Veritas Data Insight User's Guide

Last Published:
Product(s): Data Insight (7.0)
Platform: Windows
  1. Section I. Introduction
    1. Introducing Veritas Data Insight
      1.  
        About Veritas Data Insight
      2.  
        About data custodian
      3.  
        About permissions
      4.  
        About SharePoint permissions
      5.  
        About Box permissions
      6.  
        About audit logs
      7.  
        About migrated domains
      8.  
        Applications for Symantec Data Loss Prevention
      9.  
        Content classification using Veritas Information Classifier
    2. Using the Veritas Data Insight Management Console
      1. About the Veritas Data Insight Management Console
        1.  
          Header
        2.  
          Tabs
        3.  
          Navigation pane
        4.  
          Content pane
      2.  
        Operation icons on the Management Console
      3.  
        Logging in to the Data Insight Management Console
      4.  
        Logging out of the Data Insight Management Console
      5.  
        Accessing online Help
  2. Section II. Data Insight Workspace
    1. Navigating the Workspace tab
      1.  
        About the Data Insight Workspace
      2.  
        Using the Workspace filters
      3.  
        Managing the Workspace
      4.  
        Searching the storage device hierarchy
      5.  
        Searching for users and user groups
    2. Analyzing data using the Workspace views
      1.  
        About information risk
      2.  
        Viewing summary of data sources
      3. Viewing shares summary
        1.  
          About control points
      4.  
        About the risk score for users
      5. About the Risk Dossier
        1.  
          Assessing risky users - an example scenario
      6.  
        Viewing user summary
      7.  
        Viewing details of Watchlist users
      8.  
        Viewing details of alert notifications
    3. Viewing access information for files and folders
      1.  
        About viewing file or folder summary
      2.  
        Viewing the overview of a data source
      3.  
        Viewing the overview of a filer or Web application
      4.  
        Managing data custodian for paths
      5.  
        Viewing active users of a file or folder
      6.  
        Viewing inactive users
      7.  
        Viewing folder activity by time
      8.  
        Viewing activity on sub-folders and files
      9.  
        Viewing inactive sub-folders
      10.  
        Viewing user activity by time
      11.  
        Viewing user activity by folders
      12. Viewing user activity on files or folders
        1.  
          Assigning an inferred data owner as custodian
        2.  
          Assigning an active user as custodian
        3.  
          Assigning a custodian from the Permissions tab
      13.  
        Viewing file and folder activity
      14.  
        Viewing CIFS permissions on folders
      15.  
        Viewing NFS permissions on folders
      16.  
        Viewing SharePoint permissions for folders
      17.  
        Viewing OneDrive permissions for folders
      18.  
        Viewing Box permissions on folders
      19.  
        Viewing audit logs for files and folders
      20. About visualizing collaboration on a share
        1.  
          Analyzing activity on collaborative shares
    4. Viewing access information for users and user groups
      1.  
        Viewing the overview of a user
      2.  
        Viewing the overview of a group
      3.  
        Managing custodian assignments for users
      4.  
        Viewing folder activity by users
      5.  
        Viewing CIFS permissions for users
      6.  
        Viewing CIFS permissions for user groups
      7.  
        Viewing NFS permissions for users and user groups
      8.  
        Viewing SharePoint permissions for users and user groups
      9.  
        Viewing Box permissions for users and user groups
      10.  
        Viewing audit logs for users
  3. Section III. Data Insight reports
    1. Using Data Insight reports
      1.  
        About Data Insight reports
      2.  
        How Data Insight reporting works
      3.  
        Creating a report
      4. About Data Insight security reports
        1. Activity Details report
          1.  
            Create or Edit Activity Details for Paths report
          2.  
            Create or edit Activity Details for Users and Groups report
        2. Permissions reports
          1. Inactive Users
            1.  
              Create or edit Inactive Users report
          2. Path Permissions
            1.  
              Create or edit Path Permissions report
          3. Permissions Search report
            1.  
              Create Permissions Search report
          4.  
            About Permissions Query templates
          5. Creating a Permissions Query Template
            1.  
              Using the match-type criteria
          6.  
            Creating custom rules
          7. Permissions Query Template actions
            1.  
              Editing or deleting a Permissions Query Template
            2.  
              Copying a Permissions Query Template
            3.  
              About sharing a Permissions Query Template
          8.  
            Using Permissions Search report output to remediate permissions
          9. Entitlement Review
            1.  
              Create or edit Entitlement Review report
          10. User/Group Permissions
            1.  
              Create or edit User/Group Permissions
          11. Group Change Impact Analysis
            1.  
              Create or edit Group Change Impact Analysis report
        3. Ownership Reports
          1. Data Custodian Summary
            1.  
              Create or edit Data Custodian Summary report
          2. Inferred Owner
            1.  
              Create or edit Inferred Owner report
          3. Data Inventory Report
            1.  
              Create or edit Data Inventory report
      5.  
        Create/Edit security report options
      6. About Data Insight storage reports
        1. Activity Summary reports
          1.  
            Create or edit Activity Summary for Paths report
          2.  
            Create or edit Activity Summary for User/Groups report
        2. Capacity reports
          1. Filer Utilization
            1.  
              Create or edit Filer Utilization report
          2. Filer Growth Trend
            1.  
              Create or edit Filer Growth Trend report
        3. Data Lifecycle reports
          1. Inactive Data by File Group
            1.  
              Create or edit Inactive Data by File Group report
          2. Inactive Data by Owner
            1.  
              Create or edit Inactive Data by Owner report
          3. Data Aging
            1.  
              Create or edit Data Aging report
          4. Inactive Folders
            1.  
              Create or edit Inactive Folders report
        4. Consumption Reports
          1. Potential Duplicate Files
            1.  
              Create/Edit Potential Duplicate Files report
          2. Consumption by Folders
            1.  
              Create or edit Consumption by Folders report
          3. Consumption by Department
            1.  
              Create or edit Consumption by Department
          4. Consumption by File Group
            1.  
              Create/Edit Consumption by File Group
          5. Consumption by Owner
            1.  
              Create/Edit Consumption by Owner
          6. Consumption by File Group and Owner
            1.  
              Create/Edit Consumption by File Group and Owner
      7.  
        Create/Edit storage report options
      8. About Data Insight custom reports
        1.  
          About DQL query templates
        2.  
          Creating custom templates for DQL queries
        3.  
          Create/Edit DQL report options
        4. Creating DQL reports with custom variables
          1.  
            Running a DQL report with custom variables
      9.  
        Considerations for importing paths using a CSV file
    2. Managing reports
      1.  
        About managing Data Insight reports
      2. Viewing reports
        1.  
          About stale information in reports
      3.  
        Filtering a report
      4.  
        Editing a report
      5.  
        About sharing reports
      6.  
        Copying a report
      7.  
        Running a report
      8.  
        Viewing the progress of a report
      9.  
        Customizing a report output
      10.  
        Configuring a report to generate a truncated output
      11.  
        Sending a report by email
      12.  
        How does number of records field work differently from the truncate output records field?
      13.  
        Automatically archiving reports
      14.  
        Canceling a report run
      15.  
        Deleting a report
      16.  
        Considerations for viewing reports
      17.  
        Organizing reports using labels
  4. Section IV. Remediation
    1. Configuring remediation workflows
      1.  
        About remediation workflows
      2.  
        Prerequisites for configuring remediation workflows
      3.  
        Configuring Self-Service Portal settings
      4.  
        About workflow templates
      5. Managing workflow templates
        1.  
          Create/Edit Entitlement Review workflow template
        2.  
          Create/Edit DLP Incident Remediation workflow template
        3.  
          Create/Edit Ownership Confirmation workflow template
        4.  
          Create/Edit Records Classification workflow template
      6. Creating a workflow using a template
        1. Create Entitlement Review workflow options
          1.  
            Customizing Entitlement Review report output
        2.  
          Create DLP Incident Remediation workflow options
        3.  
          Create Ownership Confirmation workflow options
        4.  
          Create Records Classification workflow options
      7. Managing workflows
        1.  
          Viewing details of submitted workflows
        2.  
          Extending the deadline of a workflow
        3.  
          Copying a workflow
        4.  
          Managing submitted workflows
        5.  
          Canceling or deleting a workflow
      8.  
        Auditing workflow paths
      9.  
        Monitoring the progress of a workflow
      10.  
        Remediating workflow paths
    2. Using the Self-Service Portal
      1. About the Self-Service Portal
        1.  
          About Entitlement Review
      2.  
        Logging in to the Self-Service Portal
      3.  
        Using the Self-Service Portal to review user entitlements
      4.  
        Using the Self-Service Portal to manage Data Loss Prevention (DLP) incidents
      5.  
        Using the Self-Service Portal to confirm ownership of resources
      6.  
        Using the Self-Service Portal to classify sensitive data
    3. Managing data
      1. About managing data using Enterprise Vault and custom scripts
        1.  
          About Retention categories
        2.  
          About post-processing actions
      2.  
        Managing data from the Shares list view
      3.  
        Managing inactive data from the Folder Activity tab
      4.  
        Managing inactive data by using a report
      5.  
        Archiving workflow paths using Enterprise Vault
      6.  
        Using custom scripts to manage data
      7.  
        Pushing classification tags while archiving files into Enterprise Vault
      8.  
        About adding tags to devices, files, folders, and shares
    4. Managing permissions
      1.  
        About permission visibility
      2.  
        About recommending permission changes
      3. About recommending permissions changes for inactive users
        1.  
          Reviewing permission recommendations
        2.  
          Analyzing permission recommendations and applying changes
      4.  
        Making permission changes directly from Workspace
      5.  
        Removing permissions for Entitlement Review workflow paths
  5. Appendix A. Command Line Reference
    1.  
      mxcustodian
  6.  
    Index

Create/Edit Potential Duplicate Files report

Use this dialog to create an instance of a report.

Table: Create/Edit Potential Duplicate Files report options

Option

Description

Report Information

Enter information in the following fields:

  • Name - A logical name for the report.

  • Label - Add a label(s) to help you categorize and easily find the report from a long list of reports. For example, Finance or Media Files.

    See Organizing reports using labels.

  • Description -A short description of the data contained in the report.

  • Report type - The type of security report. This field is populated by default.

  • Output format - Select the format in which you want to generate the report. You can select one or all of the given output formats.

  • Maximum reports to preserve - Select the number of report outputs you want the system to preserve. The default value to preserve the report outputs is Unlimited.

    Note:

    You can configure a global setting to purge report outputs when they exceed a certain number. However, the value configured in the Maximum reports to preserve field takes precedence over the global setting.

    For more information about Configuring data retention settings, refer to Data Insight Administrator's guide.

  • Share report with others - Select this check box if you want to share reports that you have created with other users in your organization. Note that the for shared reports, the users will only be able to view data pertaining to the data sources on which they have permissions. See About sharing reports. for more information.

  • Schedule - Select the schedule at which you want the report to run.

  • Copy output to - Enter a path to copy report output files. To successfully copy a report output to an external computer, you must ensure that the Secondary Logon windows service is running in the Management Server.

    Note:

    When you specify a path in this field, select a folder that already exists. Data Insight does not create a new folder. Copying a report may fail if the folder is in use by any application, including Windows Explorer. To test a connection, check the number of connections allowed on the folder. If you have just created a folder and the folder is open in Windows explorer, the test connection will fail for default settings since the default number of connections allowed on a folder is one.

  • Select Credentials to access "Copy output to" path - Select a credential from the drop-down menu, so that Data Insight can direct the report output to the specified location. Additionally you can use the option for adding a new set of credentials if the required credentials are not already added. The credentials must have folder-level read, write, create, and delete permissions on the external computer where the report output is copied.

  • Overwrite option - Selecting this option overwrites the earlier report output files. If you clear this check box, Data Insight creates a new folder with a report run ID for every report run, and saves the report in the new folder.

Configuration

Select the conditions to configure the report:

  • Time period for activity - Enter the time range for which you want data to be included in the report.

    Select Duration to indicate the last n hours/days/weeks/months/year.

    Select Date Range to specify a specific time range.

  • Include custom attributes of user - By default, the check box is cleared. Select the check box to select the custom attributes from the drop-down list.

    For more information on configuring the custom directory attributes, see the Veritas Data Insight Administrator's Guide.

  • Select columns to hide in output - Select the columns that you do not want to display in the report.

  • Select file size filter (Bytes) - Enter the range of file size that you want to include in the report. This option is used to determine the minimum size of potentially duplicate files that must be included in the scope of the report.

  • Truncate output if record exceeds- Enter the number of records (rows) after which the report output is truncated. By default, the value you specify in t his field applies to all the report types for whichData Insight supports truncation.

    See Configuring a report to generate a truncated output.

Data Selection

Do the following:

  1. Select the Physical Hierarchy radio button to view the configured data sources.

    Or, select the DFS Hierarchy radio button to view the configured DFS paths in a domain.

    Or, select the Containers radio button to view the available containers that can be added in the report.

  2. Click the site, file server, share, folder within a share, or a DFS path to select it. The selected data set is listed in the Selected resources pane.

    You can also use a .csv file to import paths for creating reports. Only valid paths in the .csv file are displayed in the Selected Data pane.

  3. Add resource - Enter the resource path and click Add to include the path name in the report output.

Data Owner Policy

You can either use the default Data Owner Policy. Or you can configure the Data Owner Policy specific to this report.

Do the following:

  • Use the up and down arrow keys to arrange the ownership criteria in the preferred order. Data Insight serially evaluates the criteria in the list to compute the data owner.

  • Select the type of users that you want to exclude from the scope of the report. Select Exclude deleted users, Exclude disabled users, and/or Exclude unresolved users, as the case may be.

Select the groups you want to exclude from the scope of the report.

Click the group to select it. The selected data set is listed in the Selected Groups pane.

Note:

You can search for a particular Built-in user or group by using the Domain Filter.

Notification

Enter email addresses of users you want to send the report to.

If the size of the attachment is above the configured limit, an email is sent without the attachment. You can configure the size of the attachment under Settings > SMTP Settings.

See Potential Duplicate Files.