
- Troubleshooting Hitachi NAS configuration issues
- Troubleshooting installation of Tesseract software
- Troubleshooting RHEL 9 upgrade issue
- Troubleshooting CyberArk Password Manager Configuration Issues
Configuring Microsoft Purview Information Protection (MIP) Label
Microsoft Purview Information Protection (MIP) is a built in, intelligent, unified and extensible solution to protect sensitive data. MIP technology integration allows adding labels to the documents. The label might have a policy to restrict access to the sensitive documents.
Note:
Set MIP label action is supported only for CIFS devices.
When the Management Server or Collector node is connected to the internet, it is advisable to configure MIP label in the online mode. If the Management Server or Collector node do not have internet access or have a firewall, you can opt for an Offline mode. Information Governance recommend the Online mode because of the ease in configuration of MIP label functionality as compared to the offline mode.
In Information Governance, you can configure MIP labels in Online and Offline mode.
Note:
Microsoft's Azure Unified Client is now Microsoft Purview Information Protection Client. Install this new client for labeling files.
Information Governance has automated the policy creation for MIP labels. To use this feature, you need to download list of MIP Labels either using PowerShell scripts or manual steps.
To enable proxy support for Set and Remove MIP label operations, save the following proxy configurations in the configuration database at the global level.
Configuration Parameters
set.remove.mip.proxy.enabled | Enable or disable proxy support for Set/Remove operations. |
set.remove.mip.proxy.ip | Proxy IP address. |
set.remove.mip.proxy.port | Proxy port number. |
set.remove.mip.proxy.user | Proxy username. |
set.remove.mip.proxy.password | Proxy password. |
Note:
The user and password properties for the proxy are required for basic authentication. When using a proxy to set or remove MIP labels, ensure that the password is encrypted using Information Governance Hash Utility. See Information Governance Hash Utility.
To download the Policy.xml containing list of MIP Labels, login to the machine with internet connection and open PowerShell in elevated mode (Run as administrator).
Note:
The machine should have Microsoft Purview Information Protection Client and .NET Framework 4.6.2 or higher installed.
Downloading the Policy.xml file, which contains the list of MIP labels, can be done either by executing PowerShell script or by performing manual steps. You can try either one to download the Policy.xml file.
- Executing PowerShell script:
App Authentication method: Create Azure Application by following the steps given at https://learn.microsoft.com/en-us/powershell/azure/aip/setup-information-protection-client-powershell?view=azureipps#create-and-configure-microsoft-entra-applications-for-set-authentication and then execute the following script:
param ( [parameter(Mandatory=$true)] [string]$filePath, [parameter(Mandatory=$true)] [string]$AppID, [parameter(Mandatory=$true)] [string]$AppSecret, [parameter(Mandatory=$true)] [string]$TenantId, [parameter(Mandatory=$true)] [string]$DelegatedUser ) $creds = Get-Credential Set-Authentication -AppId $AppID -AppSecret $AppSecret -TenantId $TenantId -DelegatedUser $DelegatedUser Export-DebugLogs -FileName $filePath Clear-AuthenticationNote:
Make sure the following command comes in a single line:
Set-Authentication -AppId $AppID -AppSecret $AppSecret -TenantId $TenantId -DelegatedUser $DelegatedUser
After running the script, you will be prompted to enter the location where you want to download .zip file. For example, c:\temp\MIPlabel.zip
Enter Admin credentials of the machine where PowerShell is running.
Enter App ID, App Secret, Tenant ID and Delegate User credentials
Note:
Make sure UnifiedPolicy.Tenant.Read permission is granted while creating an application.
User Authentication method: Execute the following script:
param ( [parameter(Mandatory=$true)] [string]$filePath ) $creds = Get-Credential Set-Authentication -OnBehalfOf $creds Export-DebugLogs -FileName $filePath Clear-AuthenticationAfter running the script, you will be prompted to enter the location where you want to download .zip file. For example, c:\temp\MIPlabel.zip
Enter Admin credentials of the machine where PowerShell is running.
After authentication, one more Microsoft pop up will appear.
Enter Azure User credentials, having minimum roles of Information Protection Reader and Sensitivity Label Reader.
After fetching MIP Labels, open the ZIP file.
Navigate to the MSIP folder and copy any files that have an .xml file name extension.
(Only applicable for offline mode) Paste these files into the %localappdata%\Microsoft\MSIP folder on the Management Server node.
- Performing Manual Steps:
For the App Authentication method: Create Azure Application by following the steps given at https://learn.microsoft.com/en-us/powershell/azure/aip/setup-information-protection-client-powershell?view=azureipps#create-and-configure-microsoft-entra-applications-for-set-authentication.
For the User Authentication method:
Execute the following command Set-Authentication -OnBehalfOf.
A pop-up will appear.
Enter the Admin credentials of the machine where PowerShell is running.
After authentication, one more Microsoft pop-up will appear.
Enter the Azure User credentials, having minimum roles of Information Protection Reader and Sensitivity Label Reader.
Execute the following command: Export-DebugLogs -FileName <File location where we want to export logs>
Note:
The file extension should be .ZIP. For example: C:\Policy.zip
Execute the following command Clear-Authentication
Navigate to the MSIP folder and copy any files that have an .xml file name extension.
(Only applicable for offline mode) On the Management Server node, paste these files into the %localappdata%\Microsoft\MSIP folder, where %localappdata% is the AppData folder of the domain user account, through which the workflow services are running. For example, c:\Users\<domain user>\AppData
Please take note of the following:
You will not be able add any protected label (properties like encrypted mode) to files.
You will not be able configure any MIP label to encrypted files.
Labels which have Allow offline access property set to Never or Some days will not be applied as Information Governance supports only offline mode.
After completing the above steps, you can move on to automating policy creation or applying MIP labels, either in online or offline mode.
To automate policy creation of MIP labels:
- Save the Policy.xml file at <Datadir>/tmp/Policy.xml.
- Navigate to Settings > Remediation > Data Management and click Configure Microsoft Purview Information Protection (MIP) Label.
- Enable Set/Remove MIP label action box should be checked.
- If you are opting for Online mode, enter the required credentials.
- Click OK.
After clicking OK, a pop-up will appear notifying you that a job has been initiated to create policies for the new labels in the Policy.xml file.
You can navigate to Settings > Events tab to check the status of the triggered job.
All the newly created policies will have MIPCustomPolicy as the prefix and they will be in the disabled mode. Enable the required policies via Policy Manager under the Settings tab to use the MIP labeling..
To configure MIP label on a collector node:
MIP Labeling action is also supported on the collector node. It is recommended to use a collector node to set or remove MIP labels as the collector node is closer to the data source. It also helps in balancing the load and freeing up the Management server for other tasks.
For an existing collector node where workflow services are running:
Install Microsoft Purview Information Protection Client
Restart the workflow service
Prerequisites
On the Management Server:
Install .NET Framework 4.6.2 or higher
Install Microsoft Purview Information Protection Client executable using https://learn.microsoft.com/en-us/azure/information-protection/rms-client/install-unifiedlabelingclient-app
Keep Policy.xml file at <Datadir>/tmp/Policy.xml. You will get this file after Downloading list of MIP Labels. See Downloading Policy.xml containing list of MIP Labels.
Create Azure Application by following the steps given at https://learn.microsoft.com/en-us/powershell/azure/aip/setup-information-protection-client-powershell?view=azureipps#create-and-configure-microsoft-entra-applications-for-set-authentication.
To configure MIP labels in Online mode:
- Log in to Information Governance console and click Settings > Remediation > Data management in the left pane.
- Click Configure Microsoft Purview Information Protection (MIP) Label and then click Edit in the right pane.
- You can select either User scan credentials or Select user in the Run As field. If your choice is Select user, make sure the selected user has access to the filer.
- Click MIP Action Mode and select Online
- Enter Tenant Id, Client Id, Client Secret Key, and Microsoft Administrator Account details.
Note:
Use Microsoft Administrator Account which is either Global Administrator account or Minimum Privilege account with Information Protector reader and Sensitivity Label reader privileges.
- In the Run Set MIP Action on field, select the option where you want to run the set MIP action, either Management Server or Collector
Note:
If you are opting for Collector node, you need to perform all pre-requisite steps on the Collector node as well.
- Click OK
Note:
Encrypted labels are supported only in the Online mode.
Supported file extensions for encrypted labels are as follows:
Supported file extension | |||
|---|---|---|---|
.txt | .jpeg | .tif | .gif |
.xml | .tiff | .jpe | |
.jpg | .png | .bmp | All Microsoft Office files |
Prerequisites
On the Management Server:
Install .NET Framework 4.6.2 or higher
Install Microsoft Purview Information Protection Client executable using https://learn.microsoft.com/en-us/azure/information-protection/rms-client/install-unifiedlabelingclient-app
Keep Policy.xml file at <Datadir>/tmp/Policy.xml. You will get this file after Downloading list of MIP Labels. See Downloading Policy.xml containing list of MIP Labels.
Modify the Information Governance Workflow Service to run under a different account
To configure MIP label, run the workflow service with the Domain user account, which is a part of Local Administrator group on the Management server.
To change the account, open Service Control Manager (run services.msc), locate the Information Governance Workflow Service and open the properties.
In the 'Log on' tab, change from 'Localsystem' to 'domain\user' and enter the domain\username and password. For example, let us consider Contoso\sara as domain\user.
Now restart the Workflow service and ensure it is in a 'running' state.
Assigning required rights to Contoso\sara
You need to assign Replace a process level token rights to the Create Process As User account. To elevate the rights, navigate to Control Panel > Administrative Tools > Local Security Policy and add the user account (Contoso\sara) to the Replace a process level token rights. To implement the changes, log out of the system.
To configure MIP labels in Offline mode:
- Log in to Information Governance console and click Settings > Remediation > Data management in the left pane.
- Click Set Microsoft Purview Information Protection (MIP) Label and then click Edit in the right pane.
- Click MIP Action Mode and select Offline.
- You can select either User scan credentials or Select user in the Run As field. If your choice is Select user, make sure the selected user must have access to the filer.
- In the Run Set MIP Action on field, select the option where you want to run the set MIP action, either Management Server or Collector
Note:
If you are opting for Collector node, you need to perform all pre-requisite steps on the Collector node as well.
- Click OK
You can distinguish between MIP labels and VIC tags. It helps determine the number of VIC tags and MIP labels used for classification. Details about MIP labels will be listed under Microsoft Sensitivity Label.