Veritas Data Insight Administrator's Guide
- Section I. Getting started
- Introduction to Veritas Data Insight administration
- Configuring Data Insight global settings
- Overview of Data Insight licensing
- About scanning and event monitoring
- About filtering certain accounts, IP addresses, and paths
- About archiving data
- About Data Insight integration with Symantec Data Loss Prevention (DLP)
- Configuring advanced analytics
- About open shares
- About bulk assignment of custodians
- Section II. Configuring Data Insight
- Configuring Data Insight product users
- Configuring Data Insight product servers
- About node templates
- About automated alerts for patches and upgrades
- Configuring saved credentials
- Configuring directory service domains
- Configuring containers
- Section III. Configuring native file systems in Data Insight
- Configuring NetApp file server monitoring
- Configuring clustered NetApp file server monitoring
- About configuring secure communication between Data Insight and cluster-mode NetApp devices
- Configuring EMC Celerra or VNX monitoring
- Configuring EMC Isilon monitoring
- Configuring EMC Unity VSA file servers
- Configuring Hitachi NAS file server monitoring
- Configuring Windows File Server monitoring
- Configuring Veritas File System (VxFS) file server monitoring
- Configuring monitoring of a generic device
- Managing file servers
- Adding filers
- Adding shares
- Renaming storage devices
- Configuring NetApp file server monitoring
- Section IV. Configuring SharePoint data sources
- Configuring monitoring of SharePoint web applications
- About the Data Insight web service for SharePoint
- Adding web applications
- Adding site collections
- Configuring monitoring of SharePoint Online accounts
- About SharePoint Online account monitoring
- Adding SharePoint Online accounts
- Adding site collections to SharePoint Online accounts
- Configuring monitoring of SharePoint web applications
- Section V. Configuring cloud data sources
- Section VI. Configuring ECM data sources
- Section VII. Health and monitoring
- Section VIII. Alerts and policies
- Section IX. Remediation
- Section X. Reference
- Appendix A. Backing up and restoring data
- Appendix B. Data Insight health checks
- Appendix C. Command File Reference
- Appendix D. Data Insight jobs
- Appendix E. Troubleshooting
- Troubleshooting FPolicy issues on NetApp devices
Configuring an open share policy
You can define the parameters for an open share on the Open Share Policy page of the Management Console. The paths on a storage device that meet the criteria specified in the policy are considered as open.
See About open shares.
To configure an open share policy
- Click Settings > Advanced Analytics. The Configuration page opens by default.
- Click the Open Share Policy sub-tab.
The page displays the existing policy that defines the parameters that determine whether a share is open.
- To change the existing policy, click Edit.
- Enter the criteria for considering a share to be open:
Enter the threshold for users that have access to the share. Or select the user(s) or group(s) that have access to the share. You can choose to select both conditions simultaneously.
You can choose to specify the users and groups that have permissions on the share. Use the users and groups selection widget or upload a .csv file with the users and groups information. The selected entities are listed in the Selected Users/Groups pane.
You can type a name in the search bar to search for a user or group. You can also type a domain name in the Domain Filter field to narrow your search to users in a specific domain. You can also filter a user or group from the Select Filter drop-down. Select the All Filtered Users check box in the Selected Users/Group pane to include all filtered users in the policy definition.
All the configured users and groups are displayed on the open share policy definition page.
- Use the Up and Down arrows to define the level in the share hierarchy that the policy should be applied. You can also examine the depth starting from level 0, that is the root of the share.
- The depth in terms of number of levels of the folder heirarchy for which the permissions should be examined.
- Click Save to save the policy and close the window.
You can use the report.exe utility to exclude certain paths from the open share computation for the dashboard.
See reportcli.exe.