Veritas Alta™ SaaS Protection Administrator's Guide
- Introduction to Veritas Alta™ SaaS Protection
- API permissions
- Administrator portal (Web UI)
- Manage users and roles
- What is a connector?
- Configure credentials
- Pre-requisites for Microsoft 365 connectors
- Protect Microsoft 365 Multi-Geo tenant
- Protect Exchange Online data
- Protect SharePoint sites and data
- Protect Teams sites
- Protect OneDrive data
- Protect Teams chats
- Protect GoogleDrive data
- Protect Gmail data
- Protect Audit logs
- Protect Salesforce data and metada
- Protect Entra ID objects
- Protect Box data
- Protect Slack data
- Protect Email/Message data
- Configure Retention policies
- Perform backups
- View and share backed-up data
- Analytics
- Perform restores using Administration portal
- Restore SharePoint/OneDrive/Teams Sites and data
- Restore Teams chat messages and Teams channel conversations
- Restore Box data
- Restore Google Drive data
- About Salesforce Data, Metadata, and CRM Content restore and Sandbox seeding
- About Entra ID (Azure AD) objects and records restore
- Restore dashboard
- Install services and utilities
- About the Apps Consent Grant Utility
- Discovery
- Configure Tagging polices
- Configure Tiering policy
- Auditing
- Manage Stors (Storages)
Auditing
All user activity within Cohesity Alta SaaS Protection is audited to maintain a comprehensive history of user actions. This includes activities by end users, such as retrieval and sharing, and system activities involving data manipulation, like deletions. Administrative actions, such as modifying configuration settings or managing policies, are also tracked. Additionally, actions performed by privileged users in Cohesity Alta SaaS Protection data governance applications, such as removing legal holds in discovery cases, are audited. Activity intelligence data can be filtered by date ranges, locations, users, and groups and can be exported at any time for further analysis.
Table: Auditing categories
Pages | Description |
---|---|
| All the activities that the Administrator and the privileged users perform on the Administration portal are displayed on this page. The page lists the events with its time of occurrence, user, event type, and other details. |
page | All system-related activities, such as Personally Identifiable Information (PII) detection, indexing, and retention errors are displayed on this page. |
All data retrieval activities internal and external users performs, are displayed on the page. | |
page | All sharing activities users perform internally or externally, are displayed on the page. |
The
option on each page lets you export the list of event logs to the CSV format.The
option on each page lets you perform an advanced search for the required event. It opens the page within the main page. On the section, set the required search criteria based on time range, Stor type, Discovery case, or user.