Note: All agents associated with a managed host are uninstalled when you remove a managed host. You can, however, remove a remote agent without removing the managed host using the Edit host settings task. For more information, see Removing agents.
Before removing a managed host ensure that the impact of its removal is considered. Any governed data records or activity information associated with resources on that host is removed from the database as well. Use caution when removing the governance on an item, as there may be business reasons for this setting. For more information on removing governance, see Managing resources under governance.
It can take a considerable amount of time to remove a managed host with governed resources (for example, one to two hours per million governed resources). The Manager lists the managed host in the "Deleting" state until this process finishes.
To remove a managed host (and its agents)
- In the Navigation view, select Data Governance | Managed hosts.
-
Select a managed host from the Managed hosts view, and select Remove in the Tasks view or right-click menu.
Note: You can select multiple managed hosts for removal.
The Remove task is not available for host computers with a status of Not Managed.
-
Click Remove to confirm the removal.
If you remove a managed host with governed data, the data is no longer governed. All associated security information and resource activity is also deleted.
All agents associated with a managed host are uninstalled when you remove a managed host. You can, however, remove a remote agent without removing the managed host using the Edit host settings task.
Note: You must have at least one agent assigned to the managed host in order to complete the edit operation.
To remove a remote agent from a managed host
- In the Navigation view, select Data Governance | Managed hosts.
- In the Managed hosts view (right pane), select the required managed host with a status of Managed.
-
Select Edit host settings in the Tasks view or right-click menu.
The Managed Host Settings dialog appears.
-
Open the Agent page, select the agent to be removed and click Remove.
Note: Removing the agent will also remove the managed paths associated with that agent. If that is the desired result, select Yes on the confirmation dialog.
-
Click OK to remove the selected agent.
Note: If you remove the last agent in the list, the OK button will not be available. You will need to specify at least one agent for the managed host before you can save your changes.
Managing unstructured data access
One of the key security measures in an organization is to ensure that the access control policies are deployed effectively. Data Governance Edition provides you with several ways of managing access to data and measuring your progress to meet your security and compliance needs.
This section deals with looking at access management from a resource perspective. Managing account access provides details on managing access from an identity perspective.
Data Governance Edition enables you to:
-
Determine what is in your environment and who has access to it.
Data Governance Edition provides a real-time view of data access, allowing for a centralized view and control of permission assignments throughout the managed domain.
-
Minimize IT’s role as gatekeeper.
While IT is responsible for implementing access controls, the governing of data should be carried out by the people within the organization who actually own it. Data Governance Edition, along with the web portal, provides the workflow to accomplish this.
-
Improve access control consistency.
Inconsistent application of permissions contributes to downtime, lost productivity, security breaches and more. Organizations seek to create a governed environment that provides users with access to exactly the resources they need — no more and no less.
Using Data Governance Edition, you can browse through the resources on the hosts in your managed domains to:
- Examine a file system or SharePoint farm to see what users and groups have access to it, and modify the access if necessary. For details on the Resource browser, see Browsing your environment.
- Examine a user or group to ensure that they have the correct data access. For details, see Managing account access.
- Investigate access for a user in a particular role within your organization to help grant the same access to a new hire. For details, see Cloning, replacing, and removing access for a group of accounts.
- Evaluate a group’s access before deleting it. For details, see Viewing group membership.
- Compare account access for selected users or groups and simulate the addition and removal of users or groups from selected groups. For details, see Comparing accounts and Simulating the effects of group membership modifications on an account.
- Calculate perceived owners to identify potential business owners for data within your environment. For details, see Calculating perceived owner.
- Place data under governance and leverage the self-service requests attestations, policies, and reports that help to ensure that your data is in compliance. For details see, Bringing data under governance.
Related Topics
Browsing your environment
Searching for resources