Veritas Alta™ SaaS Protection Administrator's Guide
- Section I. Introduction to Veritas Alta™ SaaS Protection
- Section II. Administration portal
- Section III. Manage users and roles
- Section IV. Manage searches/eDiscovery/cases
- Section V. Configure policies
- Section VI. Perform restores
- About restore
- Prerequisites for restore
- Restore dashboard
- Restore Exchange Online mailboxes
- Restore SharePoint Online Sites and data
- Restore SharePoint/OneDrive/Teams Sites and data
- Restore Teams chats and Teams Channel conversations
- Restore Audit logs
- Restore Box data
- Restore Google Drive data
- Restore Gmail data
- Restore Salesforce data and Metadata
- Restore Entra ID objects
- Restore Slack data
- Restore data to File server
- Restore options
- Section VII. Perform data share
- Section VIII. Perform data downloading
- Section IX. Add and configure connectors
- About connectors
- About connectors
- Overview of connectors
- Configuring the capture scope
- Configuring credentials
- Apps Consent Grant Utility
- Exchange Online connector
- Adding Exchange Online connectors
- Configuring the capture scope for Exchange connectors
- Configuring the capture scope for Exchange connectors
- SharePoint Online connector
- Teams Sites collections connector
- OneDrive connector
- Teams chat connector
- Audit log connector
- Google Drive connector
- Gmail connector
- Salesforce connector
- Entra ID (Azure AD) connector
- Box connector
- Slack connector
- EML connector
- Managing connectors
- About connectors
- Section X. Perform backups
- Section XI. Backup limitations
- Section XII. Events
- Section XIII. Manage Stors (Storages)
- Section XIV. Manage Scopes
- Section XV. Manage auditing
- Section XVI. Known Issues
About the Tagging policy
Tagging policies act as protection to prevent accidental exposure of organizational data by assigning tags to data policies. These tags function at the Hub level and are assigned upon ingestion or when content matches specified RegExs or Tagging policies. The assigned Tags outline the output behaviors for the data.
Table:
Tag policy | Description |
---|---|
Regular expressions (RegExs) | RegExs can identify patterns representing sensitive content and associate one or more tags to determine protection behaviors. They are evaluated during Veritas Alta SaaS Protection search indexing. |
Tagging policies | Tagging policies offer a more granular way of applying Tags at the Stor level. Use Tagging policies if a particular Stor's content needs a unique level of protection that requires you to leverage Stor-level metadata in the policy definition for applying Tags. |
The tags can have one or more Tag Behaviors enforced on items with the associated Tag through RegEx or Tagging policy.
Table: Tag Behavior
Tag Behavior | Description |
---|---|
It assigns a legal hold status, which blocks any deletion. | |
It prevents internal and external sharing and blocks access to the item by the Veritas Alta SaaS Protection End-User portal or a stub. | |
It blocks any user from retrieving the item, either through the Veritas Alta SaaS Protection End-User portal or a stub, and also works to prevent sharing (both internal and external). | |
It blocks the user from deletion of items. |
For more information on adding Tags and Tagging policies,
See Adding Tags.