Cohesity Alta SaaS Protection Administrator's Guide
- Introduction to Cohesity Alta SaaS Protection
- API permissions
- Administrator portal (Web UI)
- Manage users and roles
- What is a connector?
- Configure credentials
- Pre-requisites for Microsoft 365 connectors
- Protect Microsoft 365 Multi-Geo tenant
- Protect Exchange Online data
- Protect SharePoint sites and data
- Protect Teams sites
- Protect OneDrive data
- Protect Teams chats
- Protect GoogleDrive data
- Protect Gmail data
- Protect Audit logs
- Protect Salesforce data and metada
- Protect Entra ID objects
- Protect Box data
- Protect Slack data
- Protect Email/Message data
- Configure Retention policies
- Perform backups
- View and share backed-up data
- Analytics
- Perform restores using Administration portal
- Restore SharePoint/OneDrive/Teams Sites and data
- Restore Teams chat messages and Teams channel conversations
- Restore Box data
- Restore Google Drive data
- About Salesforce Data, Metadata, and CRM Content restore and Sandbox seeding
- About Entra ID (Azure AD) objects and records restore
- Restore dashboard
- Install services and utilities
- About the Apps Consent Grant Utility
- Discovery
- Configure Tagging polices
- Configure Tiering policy
- Auditing
- Manage Stors (Storages)
Configuring service accounts for services and utilities
Typically, there are two different account types used to configure each service,
A Windows domain or local computer account that you to be used to run this service.
An Azure account that has the appropriate access in Cohesity Alta SaaS Protection.
For ease of use, the following service accounts are created as part of the Cohesity Alta SaaS Protection provisioning process.
Connector service account
Retrieval service account
Full admin account
This information will be provided by the Cohesity Alta SaaS Protection support team during the post-provisioning call.
If you do not want to use the default service accounts, you can create your own accounts with the correct permissions as described in the Authorizations required for the service account table. If you create your own accounts, you could use the same account to run the service and connect to Cohesity Alta SaaS Protection.
The service account must be authorized with the following permissions Cohesity Alta SaaS Protection:
Table: Authorizations required for the service account Cohesity Alta SaaS Protection
Services and utilities | Authorizations in Cohesity Alta SaaS Protection | Authorizations in the customer's domain |
---|---|---|
Connector service |
|
|
Export service |
| |
Retrieval service |
| |
Export utility | For the administrator:
For the end user:
| |
Apps Consent Grant utility | Global Administrator |
Table: Authorizations required for the service accounts in Windows
Services and utilities | Windows Permissions when running the service |
---|---|
Connector service |
If running a Connector for File System Archiving:
|
Export service |
|
Retrieval service |
|
To configure a service account for services and utilities
- Open a web browser and access the Administration portal.
- Click Administration.
- On the left, expand Permissions > Users and groups.
- Click Refine search.
- In the Refine search window, enter the user account, and then click Run search.
- Click Manage permissions.
- In the Manage permissions window, select the required permissions for the service account and then click Assign.