Veritas Alta™ SaaS Protection Administrator's Guide
- Section I. Introduction to Veritas Alta™ SaaS Protection
- Section II. Administration portal
- Section III. Manage users and roles
- Section IV. Manage searches/eDiscovery/cases
- Section V. Configure policies
- Section VI. Perform restores
- About restore
- Prerequisites for restore
- Restore dashboard
- Restore Exchange Online mailboxes
- Restore SharePoint Online Sites and data
- Restore SharePoint/OneDrive/Teams Sites and data
- Restore Teams chats and Teams Channel conversations
- Restore Audit logs
- Restore Box data
- Restore Google Drive data
- Restore Gmail data
- Restore Salesforce data and Metadata
- Restore Entra ID objects
- Restore Slack data
- Restore data to File server
- Restore options
- Section VII. Perform data share
- Section VIII. Perform data downloading
- Section IX. Add and configure connectors
- About connectors
- About connectors
- Overview of connectors
- Configuring the capture scope
- Configuring credentials
- Apps Consent Grant Utility
- Exchange Online connector
- Adding Exchange Online connectors
- Configuring the capture scope for Exchange connectors
- Configuring the capture scope for Exchange connectors
- SharePoint Online connector
- Teams Sites collections connector
- OneDrive connector
- Teams chat connector
- Audit log connector
- Google Drive connector
- Gmail connector
- Salesforce connector
- Entra ID (Azure AD) connector
- Box connector
- Slack connector
- EML connector
- Managing connectors
- About connectors
- Section X. Perform backups
- Section XI. Backup limitations
- Section XII. Events
- Section XIII. Manage Stors (Storages)
- Section XIV. Manage Scopes
- Section XV. Manage auditing
- Section XVI. Known Issues
Filtering users based on Entra ID (Azure AD) extended attributes
When you configure the capture scope, you can limit the backup to specific users. You can use Azure AD extended attributes to target only the required set of users to achieve this requirement.
This connector backs up user data based on a specified attribute and its value, excluding data from other users who do not meet the criteria.
To filter users based on Entra ID (Azure AD) extended attributes
- On the User filter section, click Enable this feature.
- In the Attribute name field, enter the attribute's name based on which you want to add a filter - for example, department.
- Click + Add extended AD attributes filters.
- On the AD Attribute filter page, enter the value of the extended attribute based on which the users are to be filtered - for example, account.
- Click Add.
Note:
Extended Entra ID attribute filters match a user or group based on its attribute value. These filters are case-insensitive and support wildcard usage. Regular expressions are supported by prefixing the filter string with 'Regex'.
- Configure the other options on the Capture scope page.
See Configuring the capture scope to back up all SharePoint site collections.
See Configuring the capture scopes for Teams site connectors.
See Configuring the capture scope for OneDrive for Business connectors.
See Configuring the capture scope for Teams chat connectors .
See Configuring the capture scope for Google Drive connectors .
- (Optional) Configure filters to limit the backup scope based on the group membership of users in Entra ID.
See Filtering users based on Entra ID (Azure AD) group membership.
- (Optional) Configure folder filters to limit the backup scope to specific folders in the mailboxes of users.
See Filtering folders.