Use the Security Scanning page on the Managed Host Settings dialog to define when an agent is to perform the initial security scan and when to watch for changes to the structure and security of the file system. Where possible, schedule the scan to low peak hours to avoid heavy network traffic.
The default behavior for security scanning is different depending on the type of agent deployed:
You can modify the scan schedule and define the time and frequency with which the agent scans the target computer using the options available on the Security Scanning page. In addition to defining the security scan schedule, you can specify whether to ignore files and only store folder security data, as well as continuously monitor the file system and apply real-time updates to scanned security data.
|
Note: The schedule times for security scanning are based on the agent's local time. |
Control/setting | Description | ||||||||
---|---|---|---|---|---|---|---|---|---|
Scanning Schedule |
Use the options in the Scanning Schedule pane to define the frequency at which the agent performs a full security scan on the target managed host.
| ||||||||
Scan start time |
Specifies the local time of day, with respect to the machine on which the agent is running, when the security scan is to start. The default start time is 2:00:00 AM. To change this time, use the arrow controls to specify a new time.
| ||||||||
Run Daily |
Select this option to scan the target computer on a daily schedule. Use the days of the week check boxes to define when the scan will occur during the week and the Scan start time field to specify the time the daily scan is to begin.
| ||||||||
Run on an interval |
Select this option to scan the target computer on an hourly interval instead of a daily schedule. Selecting this option enables the Every control to specify the interval to be used.
| ||||||||
Run once |
Select this option to schedule a single security scan of the agent.
| ||||||||
Immediately scan on agent restart or when managed paths change |
Select the Immediately scan on agent restart or when managed paths change option if you want the agent to scan immediately when it is added, when the agent is restarted and when any managed paths are changed.
| ||||||||
Ignore all files and only store folder security data |
The Ignore all files and only store folder security data indicates whether the agent is to capture file security data for the target managed host during an agent scan. When this option is cleared, the agent will include file security data in the agent scan.
| ||||||||
Collect activity for real-time security updates |
Select the Collect activity for real-time security updates option to have the agent watch for changes to the structure and security of the file system on the target managed host (that is, monitor create, delete, and rename operations, as well as DACL, SACL, and Owner changes). This results in a more up-to-date security index.
|
You can collect resource activity on local managed Windows servers, SharePoint farms, and supported NetApp and EMC managed hosts.
|
Note: Limitations with collecting resource activity on EMC storage devices:
|
When enabled, you can configure to collect data on identities, reads, writes, creates, deletes, renames, and security changes on securable objects. Resource activity summary information is used to calculate ownership and for generating activity-related reports, including
|
Important: By default, the collection of resource activity is disabled. You can enable it when you configure your managed hosts. However, collecting resource activity on your managed hosts impacts network usage and increases load on the Resource Activity database server and Data Governance server, especially when collecting activity on large busy servers. Configuring the proper exclusions and aggregation is important to limit some of this load. You should carefully plan out which servers you want to collect activity on and enable it only on those machines. If you are collecting resource activity, it is recommended that you set up a scheduled execution of the activity database compression utility. This utility compresses the activity in your database that is older than a certain age and optionally purges entries that are even older. This is essential in ensuring your database remains manageable. For more information on the activity database compression utility, see the One Identity Manager Data Governance Edition Technical Insight Guide. |
|
Note: Data Governance Edition may report certain operations in unexpected ways. For example, in some instances a file rename operation may be represented as a delete and a create. This is normal behavior and depends on the system, or in some cases, the applications being used to interact with the resources. |
|
Note: The time stamps for resource activity are based on the agent local time. |
The Resource Activity page on the Managed Host Settings dialog contains the following information and options to configure the collection and aggregation of resource activity.
Field | Description | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
No activity (scheduled security scans only) |
Use this option if you do not want to collect resource activity for the target managed host.
| ||||||||||
Collect and aggregate events |
Select this option to collect resource activity for the target managed host. When this option is selected, you can configure the events to be collected and the aggregation interval to be used to compress the activity data.
| ||||||||||
Events |
Select or clear the check boxes to specify the type of events to be included in the resource activity collection process:
| ||||||||||
Aggregation |
Select how often you would like to aggregate the data. Valid aggregation intervals are:
All activity is aggregated within the set time frame, which is 8 hours by default. For example, if a user reads a file ten times within the time frame, it appears as a single line item with a count of 10.
| ||||||||||
Resource Activity Exclusions |
Click this button to specify the accounts, file extensions, and folders to be excluded from the resource activity collection process. By focusing on the objects in whose activity you are interested, you can reduce network traffic. Certain well known system accounts, file extensions, and folders are excluded by default, such as:
By default, the Data Governance agent excludes the run as account (local managed hosts) and the domain service account (remote managed hosts) from activity collection and aggregation regardless if the service account is specified in the Resource Activity Exclusions list. The service account for SharePoint farm managed hosts are not excluded by default; you will need to add the SharePoint service account manually for SharePoint farm managed hosts. To see the full list, click the Resource Activity Exclusions button.
| ||||||||||
View/Update cepp.conf |
For EMC Celerra/VNX hosts, this button allows you to view or update the cepp.conf file for the selected data mover. Clicking this button displays a Logon Credentials dialog allowing you to enter the EMC Celerra/VNX control station credentials and to select the data mover to be scanned.
The client then retrieves and displays the cepp.conf file from the selected data mover. You can edit the Proposed cepp.conf file (lower pane) as needed. To save your edits, select Update File. The client then sends the Proposed cepp.conf file to the EMC device. It will stop and start the cepp service for the selected data mover to apply the new cepp.conf file. Click the Check Status button to retrieve the same information you wold get if you ran "server_cepp server_2-pool-info" on the EMC device. |
The Resource activity exclusions dialog allows you to specify the accounts, file extensions or folders to be excluded from resource activity tracking. This dialog appears when you click the Resource Activity Exclusions button on the Managed Host Settings dialog.
This dialog contains the following controls:
Tab/Control | Description | ||
---|---|---|---|
Accounts |
Use the Accounts tabbed page to specify accounts that are to be excluded from resource activity tracking. By default, the following accounts are excluded:
Use the buttons at the bottom of the dialog, as described below, to add and remove account to this exclusion list. | ||
File Extensions |
Use the File Extensions tabbed page to specify file extensions for the types of files to be excluded from resource activity tracking. Click the Default button to view the full list of file extensions that are excluded by default. Use the buttons at the bottom of the dialog, as described below, to add and remove file extensions to this exclusion list.
| ||
Folders |
User the Folders tabbed page to specify the folders to be excluded from resource activity tracking. By default the following folders are excluded:
Use the buttons at the bottom of the dialog, as described below, to add and remove folders to this exclusion list.
| ||
Export |
Click the Export button to save the currently displayed exclusion list. The type of file exported depends on the tabbed page currently displayed:
| ||
Import |
Click the Import button to import a previously exported exclusion list. The type of file to be imported depends on the tabbed page currently displayed:
| ||
Default |
Click the Default button to view and add the default accounts, file extensions or folders to the displayed exclusion list. | ||
Remove |
Click the Remove button to remove the selected object from the displayed exclusion list. | ||
Add |
Click the Add button to add an object to the displayed exclusion list.
| ||
OK |
Click the OK button to save your selections and close the dialog. | ||
Cancel |
Click the Cancel button to close the dialog without saving your selections. | ||
Apply |
Click the Apply button to save your selections without closing the dialog. |
You can edit the managed host settings for one or more managed hosts of the same host type. For more information on the configuration options available, see Managed host configuration settings. You can also use the Edit host settings task to add, remove or change the agents used to scan a remote managed host. For more information, see Removing agents.
To edit a managed host’s configuration settings
In the Managed Hosts view (right pane), select the required managed host with a status of Managed.
Select Edit host settings in the Tasks view or right-click menu.
The Managed Host Settings dialog appears, displaying the pages that contain settings that can be edited based on the type of host selected in the Managed hosts view.
The agent will scan using the new settings at the next scheduled scan time. However, if you modified the managed paths being scanned and the Immediately scan on agent restart or when managed paths change option is selected on the Security Scanning page, the agent initiates a scan immediately.
To edit multiple managed hosts
|
Note: When multiple managed hosts are selected, keep in mind that the settings are overwritten for all selected managed hosts and only the settings that are appropriate for the selected managed host type are applied. Because of this, you may notice that not all the same pages are displayed when multiple managed hosts are selected for editing (for example, the Managed Paths page is not displayed). |
Select Edit host properties in the Tasks view or right-click menu.
The Managed Host Settings dialog appears, displaying the pages that contain settings that can be edited based on the type of host selected in the Managed hosts view.
The options displayed are the factory default values regardless of the current values of the selected managed hosts.
The agent will scan using the new settings at the next scheduled scan time.
© 2023 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy