Please enter search query.
Search <book_title>...
Veritas Alta™ SaaS Protection Administrator's Guide
Last Published:
2025-04-03
Product(s):
Veritas Alta SaaS Protection (1.0)
- Introduction to Veritas Alta™ SaaS Protection
- API permissions
- Administrator portal (Web UI)
- Manage users and roles
- What is a connector?
- Configure credentials
- Pre-requisites for Microsoft 365 connectors
- Protect Microsoft 365 Multi-Geo tenant
- Protect Exchange Online data
- Protect SharePoint sites and data
- Protect Teams sites
- Protect OneDrive data
- Protect Teams chats
- Protect GoogleDrive data
- Protect Gmail data
- Protect Audit logs
- Protect Salesforce data and metada
- Protect Entra ID objects
- Protect Box data
- Protect Slack data
- Protect Email/Message data
- Configure Retention policies
- Perform backups
- View and share backed-up data
- Analytics
- Perform restores using Administration portal
- Restore SharePoint/OneDrive/Teams Sites and data
- Restore Teams chat messages and Teams channel conversations
- Restore Box data
- Restore Google Drive data
- About Salesforce Data, Metadata, and CRM Content restore and Sandbox seeding
- About Entra ID (Azure AD) objects and records restore
- Restore dashboard
- Install services and utilities
- About the Apps Consent Grant Utility
- Discovery
- Configure Tagging polices
- Configure Tiering policy
- Auditing
- Manage Stors (Storages)
Post-installation activities for the Apps Consent Grant Utility
The following are the post-installation activities to install and manage the Apps Consent Grant utility:
The
module must be installed on the Windows computer using the following command:Install-Module Az.Accounts -RequiredVersion 2.12.1
Note:
The version of the module must be 2.12.1 or lower with PowerShell version 5.1.
You must have the following permissions:
Full Admin
Access All Items
API Impersonation
Unblock the PowerShell script, which is located at the following path:
C:\Program Files (x86)\HubStor\BulkAppConsentGrantUtility\BulkAppConsent\Scripts\bulk_activate_apps.ps1
On the properties window that opens, click
> .Set the execution policy as Unrestricted for both 64-bit and 32-bit PowerShell using the following command:
Set-ExecutionPolicy Unrestricted