Veritas Data Insight Release Notes
- Overview of this release
- Software limitations
- Known issues
- Console display issues
- Domain filter does not work as expected in some cases
- Other Issues
- Fixed issues
- Appendix A. Getting help
In 6.1
The following features and enhancements are available in Data Insight 6.1.
With the proliferation of Microsoft Office 365, Data Insight has now widened its support for the following new data sources:
SharePoint Online
Microsoft OneDrive cloud accounts
OpenText Documentum
Support for three new additional data sources provides visibility, forensics, and the ability to manage data on these new data sources. In Release 6.1, Data Insight supports the discovery, scan and audit of these data sources. However, Data Insight does not fetch permissions for these data sources, and audit information for Documentum data sources.
For information on configuring the monitoring of these data sources and for a detailed list of support limitations, see the Veritas Data Insight Administrator's Guide.
Data Insight now provides the ability to have a more granular role-based access control by allowing you to customize user roles to ensure separation of duties for more regulated workloads. The ability to customize roles also ensures that there is a clear separation between users who manage access to the Data Insight application and the users who consume the data.
Data Insight now lets you create the following new user roles to manage user access and do the basic administration tasks:
User Administrator - This role can add, delete, and modify the roles assigned to Data Insight users. The role has access only to
> and not to any other tabs.Workflow Administrator - This role has access to all sub-tabs under the
tab, but does not have access to the other sections of the Data Insight Management Console.
For information on configuring the user roles, see the Veritas Data Insight Administrator's Guide.
Distribution of a trial cloud license is discontinued from Release 6.1 onwards. You must purchase a cloud license to continue using Data Insight functionality. Contact the Veritas Customer Care for purchase of a cloud license.
An add-on cloud license has been introduced to monitor the data that resides in your cloud environment such as Box, SharePoint Online, and Microsoft OneDrive. On applying a valid cloud license, you can add cloud sources for monitoring, discover and scan data, and view the metadata and audit information.
For more information about the Data Insight licenses, see the Veritas Data Insight Administrator's Guide.
Data Insight now supports the latest Windows Server 2016 operating system for all Data Insight server components and to install the Windows File Server agent.
Data Insight now supports raising of alerts for activities that are performed on all sensitive data, including the files classified by Veritas Information Classifier (VIC). The enhancement enables you to detect malicious activity and take remediation action to prevent data breaches, as appropriate.
Note that the Real-time Sensitive Data Activity policy does not raise alerts for files classified by VIC.
For more information about configuring real-time polices for raising alerts, see the Veritas Data Insight Administrator's Guide.
Data Insight now integrates with Enterprise Vault 12.2 to enable the archiving of old and inactive data on CIFS shares.
The newly introduced DQL templates to detect ransomware enable you to detect the files that are exploited by ransomware. In the event of an attack, ransomware uses a vulnerable user account to encrypt and rename files to which the user has access. With timely detection of the ransomware attack, you can take appropriate remediation action to minimize the risk, and respond to the encryptions that might be underway.
Using the ransomware DQL templates in conjunction with your inputs, you can fetch the following information of the files that exist on the monitored data source:
Collect the count of write and rename activities performed on files in a data source within 24 hours. If the count is higher than the configured threshold, the files are determined as infected and the users are notified. The threshold value is the number of write and rename activities that you permit on a data source within 24 hours.
Get the count of files that are renamed by per user, and have unique file extensions.
Fetch the top-level directories in the share or equivalent, and the number of write and rename activities performed in each of these directories by per user.
List all the files that are created in the last 24 hours by per user. Use this query to identify files created by a risky user.
List the files that contain a specific string in the file name. For example, when a ransomware appends a unique extension to the encrypted files.
Enumerate the duplicates of the potentially malicious executables residing on your system.
For more information about ransomware reports, see the Veritas Data Insight User's Guide.