Veritas Data Insight Release Notes

Last Published:
Product(s): Data Insight (6.1.1)
Platform: Windows
  1. Overview of this release
    1.  
      About Veritas Data Insight
    2. What's new in Veritas Data Insight
      1.  
        Since 6.1.1
      2.  
        Since 6.1
      3.  
        Since 6.0
  2. System requirements
    1. System requirements for Veritas Data Insight components
      1.  
        System requirements for classification components
    2.  
      List of ports
    3.  
      Operating system requirements
    4.  
      Web server version
    5.  
      Supported browsers
    6.  
      Supported file servers and platforms
  3. Software limitations
    1.  
      Scanner limitations
    2.  
      Windows File Server support
    3.  
      Social Network Map limitation
    4.  
      Report configuration limitation in Path Permission reports
    5.  
      Known limitations for NetApp Cluster-Mode support
    6.  
      Real-time Sensitive Data Activity Policy does not support Box devices
  4. Known issues
    1. Console display issues
      1.  
        The Activity Pattern Map does not capture the activities performed on folders for cloud sources
      2.  
        Data Insight does captures audit events only for document library and its child paths
      3.  
        Incorrect scan status is displayed for Documentum paths
      4.  
        Documentum paths with same names are not considered as different paths
      5.  
        Permission inheritance not supported for certain data sources
      6.  
        Permissions are not supported for certain data sources
      7.  
        Some data sources do not honor the settings configured under Settings > Scanning and Event monitoring
      8.  
        Security event not monitored for certain devices
      9.  
        Certain paths cannot be uploaded using CSV file
      10.  
        Audit events are not collected for site collections containing UTF-8 characters
      11.  
        I18N characters in site collections are not supported
      12.  
        Incorrect information in report outputs and Workspace tab about Documentum paths
      13.  
        The Scan History tab does not display throughput for certain data sources
      14.  
        Audit events for OneDrive and SharePoint Online data sources take longer to get displayed on the Console
      15.  
        The Go-to bar does not return search results for Documentum paths
      16.  
        Multi-byte characters not supported
      17.  
        Toolbar error
      18.  
        Incorrect status of folder displayed
      19.  
        Incorrect information in Inactive Directories report
      20.  
        Unwanted access events displayed
      21.  
        Data Insight cannot capture the IP addresses for events on certain platforms
      22.  
        Inconsistency between permissions view of Windows and Data Insight
      23.  
        Error fetching data displayed
      24.  
        Error in inactive users information
      25.  
        SharePoint create event displayed incorrectly
      26.  
        Custom attribute widget issue
      27.  
        Incorrect disk space computation displayed on Workspace tab for NFS shares
      28.  
        Share or site collections on disabled filers or Web applications are displayed in charts
      29.  
        Disabled share or site collections are reported on scanning dashboard
      30.  
        Error displayed while adding a VxFS filer
      31.  
        Scan status incorrectly displayed on scanning dashboard
      32.  
        Incorrect icon displayed in the reports wizard
      33.  
        Audit Logs tab shows incorrect path for CREATE events on SharePoint 2007 server
      34.  
        Newly added Enterprise Vault server are not displayed in the Filer Mapping page
      35.  
        Duplicate entry for the Enterprise Vault server is allowed
      36.  
        Dashboard report fails, if filers and domains are not configured in Data Insight
      37.  
        Social Network Map fails to render for the shares that have large number of active users
      38.  
        Mismatch between permission entries displayed in Windows interface and Data Insight console
      39.  
        Incorrect file size may be displayed for archived files in an EMC Celerra file server
      40.  
        EVFolderPoint.xml file may be displayed in the Workspace
      41.  
        Incorrect recommendation count displayed
      42.  
        Permission recommendations for renamed folders may not be accurate
      43.  
        Broken membership in case of local groups leads to misleading permissions
      44.  
        Some filers are not auto-mapped for wrongly configured Enterprise Vault servers
      45.  
        Exception is displayed while trying to archive a batch of file using the Enterprise Vault
      46. Domain filter does not work as expected in some cases
        1.  
          Workaround
      47.  
        DFS share mapping and its configuration is not removed when the corresponding physical share is deleted
      48.  
        In Data Inventory reports, the DLP policy names are not displayed against the files
      49.  
        Pipe character in share name not supported
      50.  
        Display name for users appears blank
      51.  
        Enabling or disabling of audits for site collections may take longer time
      52.  
        Data Inventory Reports may produce incorrect output in certain cases
      53.  
        Report log displays warning message for step-progress
      54.  
        Sorting by paths or custodians does not work in the Ownership Confirmation workflow creation wizard
      55.  
        A workflow that is in submitted state cannot be canceled.
      56.  
        The count of resources to which a custodian is assigned is displayed incorrectly.
      57.  
        Custodian assignment may take a long time to complete.
      58.  
        Permission remediation emails may display incorrect values for some variables
      59.  
        The sort functionality does not work for NFS paths in the Self-Service portal.
      60.  
        Custom actions displayed as disabled
      61.  
        SID History displayed as parent group
      62.  
        Ownership Confirmation workflow does not work for certain NFS paths
      63.  
        Add/Upgrade license succeeds irrespective of the license file type
      64.  
        Creating non-domain saved credentials
      65.  
        Error message may appear while applying recommendations
      66.  
        For Box type source, navigation back from a shared folder may fail
      67.  
        Search for well-known SIDs may yield partial results
      68.  
        DLP policy filter displays some obsolete policies
      69.  
        Some user attributes may be unavailable as filters in User Risk dashboard
      70.  
        Exact string may fail to display desired suggestion in go-to bar
      71.  
        Low screen resolution clips Pagination bar, columns
      72.  
        Exclusion rules for SharePoint paths are case-sensitive
      73.  
        Default landing page for Storage Administrator role is incorrect
      74.  
        Results of a filter remain persistent in Directory Services view
      75.  
        Workspace may incorrectly indicate Box devices as inactive
      76.  
        You may not be able to search for activity by users with I18N characters
      77.  
        Permissions Search Report fails if attribute filters include I18N characters
      78.  
        Navigating across tabs resets filters in Workspace
      79.  
        Permission search report does not display nested DFS paths
      80.  
        Forward slash appears in Access details paths report for Box devices
      81.  
        Data Insight 4.0 customers may need to reconfigure analytics attribute for User's email address
      82.  
        Server notifications may reflect incorrect file count
      83.  
        Remove Permissions panel in Permissions Search report may not display list of paths and trustees
      84.  
        User Risk Dashboard does not display analytics attributes after upgrade
      85.  
        Inclusion/Exclusion attribute queries do not work for Group custom attributes
      86.  
        In Chrome, dashboard may not highlight selected row
      87.  
        Unable to search for activity by users with Chinese characters
      88.  
        When using a CSV file to upload paths to reports, a red cross appears for the paths
      89.  
        Data Insight implicitly adds the groupType Active Directory attribute
      90.  
        SharePoint paths filtered as a part of Scanner exclude rule are marked as deleted and not displayed on UI
      91.  
        Permission change event missing in Audit Logs after upgrade from 4.5.3
      92.  
        Active user count for Ownership Confirmation workflows not displayed on Portal UI
      93.  
        Re-insert variable name when configuring permission remediation after upgrading from version 4.5.x to 5.2
      94.  
        Sometimes the sensitive file and other columns do not display the correct count
      95.  
        Reports cannot be searched using comma separated labels
      96.  
        The classification status of certain paths invariably appears to be in in-progress state
      97.  
        Paths with special characters cannot be classified
      98.  
        An error is reported during content scan of Box
      99.  
        Files and folders do not inherit the Custodian assignment
      100.  
        LIF associated with a share is not considered on upgrading Data Insight
      101.  
        Discrepancy in the count of paths that failed classification
    2. Other Issues
      1.  
        Scanner infinitely scans circular symlinks
      2.  
        Capacity Reports are generated for all filers irrespective of RBAC configuration
      3.  
        Error in displaying selected result entry
      4.  
        Vfilers wrongly capture open events on folder paths as events on file paths
      5.  
        Deletion of a Collector node fails even after disassociating all filers
      6.  
        User with Product Administrator role unable to edit share
      7.  
        Unable to restore tabs
      8.  
        Scan resync does not work for certain scenarios
      9.  
        Security event not monitored
      10.  
        Create event not captured
      11.  
        Container and directory service name limitation
      12.  
        Incorrect default schedule displayed
      13.  
        Special characters in NFS paths cause NFS scanner to fail
      14.  
        Incorrect default schedule displayed
      15.  
        Error in deleting report output
      16.  
        Port number for LDAP directory server required
      17.  
        Exclamation mark in user name not supported
      18.  
        A security event does not change last modified by value for a destination folder
      19.  
        The job scheduling settings require modification
      20.  
        The scan history graph does not display the data as expected
      21.  
        Limited support in the Entitlement Review report
      22.  
        Issue with launching installer from mapped drive
      23.  
        Issue with same NFS export and CIFS share name
      24.  
        The scanned shares and the total scan count does not match
      25.  
        Access Summary for Paths report displays all active users of a share
      26.  
        Limited support for claims-based authenticated Web applications for SharePoint
      27.  
        Inactive users view and report does not consider share-level permissions
      28.  
        Attempt to archive a file using the Enterprise Vault fails
      29.  
        Group Change Analysis report does not report loss of access if users part of built-in groups
      30.  
        Filer Mapping page does not reflect the changes in the settings for the Enterprise Vault servers
      31.  
        Generic device issue
      32.  
        Connection to the Enterprise Vault server fails if host name is used
      33.  
        Stop DataInsightFPolicy service before shutting down a Collector node
      34.  
        Data Insight cannot retrieve retention categories with certain characters
      35.  
        Issue with assigning NIS and LDAP users as custodians
      36.  
        Disabled icon not displayed
      37.  
        Issue with computing custodian for root site collection
      38.  
        Size of parent folder is not updated
      39.  
        Issue with pagination on Audit Logs view
      40.  
        Issue with LHS filter
      41.  
        mxcustodian.exe is slow in case of large number of paths
      42.  
        Certain reports do not honor the global data owner policy
      43.  
        Incorrect informaton displayed for migrated user
      44.  
        Issue with workflow creation if services on Indexer are down
      45.  
      46.  
        Query with I18N characters may fail to generate Permissions Search Report
      47.  
        Paths having double quotes are not added when using CSV method
      48.  
        Issue with report output on file group selection when configuring reports
  5. Fixed issues
    1.  
      Fixed issues in 6.1.1
    2.  
      Fixed issues in 6.1
    3.  
      Fixed issues in 6.0
  6. Appendix A. Getting help
    1.  
      Using the product documentation
    2.  
      Contacting Veritas
    3.  
      Data Insight Support
    4.  
      Using the Support web site
    5.  
      Accessing telephone support

About Veritas Data Insight

Many organizations struggle with identifying data users and owners for their unstructured data. This challenge is compounded with the fact that organizations lack visibility into the types of content and data that is spread across their computing environment.

With Veritas Data Insight, users can monitor file access to automatically identify the data user of a file based on the access history. This method enables more efficient remediation and data management.

Data Insight scans the unstructured data systems and collects full access history of users across the data. It helps organizations monitor and report on access to sensitive information.

Data Insight helps the organizations solve the problem of identifying data owners and responsible parties for information in spite of incomplete or inaccurate metadata or tracking information. This helps support large-scale business owner-driven remediation processes and workflows.

Data Insight provides the following information:

  • Who owns the data

  • Who is responsible for remediation

  • Who has seen the data

  • Who has access to the data

  • What data is most at-risk

  • Frequency of usage of data

The ownership and the usage information from Data Insight can be used for the following purposes:

  • Data owner identification

    Data Insight enables rule-based inference of data owners based on actual usage. Data owner information may not reflect the responsible party. The responsible party or data owner can be a line manager in the business unit, the head of a department, or an information security officer. Veritas Data Insight provides the information to tie the most active user of a file to a manager or responsible party for remediation steps.

  • Data custodian identification

    Data Insight enables the assignment of one or more users as custodians of a data repository. Custodian tagging is typically used to determine the person responsible for remediation. The assigned custodian need not have made any accesses on the files and folders. In addition to the physical paths, you can also assign custodians on DFS paths.

  • Data leak investigation

    In the event of a data leak, you may want to know who saw a particular file. On the Veritas Data Insight Management Server, you can view detailed information and an audit history of who accessed the data.

  • Locate at-risk data

    Data Insight enables organizations to find which shares or folders have overly permissive access rights. Organizations can use this data to prioritize risk-reduction efforts such as the discovery of sensitive data or a review of permissions (or access control rights) to limit access to only those individuals who have a business need.

  • Manage inactive data

    Data Insight enables better data governance by letting you archive inactive and orphan data using Enterprise Vault. Additionally, you can decide to manage the archived data by applying retention rules, deleting the archived data, or by putting legal hold on the archived data.

  • Provide advanced analytics about activity patterns

    Data Insight enables you to analyze the activity on high-risk folders by providing in-depth analysis of usage and collaborative activity. The analysis helps you classify users based on configured attributes to better understand the activity pattern of users in your environment.

  • Permission remediation

    Data Insight leverages the usage analytics provided by audit logs to provide recommendations for revoking permissions of inactive or disabled users on a path. You can then analyze the business impact of applying the recommendations and configure settings to handle the permission changes.

    It also enables you to search for specific permissions and revoke them where necessary as also modifying group membership directly from the Workspace.

  • Content classification

    Data Insight lets you classify content on data sources that it monitors by providing means to define classification rules (policies) that let you specify values (tags) that you can assign to any matching items. The classification feature works in conjunction with the policy framework provided by Veritas Information Classifier to assign tags to files.

    For example, a content scan may search for items whose contents include a credit card number and assign a tag of "PII" (for "personally identifiable information") to any that do.

  • Remediation using the Self-Service Portal

    Data owners and custodians can take remediation actions using the Self-Service portal. Custodians can log in to the Self-Service Portal to do the following:

    • View Data Loss Prevention (DLP) policy violations and remediate DLP incidents using Smart Response rules.

    • Review permission on resources and make recommendations to allow or revoke user access on resources.

    • Provide confirmation about whether the custodians indeed own the data resources that are assigned to them.

  • Raise alerts

    You can configure policies to raise alerts when there is anomalous activity on sensitive data.