Please enter search query.
Search <book_title>...
Veritas Alta™ SaaS Protection Administrator's Guide
Last Published:
2024-09-27
Product(s):
Veritas Alta SaaS Protection (1.0)
- Introduction to Veritas Alta™ SaaS Protection
- EDB and EDB compliance
- Active Directory synchronization
- Manage users and roles
- API permissions
- Add connectors
- Overview of adding connectors
- Add Exchange Online connectors
- Configure the capture scope for Exchange connectors
- Configure the capture scope for Exchange connectors
- Add SharePoint Online connectors
- Configuring the capture scopes for SharePoint connectors
- Add Teams site collections connectors
- Add OneDrive connectors
- Add Teams chat connectors
- Add Audit Log connectors
- Add Google Drive connectors
- Add Gmail connectors
- About the Salesforce connector
- Add Entra ID (Azure AD) connectors
- Add Box connectors
- Add Email/Messages
- Apps Consent Grant Utility
- Add Retention policies
- Perform backups
- Manage backed-up data
- Perform restores using Administration portal
- Restore SharePoint/OneDrive/Teams Sites and data
- Restore Teams chat messages and Teams channel conversations
- Restore Box data
- Restore Google Drive data
- About the Salesforce Data, Metadata, and CRM Content restore
- Limitations of Salesforce Metadata backup and restore
- About Entra ID (Azure AD) objects and records restore
- Perform restores using Export Utility
- Restore dashboard
- Install services and utilities
- Discovery
- Add Tagging polices
- Add Tiering policy
- General administrative tasks
- Manage Stors (Storages)
- Managing Scopes
- Known Issues
Post-installation activities for the Apps Consent Grant Utility
The following are the post-installation activities to install and manage the Apps Consent Grant utility:
The
module must be installed on the Windows computer using the following command:Install-Module Az.Accounts -RequiredVersion 2.12.1
Note:
The version of the module must be 2.12.1 or lower with PowerShell version 5.1.
You must have the following permissions:
Full Admin
Access All Items
API Impersonation
Unblock the PowerShell script, which is located at the following path:
C:\Program Files (x86)\HubStor\BulkAppConsentGrantUtility\BulkAppConsent\Scripts\bulk_activate_apps.ps1
On the properties window that opens, click
> .Set the execution policy as Unrestricted for both 64-bit and 32-bit PowerShell using the following command:
Set-ExecutionPolicy Unrestricted