Veritas Data Insight Administrator's Guide
- Section I. Getting started
- Introduction to Veritas Data Insight administration
- Configuring Data Insight global settings
- About scanning and event monitoring
- About filtering certain accounts, IP addresses, and paths
- About archiving data
- About Data Insight integration with Symantec Data Loss Prevention (DLP)
- Configuring advanced analytics
- About open shares
- About user risk score
- About bulk assignment of custodians
- Configuring Metadata Framework
- Section II. Configuring Data Insight
- Configuring Data Insight product users
- Configuring Data Insight product servers
- About node templates
- About automated alerts for patches and upgrades
- Configuring saved credentials
- Configuring directory service domains
- Adding a directory service domain to Data Insight
- Configuring containers
- Section III. Configuring native file systems in Data Insight
- Configuring NetApp 7-mode file server monitoring
- Configuring clustered NetApp file server monitoring
- About configuring secure communication between Data Insight and cluster-mode NetApp devices
- Configuring EMC Celerra or VNX monitoring
- Configuring EMC Isilon monitoring
- Configuring EMC Unity VSA file servers
- Configuring Hitachi NAS file server monitoring
- Configuring Windows File Server monitoring
- Configuring Veritas File System (VxFS) file server monitoring
- Configuring monitoring of a generic device
- Managing file servers
- Adding filers
- Adding shares
- Renaming storage devices
- Configuring NetApp 7-mode file server monitoring
- Section IV. Configuring SharePoint data sources
- Configuring monitoring of SharePoint web applications
- About the Data Insight web service for SharePoint
- Adding web applications
- Adding site collections
- Configuring monitoring of SharePoint Online accounts
- About SharePoint Online account monitoring
- Adding SharePoint Online accounts
- Adding site collections to SharePoint Online accounts
- Configuring monitoring of SharePoint web applications
- Section V. Configuring cloud data sources
- Configuring monitoring of Box accounts
- Configuring OneDrive account monitoring
- Managing cloud sources
- Section VI. Configuring Object Storage Sources
- Section VII. Health and monitoring
- Section VIII. Alerts and policies
- Section IX. Remediation
- Configuring remediation settings
- Section X. Reference
- Appendix A. Data Insight best practices
- Appendix B. Migrating Data Insight components
- Appendix C. Backing up and restoring data
- Appendix D. Data Insight health checks
- About Data Insight health checks
- About Data Insight health checks
- Appendix E. Command File Reference
- Appendix F. Data Insight jobs
- Appendix G. Troubleshooting
- Troubleshooting FPolicy issues on NetApp devices
About user risk score
Data Insight enables you to monitor malicious activity in your storage environment. Data Insight profiles all users by assigning a risk-score to every configured user. It displays the riskiness of a user in terms of a numerical score that ranges from 0 to 100. Higher the risk score of a user, higher is the perceived risk posed by the user.
The risk score places each user at a relative distance from other users and orders them in accordance with how risky a user is in comparison to other users.
A risky user typically displays anomalies such as:
The fraction of the total number of data sources that a user has permissions on. (Access)
Abrupt deviation in activity pattern where deviation on activity on sensitive files is given more weightage. (Anomaly)
Abnormal increase in number of alerts against the user. (Alerts)
Note that the user risk score is computed by considering the individual scores of different parameters for the last 15 days by default. The user risk score is calculated on a daily basis and stored for the last 180 days.
The risk score assigned to a user helps you do the following:
Identify potentially malicious users.
Review the permissions that are granted to the users.
Review if a risky user is a custodian on any storage resource.
Review the top active and sensitive data that is being accessed by the risky user.
Add a user with a high risk score to a watch list to enable you to closely monitor the user's activities.
Data Insight computes the risk-score for a user based on the weighted sum of individual scores of the following parameters.
Table: Components for computing user risk score
Components | Descriptions |
---|---|
Deviation in accesses pattern on sensitive and non-sensitive files. | The overall deviation score is the weighted sum of the deviation values for sensitive and non-sensitive files. |
Number of alerts against the user. | Percentage of alerts for a user against the total number of alerts, weighted by the severity of the policy that was violated. |
Number of shares the user has read access on. | Percentage of shares on which the user has read access, against the total shares across all the storage devices. |
Number of shares the user has write access on. | Percentage of shares on which the user has write access, against the total shares across all the storage devices. |
Number of shares the user is custodian on. | Percentage of shares for which the user is a custodian, against the total shares across all the storage devices. |
Deviation in the number of unique files that are accessed by the user. (Considering sensitive and non-sensitive files) | Overall score is the weighted sum of unique files that are accessed during past 15 days. |
Deviation in the number of unique files that are accessed by the user. (Considering sensitive files only) | Overall score is the weighted sum of unique sensitive files that are accessed during past 15 days. |
Deviation in the number of distinct DLP policies violated by the files accessed by the user. | Overall score is weighted sum of DLP policies. The weights are proportional to the severity level of the policies. |