Veritas Data Insight Administrator's Guide
- Section I. Getting started
- Introduction to Veritas Data Insight administration
- Configuring Data Insight global settings
- About scanning and event monitoring
- About filtering certain accounts, IP addresses, and paths
- About archiving data
- About Data Insight integration with Symantec Data Loss Prevention (DLP)
- Configuring advanced analytics
- About open shares
- About user risk score
- About bulk assignment of custodians
- Configuring Metadata Framework
- Section II. Configuring Data Insight
- Configuring Data Insight product users
- Configuring Data Insight product servers
- About node templates
- About automated alerts for patches and upgrades
- Configuring saved credentials
- Configuring directory service domains
- Adding a directory service domain to Data Insight
- Configuring containers
- Section III. Configuring native file systems in Data Insight
- Configuring NetApp 7-mode file server monitoring
- Configuring clustered NetApp file server monitoring
- About configuring secure communication between Data Insight and cluster-mode NetApp devices
- Configuring EMC Celerra or VNX monitoring
- Configuring EMC Isilon monitoring
- Configuring EMC Unity VSA file servers
- Configuring Hitachi NAS file server monitoring
- Configuring Windows File Server monitoring
- Configuring Veritas File System (VxFS) file server monitoring
- Configuring monitoring of a generic device
- Managing file servers
- Adding filers
- Adding shares
- Renaming storage devices
- Configuring NetApp 7-mode file server monitoring
- Section IV. Configuring SharePoint data sources
- Configuring monitoring of SharePoint web applications
- About the Data Insight web service for SharePoint
- Adding web applications
- Adding site collections
- Configuring monitoring of SharePoint Online accounts
- About SharePoint Online account monitoring
- Adding site collections to SharePoint Online accounts
- Configuring monitoring of SharePoint web applications
- Section V. Configuring cloud data sources
- Configuring monitoring of Box accounts
- Configuring OneDrive account monitoring
- Managing cloud sources
- Section VI. Configuring Object Storage Sources
- Section VII. Health and monitoring
- Section VIII. Alerts and policies
- Section IX. Remediation
- Configuring remediation settings
- Section X. Reference
- Appendix A. Data Insight best practices
- Appendix B. Migrating Data Insight components
- Appendix C. Backing up and restoring data
- Appendix D. Data Insight health checks
- About Data Insight health checks
- About Data Insight health checks
- Appendix E. Command File Reference
- Appendix F. Data Insight jobs
- Appendix G. Troubleshooting
- Troubleshooting FPolicy issues on NetApp devices
Configuring application without user impersonation for Microsoft 365
As per Microsoft guidelines, custom app authentication is disabled by default. For Microsoft 365 application to function with application permission scope instead of delegated permission scope, DisableCustomAppAuthentication should be enabled by setting it to false
To set the property DisableCustomAppAuthentication,
- Install Module Pnp.Powershell using command in PowerShell Install-Module -Name PnP.PowerShell
- Run the command Register-PnPManagementShellAccess and provide credentials of Minimum Privileges user Account.
Note:
This step is done to provide PnP PowerShell Authentication with Service Principal and send an interactive authorization request for this user and resource
- Copy the following script in Notepad and save it as DisableCustomAppAuthentication.ps1 file.
param ( [parameter(Mandatory=$true)] [string]$Organization) Import-Module PnP.PowerShell $url = 'https://'+$Organization+'-admin.sharepoint.com' Write-Output $url $userCredential = Get-Credential Connect-PnPOnline -Url $url -Credential $userCredential get-PnPTenant Set-PnPTenant -DisableCustomAppAuthentication $false
This is required for normal functioning of fetching of Advanced Permission, classification of data and scanning local user for SharePoint Online and OneDrive.
- Run the script using .\DisableCustomAppAuthentication.ps1
- When prompted, provide organization name.
- In the Windows Powershell Credential Request pop up, provide Minimum Privileges user credentials and click Ok
- In the list of output, verify if the DisableCustomAppAuthentication property is set to False.
After configuring application, you need to add the created application to the lookup.
To configure created application to the lookup in Microsoft 365,
- Copy the Client ID of the app created in the Azure portal App
- Navigate to https://<organization-name>-admin.sharepoint.com/_layouts/15/appinv.aspx
- Paste the Client ID copied from the Azure portal App in the App Id field
- Click Lookup
- Add localhost.com in the App Domain field
- Add https://localhost.com/default.aspx in the Redirect URL field
- Add following XML in the App's Permission Request XML
Since this application needs to be able to access all sites and uses search with app-only, it needs below permissions
<AppPermissionRequests AllowAppOnlyPolicy="true">
<AppPermissionRequest Scope="http://sharepoint/content/tenant"
Right="FullControl"/>
</AppPermissionRequests>
- Click Create
- Click Trust It
You will be redirected to the SharePoint admin center.