Veritas Alta™ SaaS Protection Administrator's Guide

Last Published:
Product(s): Veritas Alta SaaS Protection (1.0)
  1. Section I. Introduction to Veritas Alta™ SaaS Protection
    1. Introduction to Veritas Alta™ SaaS Protection
      1.  
        About Veritas Alta SaaS Protection
      2.  
        Features of Veritas Alta SaaS Protection
      3.  
        Tenant hosting methods
      4.  
        Architecture of Veritas Alta SaaS Protection
      5.  
        Services and utilities
  2. Section II. Administration portal
    1. Administration portal
      1.  
        About the Administration portal
      2.  
        Connectors page
      3.  
        Analytics
      4.  
        About the System page
    2. General administrative tasks
      1.  
        Configuring system
      2.  
        Configuring the Administration portal
      3.  
        Viewing upgrade history
      4. Viewing licensing details
        1.  
          License page - SKU based
        2.  
          License page - Usage based
  3. Section III. Manage users and roles
    1. Managing users and roles
      1.  
        About permissions
      2.  
        Adding users
      3.  
        Assigning the Default role to users
      4.  
        Adding roles
      5.  
        Searching for a specific user/group
      6.  
        Assigning permissions to users
      7.  
        The allowed list of the unrecognized retrieval users
  4. Section IV. Manage searches/eDiscovery/cases
    1. Manage searches/eDiscovey/cases
      1.  
        About eDiscovery/searches
      2.  
        Adding search templates
      3.  
        Adding Discovery cases
      4.  
        Performing an ad hoc search and adding data to Discovery cases
      5.  
        Viewing data in Discovery cases
      6.  
        Editing Discovery cases
      7.  
        Deleting Discovery cases
      8.  
        Assigning Discovery cases to users
  5. Section V. Configure policies
    1. About policies in Veritas Alta™ SaaS Protection
      1.  
        About policies in Veritas Alta SaaS Protection
      2.  
        About WORM policies
      3.  
        About the Deletion policy
      4. About the Tiering policy
        1.  
          Storage tiering and full-text search
        2.  
          User experience on storage tiering
        3.  
          Priority for storage Tiering
      5.  
        About the Tagging policy
      6.  
        How to edit the policy evaluation interval?
    2. Configuring policies for data retention (WORM policies)
      1.  
        Ingestion WORM policies page
      2.  
        Guidelines to add retention policies
      3.  
        Adding/updating ingestion WORM retention policies
      4.  
        Adding/updating At-Rest WORM retention policies
    3. Configuring policies for data deletion (Deletion policy)
      1.  
        Adding/updating Deletion policies
      2.  
        Viewing the deletion history
    4. Configuring policies for data tiering (Tiering policy)
      1.  
        Adding/updating Tiering policies
    5. Configuring Tagging polices
      1.  
        Adding Tags
      2.  
        Adding/updating Tagging policies
      3. Adding regular expressions
        1.  
          RegEx and query examples for PII detection
    6. Managing policies
      1.  
        Deleting policies
      2.  
        Analyzing the effect of policies
      3.  
        Analytics page for policies
  6. Section VI. Perform restores
    1. About restore
      1.  
        About restore
    2. Prerequisites for restore
      1.  
        Prerequisites for restore
    3. Restore dashboard
      1.  
        About the Restore dashboard
      2.  
        Restore job statuses
      3.  
        How to cancel the restore job?
      4.  
        View the restore events
    4. Restore Exchange Online mailboxes
      1. Restore Exchange Online mailboxes
        1.  
          Overwrite restore behavior for Exchange Online data
        2.  
          Supported Item Class for restore
    5. Restore SharePoint Online Sites and data
      1. Restore SharePoint/OneDrive/Teams Sites and data
        1.  
          Overwrite restore behavior for SharePoint Online
      2.  
        Recovery process and restore location options
      3.  
        Recovery of OneDrive, Microsoft 365 Group, and Microsoft Teams sites
      4.  
        Stub restore behavior
      5.  
        Permissions restore
      6.  
        Restrictions for SharePoint Online restore
      7.  
        Limitations of SharePoint Online data and sites restore
    6. Restore Teams chats and Teams Channel conversations
      1.  
        Restore Teams chats and Teams channel conversations
      2.  
        Limitations of Teams chat data restore
    7. Restore Audit logs
      1.  
        Restore O365 audit logs
    8. Restore Box data
      1.  
        Restore Box data
      2.  
        Limitations of Box data restore
    9. Restore Google Drive data
      1. Restore Google Drive data
        1.  
          About the overwrite restore behavior for Box/Google Drive data
    10. Restore Gmail data
      1.  
        Restore Gmail data
    11. Restore Salesforce data and Metadata
      1.  
        About the Salesforce Data, Metadata, and CRM Content restore
      2.  
        Restoring Standards and Custom objects (Structured data)
      3.  
        Custom Object restore - post processing steps
      4.  
        Restoring specific Records (Structured data) using Query filters
      5.  
        Restoring Salesforce CRM Content (Unstructured data)
      6.  
        Limitations of Salesforce Data restore
      7.  
        Considerations for Salesforce Metadata restore
      8.  
        Restoring Salesforce Metadata
      9.  
        Limitations of Salesforce Metadata backup and restore
      10.  
        Salesforce Objects not supported for restore
    12. Restore Entra ID objects
      1. About restoring Entra ID (Azure AD) objects and records
        1.  
          Permissions requirement
      2.  
        Best practices to restore Entra ID objects
      3.  
        Restoring an Entra ID object
      4.  
        Restoring specific records within Entra ID objects
    13. Restore Slack data
      1.  
        Restore Slack data
    14. Restore data to File server
      1.  
        Restore data to File server
    15. Restore options
      1.  
        Set the default restore point
      2.  
        Selecting items to restore (all items, all versions, or point-in-time)
      3.  
        Configuring email addresses for notifications
  7. Section VII. Perform data share
    1. Share data
      1.  
        Sharing data with other users
      2.  
        Removing admin shares
  8. Section VIII. Perform data downloading
    1. Download data
      1.  
        Downloading an item
  9. Section IX. Add and configure connectors
    1. About connectors
      1. About connectors
        1.  
          Supported SaaS applications for backup and restore
      2. Overview of connectors
        1.  
          Configuring the general settings
        2. Configuring the capture scope
          1.  
            Filtering users based on Entra ID (Azure AD) extended attributes
          2.  
            Filtering users based on Entra ID (Azure AD) group membership
          3.  
            Filtering folders
        3. Configuring credentials
          1.  
            Configuring credentials using the Manual mode
          2. Configuring credentials using the M365 App Registrations mode
            1. Assigning apps to connector
              1.  
                Statuses of the Microsoft 365 registered apps
            2.  
              Granting admin consent manually
            3.  
              Granting multiple admin consents using the App Consent Grant utility
          3.  
            Recovery of Microsoft 365 apps
        4.  
          Points to consider when configuring the Custom backup policy
        5.  
          Configuring Custom backup policy
        6.  
          Points to consider when configuring Delete policy for SharePoint environments
        7.  
          Configuring Delete policy
        8.  
          Points to consider when configuring Stubbing policies for SharePoint environments
        9.  
          Configuring Stub policy
        10.  
          Scheduling backup
    2. Apps Consent Grant Utility
      1.  
        About the Apps Consent Grant Utility
      2.  
        Prerequisites to download and install the Apps Consent Grant Utility
      3.  
        Downloading the Apps Consent Grant Utility
      4.  
        Installing or upgrading the Apps Consent Grant Utility
      5.  
        Post-installation activities for the Apps Consent Grant Utility
    3. Exchange Online connector
      1.  
        What can be backed up and restore?
      2.  
        API permissions for the Exchange Online
      3. Adding Exchange Online connectors
        1. Configuring the capture scope for Exchange connectors
          1.  
            Configuring the capture scope to back up mailboxes of all users
          2.  
            Configuring the capture scope to back up mailboxes of all users using the Rolling mailbox scope option
          3.  
            Configuring the capture scope to back up the mailboxes of users using the Alphabetical mailbox scope option
          4.  
            Configuring the capture scope to back up the mailboxes of specific users only
          5.  
            Configuring the capture scope to back up mailboxes from specific domains only
          6.  
            Configuring the capture scope to back up Group/Teams mailboxes
          7.  
            Configuring the capture scope to back up Public folders
    4. SharePoint Online connector
      1. What can be backed up and restore?
        1.  
          Supported and unsupported SharePoint Settings and Types for backup and restore
        2.  
          Supported Sites and List templates for backup and restore
        3.  
          Supported SharePoint permission objects for backup and restore
      2.  
        API permissions for SharePoint, OneDrive for Business, and Teams Sites Collections
      3. Adding SharePoint Online connectors
        1. Configuring the capture scopes for SharePoint connectors
          1.  
            Configuring the capture scope to back up all SharePoint site collections
          2.  
            Configuring the capture scope to back up specific SharePoint sites only
          3.  
            Configuring the capture scope to back up only specific sites using the Rolling site collection scope option
    5. Teams Sites collections connector
      1.  
        What can be backed up and restore?
      2. Adding Teams site collections connectors
        1. Configuring the capture scopes for Teams site connectors
          1.  
            Configuring the capture scope to back up all Team site collections
          2.  
            Configuring the capture scope to back up specific Team sites only
          3.  
            Configuring the capture scope to back up only specific Team sites using the Rolling site collection scope option
    6. OneDrive connector
      1.  
        What can be backed up and restore?
      2. Adding OneDrive connectors
        1. Configuring the capture scope for OneDrive for Business connectors
          1.  
            Configuring the capture scope to back up all OneDrive site collections
          2.  
            Configuring the capture scope to back up specific OneDrive sites only
          3.  
            Configuring the capture scope to back up only specific OneDrive sites using the Rolling site collection scope option
    7. Teams chat connector
      1.  
        What can be backed up and restore?
      2.  
        API permissions for Teams chat
      3. Adding Teams chat connectors
        1.  
          Configuring the capture scope for Teams chat connectors
    8. Audit log connector
      1.  
        Adding Audit Log connectors
    9. Google Drive connector
      1.  
        Prerequisites to add Google Drive connector
      2.  
        What can be backed up and restore?
      3.  
        API permissions for Gmail and Google Drive
      4. Adding Google Drive connectors
        1.  
          Configuring the capture scope for Google Drive connectors
    10. Gmail connector
      1.  
        What can be backed up and restore?
      2. Adding Gmail connectors
        1.  
          Configuring backup scopes for Gmail data
    11. Salesforce connector
      1.  
        About the Salesforce connector
      2.  
        Prerequisites to add Salesforce connectors
      3.  
        Adding Salesforce connectors
      4.  
        About the Salesforce connector backup process
      5.  
        Uploading a certificate to the Salesforce organization
      6.  
        Limitations of Salesforce connector
      7.  
        Salesforce Objects not supported for backup
    12. Entra ID (Azure AD) connector
      1.  
        What can be backed up and restore?
      2.  
        Adding Entra ID (Azure AD) connectors
    13. Box connector
      1.  
        Prerequisites to add Box connectors
      2.  
        What can be backed up and restore?
      3. Adding Box connectors
        1.  
          Configuring backup scopes for Box data
    14. Slack connector
      1.  
        Adding Slack connectors
      2.  
        Limitations of Slack connector
    15. EML connector
      1. Add Email/Messages
        1.  
          Prerequisite
        2.  
          Adding EML/Messages connectors
    16. Managing connectors
      1.  
        Editing connectors
      2.  
        Deleting connectors
  10. Section X. Perform backups
    1. Managing backups
      1.  
        Modifying a backup schedule
      2.  
        Performing an on-demand/ad-hoc backup
      3.  
        Running Delete and Stub policies for SharePoint Online data
      4.  
        Browsing backed-up data
      5.  
        Getting backup status
      6.  
        Connector page
      7.  
        Viewing backup tasks details
  11. Section XI. Backup limitations
    1. Backup limitations
      1.  
        Limitations for SharePoint Online connector
      2.  
        Limitations for Teams site collections connector
      3.  
        Limitations for Teams chat connector
      4.  
        Limitation for Google Drive connector
      5.  
        Limitations for Entra ID connector
      6.  
        Limitations for Box data backup
  12. Section XII. Events
    1. Events
      1.  
        Viewing backup events
      2.  
        About Event suppression
      3.  
        Creating event suppression rules
  13. Section XIII. Manage Stors (Storages)
    1. Manage Stors (Storages)
      1.  
        Viewing Stors (Storages)
      2.  
        Requesting a new Stor
      3.  
        General tab
      4.  
        Metadata tab
      5.  
        Statistical policies tab
      6.  
        Location-Mapping tab
      7.  
        Backup tab
      8.  
        Custodian Groups tab
      9.  
        Advanced tab
      10.  
        Analytics tab
  14. Section XIV. Manage Scopes
    1. Managing Scopes
      1.  
        About Scopes
      2.  
        Enabling Scopes
      3.  
        Configuring Scopes
      4.  
        Using Scopes
  15. Section XV. Manage auditing
    1. Managing auditing
      1.  
        About auditing
  16. Section XVI. Known Issues
    1. Known Issues
      1.  
        Know Issues

General tab

The General tab displays the following options:

Table: General tab options

Fields

Description

Basic settings

Stor name

Displays the name of the Stor.

Stor type

Displays the type of the Stor.

State

Displays one of the following states of the Stor:

Not Provisioned

  • The Stor is created but not provisioned yet.

  • The StorDB and Azure containers for the Stor do not exist.

  • A Stor in this state is not usable; you cannot configure policies.

  • You can configure only limited settings.

Provisioned

  • The Stor is created and provisioned.

  • The StorDB and Azure containers exist.

  • A Stor in this state is not usable; you cannot configure policies.

  • You can configure only limited settings.

Online

  • The Stor is created, provisioned.

  • A Stor in this state is available for writing and reading.

  • You can configure only limited settings.

Online ReadOnly

  • The Stor is created and provisioned.

  • A Stor in this state is available only for reading the existing content.

  • You can configure limited settings only.

Size

Displays the size of the Stor that is same as the total size of the Blob.

Options

PII

Select the check box to enable Personal Identifiable Information (PII) detection.

If PII is enabled, the Stor is evaluated according to the policy interval and the content indexing scope.

Versioning

Select the check box to enable file versioning for the Stor.

Encrypt data at

Select the check box to encrypt the data at rest.

Note:

Data in the rest is the data that is stored for later use.

Support storage tiering

Select the check box to support the storage tierings for the Stor.

Support pre-ingest encryption

Select the check box if the Stor supports pre-ingest encryption. The PreIngestEncrypted metadata field is added to the Stor.

Note:

If the pre-ingest encryption is enabled, the data in any Blobs gets decrypted during the export.

Hide from End-User Portal

Select the check box to hide the Stor from the End-User portal.

Stor-level WORM

Select the check box to enable Stor-level WORM for the Stor.

Stor-level WORM provides a single WORM retention period for all content in the Stor.

This setting is optionally configured on a Stor at the time of provisioning the Stor. Before performing the process of provisioning, you are required to discuss with the Veritas Alta SaaS Protection technical support team.

After a Stor is provisioned in WORM mode, the settings cannot be changed.

Specify a retention period for WORM. The specified WORM retention protection is applied to all data that is archived in the Stor.

After the WORM retention period is completed, the content is deleted.

Item-level WORM

Select the check box to enable Item-level WORM for the Stor.

Item-level WORM supports one or more WORM retention periods on the Stor. Item-level WORM retention periods are driven by the document-level policies that are run in real time during the write process.

Multiple item-level WORM policies can be used within a Stor.

The setting for item-level WORM is configured on the Stor at the time of provisioning the Stor, the settings cannot be modified.

Blob replication settings

Locally Redundant Storage (LRS)

Select this option to enable Locally Redundant Storage for the Stor.

LRS is the default Blob replication configuration that Veritas Alta SaaS Protection provides. Three synchronous copies of the data are maintained in a single datacenter. LRS replicates the data within the region of the customer. To maximize durability, every request that is made for the content is replicated thrice. These three replicas each placed in Fault Domains (FD) and Upgrade Domains (UD).

The three replicas are spread across UDs and FDs to ensure that data is available even if hardware failure affects a single rack or when nodes are upgraded during a rollout.

Geo Redundant Storage (GRS)

Select this option to enable Geo Redundant Storage for the Stor.

Six copies of the data are made (three synchronous copies in one datacenter + three asynchronous copies in a second datacenter).

GRS replicates the data to a secondary region that is hundreds of miles away from the primary region. The data is durable even in the case of a complete regional outage or a disaster in which the primary region is not recoverable.

An update is first committed to the primary region, where it is replicated three times. Then the update is replicated to the secondary region, where it is also replicated three times, across separate FDs and UDs.

Read-Access Geo Redundant Storage (RAVersion control settings

-GRS)

Select this option to enable Read-Access Geo Redundant Storage for the Stor.

Six copies are replicated to a second datacenter.

RA-GRS maximizes availability for the storage account, by providing read-only access to the data in the secondary location, in addition to the replication across two regions that are provided by GRS. If data becomes unavailable in the primary region, the application can read data from the secondary region.

Version control settings

The Version control settings let you reduce the number of versions that are retained. By default, all versions of an item are retained. The version control feature works for the following applications:

  • File

  • SharePoint

  • OneDrive for Business

  • O365 audit logs

If a new version of a document is detected, an additional version of that document is stored. By default, all versions are retained in Veritas Alta SaaS Protection unless you enable versioning.

Policy evaluation interval in minutes

Displays an interval to auto-run the policies defined for this Stor. By default, it is 15 minutes. You can edit the values as required.

Note:

Each Stor has its policy evaluation interval setting. A Stor that contains data, which is accessed rarely may not need frequent policy evaluation. A Stor that contains data, which is accessed actively by users and has indexing, and security requirements may need a policy evaluation interval to ensure policies run closer to real time.

Policy evaluation last ran

Displays the time when the policy evaluation was last run.