Arctera Insight Information Governance Administrator's Guide
- Section I. Getting started
- Introduction to Arctera Insight Information Governance administration
- Configuring Information Governance global settings
- About scanning and event monitoring
- About filtering certain accounts, IP addresses, and paths
- About archiving data
- About Information Governance integration with Data Loss Prevention (DLP)
- Configuring advanced analytics
- About open shares
- About user risk score
- About bulk assignment of custodians
- Configuring Metadata Framework
- Section II. Configuring Information Governance
- Configuring Information Governance product users
- Configuring Information Governance product servers
- About node templates
- About automated alerts for patches and upgrades
- Configuring saved credentials
- Configuring directory service domains
- Adding a directory service domain to Information Governance
- Configuring containers
- Server Pools
- Section III. Configuring native file systems in Information Governance
- Configuring clustered NetApp file server monitoring
- About configuring secure communication between Information Governance and cluster-mode NetApp devices
- Configuring EMC Celerra or VNX monitoring
- Configuring EMC Isilon monitoring
- Configuring EMC Unity VSA file servers
- Configuring Hitachi NAS file server monitoring
- Configuring Windows File Server monitoring
- Configuring Arctera File System (VxFS) file server monitoring
- Configuring monitoring of a generic device
- Managing file servers
- Adding filers
- Adding shares
- Renaming storage devices
- Configuring clustered NetApp file server monitoring
- Section IV. Configuring SharePoint data sources
- Configuring monitoring of SharePoint web applications
- About the Information Governance web service for SharePoint
- Adding web applications
- Adding site collections
- Configuring monitoring of SharePoint Online accounts
- About SharePoint Online account monitoring
- Adding site collections to SharePoint Online accounts
- Configuring monitoring of SharePoint web applications
- Section V. Configuring cloud data sources
- Configuring monitoring of Box accounts
- Configuring OneDrive account monitoring
- Configuring Azure Netapp Files Device
- Managing cloud sources
- Section VI. Configuring Object Storage Sources
- Section VII. Health and monitoring
- Section VIII. Alerts and policies
- Configuring policies
- Managing policies
- Configuring policies
- Section IX. Remediation
- Configuring remediation settings
- Section X. Reference
- Appendix A. Information Governance best practices
- Appendix B. Migrating Information Governance components
- Appendix C. Backing up and restoring data
- Appendix D. Arctera Information Governance health checks
- About Information Governance health checks
- About Information Governance health checks
- Appendix E. Command File Reference
- Appendix F. Arctera Information Governance jobs
- Appendix G. Troubleshooting
- Troubleshooting FPolicy issues on NetApp devices
Configuring Workspace data owner policy
By default, Information Governance infers owners of files or folders based on the access history. The most active user of a file is considered to be the data owner for the purpose of efficient remediation and data management. The Workspace data owner policy is used to infer the probable owner when configuring workflows and reports.
However, you can define a global policy to infer the owners of files or folders based on one of the following criteria:
The number of read events on the file or folder.
The number of write events on the file or folder.
The cumulative count of all activities except for the permission change events on the file or folder.
The creator of the file or folder.
The user account which last accessed the file or folder.
The user account which last modified the file or folder.
Owner of the parent folder.
If Information Governance is not able compute the owner on the basis of read, write, last accessed, last modified or create events, the owner of the immediate parent folder is displayed as the owner of the file or folder.
For example, you can define a policy to consider the count of read and write events on a file to determine the data owner. In this case, the user with the most read and write accesses is considered to be the data owner.
The criteria that is defined in the global Workspace data owner policy are also considered for determining the data owner when you configure reports and workflows. However, you can choose to override the policy when you create an Inferred Data Owner report.
For information about configuring workflows and reports, see the Arctera Insight Information Governance User's Guide.
To configure a Workspace data owner policy
- In the Management Console, click Settings > Global Settings >Workspace Data Owner Policy.
- The Data Owner Policy details page displays the current policy.
- Use the up and down arrow keys to arrange the criteria in the preferred order.
Information Governance serially evaluates the criteria in the list to compute the data owner.
- Select the check boxes to exclude the following types of users when Information Governance calculates the data owner:
Disabled users - These are the users whose accounts are disabled in the directory service, but are still present in the Information Governance configuration.
Deleted users - These are the users whose accounts are removed from the directory service.
Accounts of users are typically disabled or deleted in the directory service when a user leaves an organization.
Unresolved users - These are accounts for which the corresponding user information is missing in the directory service.
For example, you define a policy that considers the number of write events on a file to compute the data owner. If the user account with the most write events on a particular file is either deleted or disabled, Information Governance excludes such user from the data owner computation. It then considers the next criteria in the list to determine the owner of the file.
- Select the groups or users that you want to exclude from the scope of the policy. Double-click the group or user to select it. The selected data set is listed in the Exclusion List pane.
Use the Domain Filter drop-down to search for specific users, users in a particular domain, built-in user accounts, and SIDs that have been migrated to another domain.
- Click Save.