Veritas Alta™ SaaS Protection Administrator's Guide
- Introduction to Veritas Alta™ SaaS Protection
- Manage users and roles
- API permissions
- Add connectors
- Overview of adding connectors
- Add Exchange Online connectors
- Configure the capture scope for Exchange connectors
- Configure the capture scope for Exchange connectors
- Add SharePoint Online connectors
- Configuring the capture scopes for SharePoint connectors
- Add Teams site collections connectors
- Add OneDrive connectors
- Add Teams chat connectors
- Add Audit Log connectors
- Add Google Drive connectors
- Add Gmail connectors
- About the Salesforce connector
- Add Entra ID (Azure AD) connectors
- Add Box connectors
- Add Email/Messages
- Apps Consent Grant Utility
- Add Retention policies
- Perform backups
- Manage backed-up data
- Perform restores using Administration portal
- Restore SharePoint/OneDrive/Teams Sites and data
- Restore Teams chat messages and Teams channel conversations
- Restore Box data
- Restore Google Drive data
- About the Salesforce Data, Metadata, and CRM Content restore
- Limitations of Salesforce Metadata backup and restore
- About Entra ID (Azure AD) objects and records restore
- Restore dashboard
- Discovery
- Add Tagging polices
- Add Tiering policy
- General administrative tasks
- Manage Stors (Storages)
- Managing Scopes
- Known Issues
Auditing
All user activity within Veritas Alta SaaS Protection is audited to maintain a comprehensive history of user actions. This includes activities by end users, such as retrieval and sharing, and system activities involving data manipulation, like deletions. Administrative actions, such as modifying configuration settings or managing policies, are also tracked. Additionally, actions performed by privileged users in Veritas Alta SaaS Protection data governance applications, such as removing legal holds in discovery cases, are audited. Activity intelligence data can be filtered by date ranges, locations, users, and groups and can be exported at any time for further analysis.
Table: Auditing categories
Pages | Description |
---|---|
| All the activities that the Administrator and the privileged users perform on the Administration portal are displayed on this page. The page lists the events with its time of occurrence, user, event type, and other details. |
page | All system-related activities, such as Personally Identifiable Information (PII) detection, indexing, and retention errors are displayed on this page. |
All data retrieval activities internal and external users performs, are displayed on the page. | |
page | All sharing activities users perform internally or externally, are displayed on the page. |
The
option on each page lets you export the list of event logs to the CSV format.The
option on each page lets you perform an advanced search for the required event. It opens the page within the main page. On the section, set the required search criteria based on time range, Stor type, Discovery case, or user.