Veritas Data Insight Release Notes
- Overview of this release
- Software limitations
- Known issues
- Console display issues
- Domain filter does not work as expected in some cases
- Other Issues
- Fixed issues
- Appendix A. Getting help
In 6.4
The following features, enhancements, or changes are now available in Data Insight 6.4.
You will be able to find Classification Details like last classified date by navigating to Workspace >> Overview.
Classification server pool support for Windows File Server.
Detailed classification request progress status to improve visibility.
Option to classify only new or modified files.
Additional feature to handle restart while classification is in progress.
Classification framework is more resilient and robust.
The Federal Information Processing Standards (FIPS) define U.S. and Canadian Government security and interoperability requirements for computer systems. The FIPS 140-2 standard specifies the security requirements for cryptographic modules. It describes the approved security functions for symmetric and asymmetric key encryption, message authentication, and hashing. For more information on the FIPS 140-2 standard and its validation program, see the National Institute of Standards and Technology (NIST) and the Communications Security Establishment Canada (CSEC) Cryptographic Module Validation Program website at: https://csrc.nist.gov/projects/cryptographic-module-validation-program
Data Insight now supports FIPS level 140-2. Administrator can choose to enable FIPS mode during installation or upgrade.
For all CIFS supported devices
Ability to set label on files based on report output or via workspace actions.
ability to natively correct non-classified and mis-classification documents for compliance and security.
Visualize updated labels on the user interface or reports in near real-time.
Data Insight now supports Kerberos Authentication to Management Server log in and Self Service portal, as a secure method of authentication.
EMC Isilon support is enhanced to provide customers with ways to map SmartConnect zone name and aliases. Customers can now choose either of the following:
Scan & audit shares of all access zones using EMC filer's IP or FQDN.
Scan & audit shares of chosen access zones using EMC filer's IP or FQDN.
Scan & audit shares of chosen access zones using preferred SmartConnect zone name and aliases.
Scan & audit shares of chosen access zones using preferred SmartConnect zone name and aliases.
Shares with same name belonging to different access zone are fully supported with this release.
Share names will include the access zone name for filers that will be added to Data Insight from this release onwards.
There will be an option to include the access zone name as part of the share name for existing filers. That can be done by modifying the filer's configuration under Setting.
For more information about upgrade implications, refer to Configuring EMC Isilon monitoring in Veritas Data Insight Administrator's guide.
Enhanced framework for better in-context help.
Data Insight is now IPv6 compliant.
New classification policies are introduced in every release expanding the compliance and privacy use-cases to newer markets. This release (4.0.0) brings in following new enhancements, policies, and patterns for automatic content classification for supported workloads.
Exact Data Match (EDM)
Unlike most classification techniques that rely on pattern matching to identify sensitive data, Exact Data Match (EDM) triggers a classification response when the actual data that needs to be protected is detected. By matching on the exact data, this reduces the rate of false positives and allows for much higher levels of accuracy in automatic classification. EDM uses a fingerprint method whereby an extract of a database or table is provided as source file in either CSV or TXT format. The table is ingested, and rules are created that indicate a match when one or more columns of a single row are detected in proximity. EDM is ideal when the identification of discrete customer data, employee data, and any other sensitive data repository maintained within a table is required.
Exact Data Match is useful to detect:
Specific data sets from a database (for example, employee records)
One or more rows in large quantities of data
Multiple field combinations
Exact Data Match provides the following benefits:
Provides the ability to detect specific data sets from a database. For example, employee records.
Supports matching of combinations of data. For example, matching one or more fields and optional fields as per configured proximity value.
Supports large data sets like database records.
Provides data protection by hashing of stored data.
Supports text in all languages.
EDM can be enabled or disabled from YAML.
Following VIC policies have been added:
Malaysia Personal Data Policy
Malaysia Sensitive Data Policy
Colombia Personal Data Policy
Colombia Sensitive Data Policy
Vietnam Personal Data Policy
Vietnam Sensitive Data Policy
Offensive Language Policy
Bribery Policy
Attorney Client Privileged Policy
Compensation Communication Policy
Support to following policies for classification of medical conditions/diseases/diagnoses based on signs and/or symptoms:
Medical Diagnosis - Pancreatic Cancer Policy
Medical Diagnosis - Pneumonia Policy
Medical Diagnosis - Pregnancy Policy
Medical Diagnosis - Prostate Cancer Policy
The following existing transparent policies are updated:
Customer Complaints Policy
High Risk Securities - Complete List Policy
High Risk Securities - Large CAP Policy
High Risk Securities - Mid CAP Policy
High Risk Securities - Small CAP Policy
High Risk Securities - Other Policy
Transparent Patterns
Transparent patterns are new built-in patterns that provide users visibility into the internal logic of the pattern. With this, users have better control and defensibility over pattern matching criteria .Users can copy the existing transparent patterns and modify them for customer-specific logic. This also allows users to create custom policies using Transparent Patterns and when Veritas updates the underlying transparent patterns, their customized policies will be automatically updated as well. The following transparent patterns are introduced:
Customer Complaints
Customer Complaints Keywords (sentiment)
Financial Distress
Financial Securities Transaction
High Risk Securities - Company Names
High Risk Securities - Company Names Large CAP
High Risk Securities - Company Names Mid CAP
High Risk Securities - Company Names Other
High Risk Securities - Company Names Small CAP
High Risk Securities - Company Names Very Large CAP
High Risk Securities - Tickers
High Risk Securities - Tickers Large CAP
High Risk Securities - Tickers Mid CAP
High Risk Securities - Tickers Small CAP
High Risk Securities - Tickers Very Large CAP
Outside Business Activities
Starts with either (FW: FWD: RE: RE FW FWD)
Subscriptions
Subscriptions (proximity)
Improved Python Source Code Detection
VIC release includes improved logic for detecting small Python source code files.
Data Insight 6.4 uses Azure application with application scope permissions for performing operations like scan, discovery, and so on. With this change, user impersonation is no longer needed.
Note:
For existing Azure AD, SharePoint Online and OneDrive sources, the Microsoft application needs to be updated to eliminate user impersonation. This is a mandatory step for authorization process. Refer to Configuring application without user impersonation for Office 365 in Veritas Data Insight 6.4 Administrator's Guide.
Data Insight will not support Red Hat Enterprise Linux 6 (RHEL6) from this release. If you are upgrading to Data Insight 6.4 from earlier version, migrate your filers to different indexers. For more information, refer to About migrating storage devices across Indexers in Veritas Data Insight Administrator's guide.
Data Insight will not support Documentum from this release.