Veritas Alta™ SaaS Protection Administrator's Guide
- Section I. Introduction to Veritas Alta™ SaaS Protection
- Section II. Administration
- Section III. Manage backups (connectors)
- Overview
- About backup jobs (connectors)
- Overview for adding backup jobs (connectors)
- Configuring the capture scope
- Configuring credentials
- Configuring Delete and Stub policies
- Apps Consent Grant utility
- Backup Exchange Online mailboxes
- Adding connectors for Exchange Online data
- Configuring the capture scope for Exchange connectors
- Configuring the capture scope for Exchange connectors
- Backup SharePoint Online
- Supported SharePoint Online sites and data for backup and restore
- Adding backup jobs (connectors) for SharePoint Online sites and data
- Backup Teams Sites collections
- Backup OneDrive for Business
- Backup Teams chats
- Backup Audit logs
- Backup Google Drive data
- Backup Gmail data
- Backup Salesforce data
- Backup Entra ID (Azure AD) objects
- Backup Box data
- Backup Slack data
- Backup EML data
- Managing backup jobs (connectors)
- Backup jobs (connectors) statuses
- Browsing the backed-up data
- Events
- Overview
- Section IV. Manage restores
- About restore
- Prerequisites for data restore
- Restore dashboard
- Restore Exchange Online mailboxes
- Restore SharePoint Online data
- Restore Teams chats and Teams Channel conversations
- Restore Audit logs
- Restore Box data
- Restore Google Drive data
- Restore Gmail data
- Restore Salesforce data and Metadata
- Restore Salesforce Metadata to the same or another organization
- Restore Entra ID objects
- Restore Slack data
- Restore data to File server
- Restore options
- Section V. Manage data sharing
- Section VI. Manage data downloads
- Section VII. Manage Stors (Storages)
- Section VIII. Policies to manage the backed-up data
- About policies in Veritas Alta™ SaaS Protection
- Configuring policies for data retention (WORM policies)
- Configuring policies for data deletion (Deletion policy)
- Configuring policies for data tiering (Tiering policy)
- Configuring Tagging polices
- Managing policies
- Section IX. Manage users and roles
- Section X. Manage Discovery cases and searches
- Section XI. Manage Scopes
- Section XII. Manage auditing
About the Deletion policy
Deletion policies are designed to permanently and irreversibly delete specific content from the storage system. These policies cannot delete items that are under legal hold, within the WORM retention period, or those that have been tagged with the Prevent Deletion tag behavior.
The policies operate based on the configured policy evaluation interval within your Veritas Alta™ SaaS Protection environment, which is typically set to every 15 minutes by default. Before adding a policy, you must first run it in Preview mode to fully understand the scope of the data that will be deleted. It is recommended that you consult with Veritas Support before adding any policy.
The deletion process within Veritas Alta™ SaaS Protection occurs in two steps. Firstly, references to records are removed, followed by sending delete instructions to the underlying storage system. Additionally, periodic maintenance tasks clean up empty folders without any descendants.
Once deletion operations commence, customer data becomes inaccessible within the storage subsystem. These operations achieve instant consistency across the redundant storage architecture. All copies of deleted content undergo subsequent garbage collection. When the associated storage block is reused for other data, the physical bits are overwritten, following standard hard drive practices.
For more information on adding or updating the Deletion policies,