Veritas Alta™ SaaS Protection Administrator's Guide
- Section I. Introduction to Veritas Alta™ SaaS Protection
- Section II. Administration
- Section III. Manage backups (connectors)
- Overview
- About backup jobs (connectors)
- Overview for adding backup jobs (connectors)
- Configuring the capture scope
- Configuring credentials
- Configuring Delete and Stub policies
- Apps Consent Grant utility
- Backup Exchange Online mailboxes
- Adding connectors for Exchange Online data
- Configuring the capture scope for Exchange connectors
- Configuring the capture scope for Exchange connectors
- Backup SharePoint Online
- Supported SharePoint Online sites and data for backup and restore
- Adding backup jobs (connectors) for SharePoint Online sites and data
- Backup Teams Sites collections
- Backup OneDrive for Business
- Backup Teams chats
- Backup Audit logs
- Backup Google Drive data
- Backup Gmail data
- Backup Salesforce data
- Backup Entra ID (Azure AD) objects
- Backup Box data
- Backup Slack data
- Backup EML data
- Managing backup jobs (connectors)
- Backup jobs (connectors) statuses
- Browsing the backed-up data
- Events
- Overview
- Section IV. Manage restores
- About restore
- Prerequisites for data restore
- Restore dashboard
- Restore Exchange Online mailboxes
- Restore SharePoint Online data
- Restore Teams chats and Teams Channel conversations
- Restore Audit logs
- Restore Box data
- Restore Google Drive data
- Restore Gmail data
- Restore Salesforce data and Metadata
- Restore Salesforce Metadata to the same or another organization
- Restore Entra ID objects
- Restore Slack data
- Restore data to File server
- Restore options
- Section V. Manage data sharing
- Section VI. Manage data downloads
- Section VII. Manage Stors (Storages)
- Section VIII. Policies to manage the backed-up data
- About policies in Veritas Alta™ SaaS Protection
- Configuring policies for data retention (WORM policies)
- Configuring policies for data deletion (Deletion policy)
- Configuring policies for data tiering (Tiering policy)
- Configuring Tagging polices
- Managing policies
- Section IX. Manage users and roles
- Section X. Manage Discovery cases and searches
- Section XI. Manage Scopes
- Section XII. Manage auditing
About the Tagging policy
Tagging policies act as protection to prevent accidental exposure of organizational data by assigning tags to data policies. These tags function at the Hub level and are assigned upon ingestion or when content matches specified RegExs or Tagging policies. The assigned tags outline the output behaviors for data that fulfill the criteria defined by the policy.
Table: Tag policies type
Tag policy | Description |
---|---|
Regular expressions (RegExs) | RegExs can identify patterns representing sensitive content and associate one or more tags to determine protection behaviors. They are evaluated during Veritas Alta™ SaaS Protection search indexing. |
Tagging policies | Tagging policies offer a more granular way of applying Tags at the Stor level. Use Tagging policies if a particular Stor's content needs a unique level of protection that requires you to leverage Stor-level metadata in the policy definition for applying Tags. |
The tags can have one or more Tag Behaviors enforced on items with the associated Tag through RegEx or Tagging policy.
Table: Tag Behavior
Tag Behavior | Description |
---|---|
It assigns a legal hold status, which blocks any deletion. | |
It prevents internal and external sharing and blocks access to the item by the Veritas Alta SaaS Protection End-User portal or a stub. | |
It blocks any user from retrieving the item, either through the Veritas Alta™ SaaS Protection End-User portal or a stub, and also works to prevent sharing (both internal and external). | |
It blocks the user from deletion of items. |
For more information on adding Tags and Tagging policies,
See Adding Tags.