Please enter search query.
Search <book_title>...
Veritas Alta™ SaaS Protection Administrator's Guide
Last Published:
2024-04-25
Product(s):
Veritas Alta SaaS Protection (1.0)
- Section I. Introduction to Veritas Alta™ SaaS Protection
- Section II. Administration portal
- Section III. Manage connectors
- About connectors
- Overview of adding connectors
- Overview of connectors
- Configuring the capture scope
- Configuring credentials
- Configuring Delete and Stub policies
- Overview of connectors
- Apps Consent Grant Utility
- Exchange Online connector
- Adding Exchange Online connectors
- Configuring the capture scope for Exchange connectors
- Configuring the capture scope for Exchange connectors
- SharePoint Online connector
- Teams Sites collections connector
- OneDrive for Business connector
- Teams chat connector
- Audit log connector
- Google Drive connector
- Gmail connector
- Salesforce connector
- Entra ID (Azure AD) connector
- Box connector
- Slack connector
- EML connector
- Manage connectors
- Section IV. Manage backups
- Section V. Manage backup events
- Section VI. Manage restores
- About restore
- Prerequisites for restore
- Restore dashboard
- Restore Exchange Online mailboxes
- Restore SharePoint Online Sites and data
- Restore SharePoint/OneDrive/Teams Sites and data
- Restore Teams chats and Teams Channel conversations
- Restore Audit logs
- Restore Box data
- Restore Google Drive data
- Restore Gmail data
- Restore Salesforce data and Metadata
- Restore Entra ID objects
- Restore Slack data
- Restore data to File server
- Restore options
- Section VII. Manage data sharing
- Section VIII. Manage data downloads
- Section IX. Manage Stors (Storages)
- Section X. Manage policies
- About policies in Veritas Alta™ SaaS Protection
- Configuring policies for data retention (WORM policies)
- Configuring policies for data deletion (Deletion policy)
- Configuring policies for data tiering (Tiering policy)
- Configuring Tagging polices
- Managing policies
- Section XI. Manage users and roles
- Section XII. Manage Discovery cases and searches
- Section XIII. Manage Scopes
- Section XIV. Manage auditing
Configuring credentials
This step includes configuring credentials for authentication with the source SaaS application. You can use either
or for authentication.See Configuring credentials using the Manual mode.
See Configuring credentials using the M365 App Registrations mode.