Veritas Alta™ SaaS Protection Administrator's Guide
- Section I. Introduction to Veritas Alta™ SaaS Protection
- Section II. Administration
- Section III. Manage backups (connectors)
- Overview
- About backup jobs (connectors)
- Overview for adding backup jobs (connectors)
- Configuring the capture scope
- Configuring credentials
- Configuring Delete and Stub policies
- Apps Consent Grant utility
- Backup Exchange Online mailboxes
- Adding connectors for Exchange Online data
- Configuring the capture scope for Exchange connectors
- Configuring the capture scope for Exchange connectors
- Backup SharePoint Online
- Supported SharePoint Online sites and data for backup and restore
- Adding backup jobs (connectors) for SharePoint Online sites and data
- Backup Teams Sites collections
- Backup OneDrive for Business
- Backup Teams chats
- Backup Audit logs
- Backup Google Drive data
- Backup Gmail data
- Backup Salesforce data
- Backup Entra ID (Azure AD) objects
- Backup Box data
- Backup Slack data
- Backup EML data
- Managing backup jobs (connectors)
- Backup jobs (connectors) statuses
- Browsing the backed-up data
- Events
- Overview
- Section IV. Manage restores
- About restore
- Prerequisites for data restore
- Restore dashboard
- Restore Exchange Online mailboxes
- Restore SharePoint Online data
- Restore Teams chats and Teams Channel conversations
- Restore Audit logs
- Restore Box data
- Restore Google Drive data
- Restore Gmail data
- Restore Salesforce data and Metadata
- Restore Salesforce Metadata to the same or another organization
- Restore Entra ID objects
- Restore Slack data
- Restore data to File server
- Restore options
- Section V. Manage data sharing
- Section VI. Manage data downloads
- Section VII. Manage Stors (Storages)
- Section VIII. Policies to manage the backed-up data
- About policies in Veritas Alta™ SaaS Protection
- Configuring policies for data retention (WORM policies)
- Configuring policies for data deletion (Deletion policy)
- Configuring policies for data tiering (Tiering policy)
- Configuring Tagging polices
- Managing policies
- Section IX. Manage users and roles
- Section X. Manage Discovery cases and searches
- Section XI. Manage Scopes
- Section XII. Manage auditing
Assigning apps to connector
If the required number of apps are not available for your connector, use the following procedure to assign new apps.
To assign apps to connector
- On the Credentials page, click M365 App Registrations.
- Click + Assign Apps.
- On the Provision new M365 app registrations page, enter the following details:
Tenant Domain
Select the tenant's domain name from the drop-down list. If the domain name is not listed, contact Veritas Support.
Number of apps to provision
Enter the number of apps that are to be assigned for this connector.
For Audit Log connector - One app only
For Entra ID connector - Five hundred apps
For Teams Chat connector - One app only
- Click Assign.
You must have the required number of apps available to proceed.
- Repeat the procedure after 2 minutes.
If the app status is displayed as Inactive, you are required to grant the admin consent.
You have two options: either accept the admin consent request now to activate the app, or proceed with creating the connector by clicking Next. You can then return to this page later to grant the admin consent.
To grant the admin consent, you may use any of the following procedures: