Arctera Insight Information Governance Administrator's Guide
- Section I. Getting started
- Introduction to Arctera Insight Information Governance administration
- Configuring Information Governance global settings
- About scanning and event monitoring
- About filtering certain accounts, IP addresses, and paths
- About archiving data
- About Information Governance integration with Data Loss Prevention (DLP)
- Configuring advanced analytics
- About open shares
- About user risk score
- About bulk assignment of custodians
- Configuring Metadata Framework
- Section II. Configuring Information Governance
- Configuring Information Governance product users
- Configuring Information Governance product servers
- About node templates
- About automated alerts for patches and upgrades
- Configuring saved credentials
- Configuring directory service domains
- Adding a directory service domain to Information Governance
- Configuring containers
- Server Pools
- Section III. Configuring native file systems in Information Governance
- Configuring clustered NetApp file server monitoring
- About configuring secure communication between Information Governance and cluster-mode NetApp devices
- Configuring EMC Celerra or VNX monitoring
- Configuring EMC Isilon monitoring
- Configuring EMC Unity VSA file servers
- Configuring Hitachi NAS file server monitoring
- Configuring Windows File Server monitoring
- Configuring Arctera File System (VxFS) file server monitoring
- Configuring monitoring of a generic device
- Managing file servers
- Adding filers
- Adding shares
- Renaming storage devices
- Configuring clustered NetApp file server monitoring
- Section IV. Configuring SharePoint data sources
- Configuring monitoring of SharePoint web applications
- About the Information Governance web service for SharePoint
- Adding web applications
- Adding site collections
- Configuring monitoring of SharePoint Online accounts
- About SharePoint Online account monitoring
- Adding site collections to SharePoint Online accounts
- Configuring monitoring of SharePoint web applications
- Section V. Configuring cloud data sources
- Configuring monitoring of Box accounts
- Configuring OneDrive account monitoring
- Configuring Azure Netapp Files Device
- Managing cloud sources
- Section VI. Configuring Object Storage Sources
- Section VII. Health and monitoring
- Section VIII. Alerts and policies
- Configuring policies
- Managing policies
- Configuring policies
- Section IX. Remediation
- Configuring remediation settings
- Section X. Reference
- Appendix A. Information Governance best practices
- Appendix B. Migrating Information Governance components
- Appendix C. Backing up and restoring data
- Appendix D. Arctera Information Governance health checks
- About Information Governance health checks
- About Information Governance health checks
- Appendix E. Command File Reference
- Appendix F. Arctera Information Governance jobs
- Appendix G. Troubleshooting
- Troubleshooting FPolicy issues on NetApp devices
About Information Governance policies
A policy is a set of conditions that you configure to monitor access events on files and folders stored on various repositories. Arctera Insight Information Governance policies help you detect the sources of threat, access patterns on sensitive data and anomalous user behavior. Information Governance classifies files as sensitive based on information received from Data Loss Protection (DLP) and based on the content analytics from Arctera Information Classifier. You can also import sensitive file information in to Information Governance using a CSV file.
See Configuring Data Loss Prevention settings.
For information about classifying data using Arctera Information Classifier, see the Arctera Insight Information Governance Classification Guide.
Information Governance policies must include at least one condition that is configured to detect abnormal access patterns or user behavior. Information Governance generates an alert whenever it detects any violation of a condition in a configured policy. Additionally, you can also configure Information Governance to send email alerts to a selected group of recipients whenever any policy violation is reported. The Real-time Sensitive Data Activity Trigger Policy, Real-time Permitted User-based Activity Policy, and Real-time Restricted User-based Activity Policy are evaluated instantaneously whenever there is a violation. All other (data activity trigger and user activity deviation ) policies are evaluated by default at 12:00 A.M. every night.
Policies can be configured with three severities, namely, high, medium, and low. You can assign the severity level to a policy based on your organizational needs. For example, the Information Security team can define policies to monitor accesses on the share \Finance
. For this purpose, they can configure a policy with a medium severity to monitor accesses on folders containing Finance policies and guidelines files. Whereas, they can configure a policy with a high severity to monitor accesses on files containing payroll information. When an alert is generated for a policy violation, the severity of the policy is associated with the alert.
Information Governance comes packaged with the following out-of-the-box policies that you can configure according to your needs:
Data Activity Trigger policy
Use this policy to define the maximum cumulative count of the meta operations on the selected paths. For example, if you have defined the maximum accesses per day as 500 on the share
\\netapp1\finshare
, and the total access count by the active set of users exceeds 500, then Information Governance generates an alert.User Activity Deviation Policy
Use this policy to define the threshold of deviation from the baseline activity. The baseline activity on a file or folder is the average number of accesses that are considered normal based on past access counts. If the activity, by the selected users, on the selected data exceeds the specified threshold of the baseline (for example, three standard deviations above the baseline activity), and the maximum accesses allowed per day, Information Governance generates an alert.
You can configure how many standard deviations a user is allowed to deviate from the defined baseline.
Note:
User Activity Deviation policy is designed at share or filer level and not the folder or file level.
Real-time Data Activity Policy
Use this policy to identify specific file types using the file groups configured in Information Governance. This policy will create a mechanism to generate alerts about ransomware attacks or restricted content types in selected shares or paths. It will also generate notifications when selected activities are performed on the available content.
Real-time Permitted User-based Activity Policy
Use this policy to define a permitted users based on the Active Directory custom attributes, who can access selected shares or paths. Also, you can create such a policy with multiple conditions with multiple values for the same custom attributes.
Whenever the events that violate Real-time Permitted User-based Activity Policy are processed by an Indexer node, Information Governance generates alerts and an email is sent to a configured list of recipients in real-time.
Real-time Restricted User-based Activity Policy
Use this policy to define restricted users based on the Active Directory custom attributes, who should not be accessing selected shares or paths. Also, you can create such a policy with multiple conditions with multiple values for the same custom attributes.
Whenever the events that violate Real-time Restricted User-based Activity Policy are processed by an Indexer node, Information Governance generates alerts and an email is sent to a configured list of recipients in real-time.
Real-time Sensitive Data Activity Policy
Use this policy to trigger real-time alerts when a selected set of users perform any access events on the paths that violate configured DLP policies. Whenever the events that violate Real-time Sensitive Data Activity Policy are processed by a Indexer node, alerts are generated and an email is sent to a configured list of recipients.
The policy violations are also published in the Windows Applications and Services Logs as DataInsightAlerts events.
Note:
Some policy names have been changed to abolish racial bias so if you are using Security Information and Event Management (SIEM) tools, make sure you use the correct policy names while configuring the alerts.