You can add supported NetApp storage devices as managed hosts, with remote agents. This procedure covers NetApp 7-Mode devices and NetApp Cluster-Mode devices running OnTap with the CIFS file system protocol enabled.
|
NOTE: You can configure one target host computer at a time or multiple host computers (of the same type) at once. |
To add a NetApp CIFS device as a managed host
Select Manage host from the Tasks view or right-click menu.
|
NOTE: If you selected multiple host computers with the status of Not Managed and of the same host type, use the Manage multiple hosts task or right-click menu command. The settings specified on the Managed Host Settings dialog will apply to all selected host computers. |
The Managed Host Settings dialog appears.
|
NOTE: If you select a host computer on a domain that was not previously identified as a managed domain, the Domain Credentials dialog appears. Click the Set button to supply the credentials of an Active Directory user with administrative rights on the selected domain. Assigning the credentials for the domain registers the user as a Data Governance Edition service account, links the service account to the domain and adds it to the managed domains list. Once the domain credentials are set, the Managed Host Settings dialog appears. |
Agent Install Path: (Optional) Use this field to specify an alternate installation location. This must be a local path (for example, C:\MyPath) and cannot exceed 512 characters.
|
NOTE: By default, this field displays Use default install directory and the agent is installed in the Data Governance agent services installation directory (%ProgramFiles%\One Identity\One Identity Manager Data Governance Edition\Agent Services). |
User Name: Enter the name of a user account with access to the target NAS host computer.
|
Note: The user must have the "ontapi" User Login Method application. |
Host EndPoint: (Optional) Enter the API endpoint (FQDN, host name or IP address) for the NetApp Cluster Mode connection.
|
NOTE: The default is to use the FQDN of the targeted host. You would only use this setting if the API connection needs to be specified as something other than the FQDN of the targeted host. |
Click the Test API Credentials button to verify valid credentials have been entered.
Use the Agents page to select the remote agent and service account to be used to scan the target host.
To add a remote agent:
Select the service account: Select a service account with sufficient permissions to access the target computer and the agent host.
An agent requires a service account that has the rights to read security information on the remote host. Only previously configured service accounts that are registered with Data Governance Edition are available for selection. For more information, see Readying a service account and domains for deployment.
Click the Add button to add the agent to the agents list.
|
TIP: For remote managed hosts, add only one remote agent during the host's initial deployment. You can add additional remote agents later using the Edit host settings task after the managed host is deployed. |
Use the Managed Paths page to specify the roots of the NTFS directory tree to be scanned by the agent.
To add managed paths:
On the Managed Paths Picker dialog, click the check box to the left of a directory to add it to the managed paths list.
|
NOTE: When using multiple agents to monitor a remote managed host, select an agent from the Agent Selection drop-down after selecting the managed path(s) to be monitored. Repeat this process for all of the other agents, selecting different managed paths for each agent. The Scanning Agent field in the Managed Paths Selection grid displays the agent selected to scan the different paths. |
Click OK to save your selections and close the dialog.
The selected paths appear on the Managed Paths page.
By default, remote agents scan daily at 2:00 A.M. Use the Security Scanning page to change the time and frequency with which the agent scans the target computer.
To modify the scanning schedule and settings:
Use the options at the bottom of the page to modify the default security scanning behavior:
Collect activity for real-time security updates: Select this check box to watch for changes to the structure and security of the file system on the target managed host and apply them to the scanned data.
By default, resource activity is not collected. Use the Resource Activity page to enable and configure resource activity collection on the target host.
|
IMPORTANT: Collecting resource activity on your managed hosts impacts network usage and increases the load on the database server and Data Governance server, especially when collecting activity on large busy servers. Configuring the proper exclusions and aggregation window is important to limit some of this load. Carefully plan out which resources you want to collect activity on and enable resource activity collection only on those resources. |
To configure resource activity collection and aggregation:
Select the type of events to be collected:
Use the Aggregation control to set the time frame to be used to consolidate similar events. Valid aggregation intervals are:
By default, certain well-known system accounts, file extensions and folders are excluded from the resource activity collection. To modify the exclusion list, click the Resource Activity Exclusions button to specify the accounts and objects to be excluded.
|
Note: By default, the Data Governance agent excludes the domain service account from activity collection and aggregation. |
Scanning of the specified managed paths begins on the configured schedule. Once the managed host is successfully added (Status is Managed), you are able to see and manage security information for the folders and shares on the target managed host using the Resource browser. Double-click a managed host in the Managed hosts view to launch the Resource browser.
You can add EMC storage devices as managed hosts, with remote agents. This procedure covers NAS devices running EMC Celerra/VNX or EMC Isilon operating systems with the CIFS file system protocol enabled.
|
NOTE: You can configure one target host computer at a time or multiple host computers (of the same type) at once. |
To add an EMC CIFS device as a managed host
Select Manage host from the Tasks view or right-click menu.
|
NOTE: If you selected multiple host computers with the status of Not Managed and of the same host type, use the Manage multiple hosts task or right-click menu command. The settings specified on the Managed Host Settings dialog will apply to all selected host computers. |
The Managed Host Settings dialog appears.
|
NOTE: If you select a host computer on a domain that was not previously identified as a managed domain, the Domain Credentials dialog appears. Click the Set button to supply the credentials of an Active Directory user with administrative rights on the selected domain. Assigning the credentials for the domain registers the user as a Data Governance Edition service account, links the service account to the domain and adds it to the managed domains list. Once the domain credentials are set, the Managed Host Settings dialog appears. |
Agent Install Path: (Optional) Use this field to specify an alternate installation location. This must be a local path (for example, C:\MyPath) and cannot exceed 512 characters.
|
NOTE: By default, this field displays Use default install directory and the agent is installed in the Data Governance agent services installation directory (%ProgramFiles%\One Identity\One Identity Manager Data Governance Edition\Agent Services). |
Use the Agents page to select the remote agent and service account to be used to scan the target host.
To add a remote agent:
Select the service account: Select a service account with sufficient permissions to access the target computer and the agent host.
An agent requires a service account that has the rights to read security information on the remote host. Only previously configured service accounts that are registered with Data Governance Edition are available for selection. For more information, see Readying a service account and domains for deployment.
Click the Add button to add the agent to the agents list.
|
TIP: For remote managed hosts, add only one remote agent during the host's initial deployment. You can add additional remote agents later using the Edit host settings task after the managed host is deployed. |
|
Note: If you are collecting resource activity (Collect and aggregate events on the Resource Activity page) or real-time security updates (Collect activity for real-time security updates on the Security Scanning page), you can only specify one agent to scan the EMC storage device. |
Use the Managed Paths page to specify the roots of the NTFS directory trees to be scanned by the agent.
To add managed paths:
On the Managed Paths Picker dialog, click the check box to the left of a directory to add it to the managed paths list.
|
NOTE: When using multiple agents to monitor a remote managed host, select an agent from the Agent Selection drop-down after selecting the managed path(s) to be monitored. Repeat this process for all of the other agents, selecting different managed paths for each agent. The Scanning Agent field in the Managed Paths Selection grid displays the agent selected to scan the different paths. |
Click OK to save your selections and close the dialog.
The selected paths appear on the Managed Paths page.
By default, remote agents scan daily at 2:00 A.M. Use the Security Scanning page to change the time and frequency with which the agent scans the target computer.
To modify the scanning schedule and settings:
Use the options at the bottom of the page to modify the default security scanning behavior:
Collect activity for real-time security updates: Select this check box to watch for changes to the structure and security of the file system on the target managed host and apply them to the scanned data.
|
Note: If you enable Collect activity for real-time security updates, ensure your EMC device is configured for auditing. |
By default, resource activity is not collected. Use the Resource Activity page to enable and configure resource activity collection on the target host.
|
IMPORTANT: Collecting resource activity on your managed hosts impacts network usage and increases the load on the database server and Data Governance server, especially when collecting activity on large busy servers. Configuring the proper exclusions and aggregation window is important to limit some of this load. Carefully plan out which resources you want to collect activity on and enable resource activity collection only on those resources. |
To configure resource activity collection and aggregation:
Select the type of events to be collected:
Use the Aggregation control to set the time frame to be used to consolidate similar events. Valid aggregation intervals are:
By default, certain well-known system accounts, file extensions and folders are excluded from the resource activity collection. To modify the exclusion list, click the Resource Activity Exclusions button to specify the accounts and objects to be excluded.
|
Note: By default, the Data Governance agent excludes the domain service account from activity collection and aggregation. |
Use the View/Update cepp.conf button to check the status or modify the cepp.conf file. Selecting this button displays a Logon Credentials dialog allowing you to enter the IP address or hostname and credentials of the EMC Celerra/VNX control station and select the data mover that holds the managed paths to be scanned.
Once the cepp.conf is retrieved and displayed, you can edit the Proposed cepp.conf file (lower pane). Select the Update File button to save your edits, which will be sent to the EMC device.
|
Note: The cepp service will be stopped and restarted for the selected data mover to apply the new cepp.conf file. |
Scanning of the specified managed paths begins on the configured schedule. Once the managed host is successfully added (Status is Managed), you are able to see and manage security information for the folders and shares on the target managed host using the Resource browser. Double-click a managed host in the Managed hosts view to launch the Resource browser.
Data Governance Edition supports the scanning of NAS devices with NFS file system protocol enabled, including NetApp 7-Mode, NetApp Cluster and EMC Isilon devices.
|
NOTE: Before adding an NFS managed host, ensure the following configuration steps have been completed:
For EMC Isilon NFS managed hosts:
For NetApp 7-Mode NFS managed hosts (does NOT apply to Cluster Mode devices):
|
Adding a NFS managed host
From the Managed hosts view, select Manage NFS host from the Tasks view or right-click menu.
The Managed Host Settings dialog appears.
Agent Install Path: (Optional) Use this field to specify an alternate installation location. This must be a local path (for example, C:\MyPath) and cannot exceed 512 characters.
|
Note: By default, this field displays Use default install directory and the agent is installed in the Data Governance agent services installation directory (%ProgramFiles%\One Identity\One Identity Manager Data Governance Edition\Agent Services). |
Port: Enter the destination port to be used for communication between the agent and target NAS host computer.
Click the Test API Credentials button to verify valid credentials have been entered.
Use the Agents page to select the remote agent and service account to be used to scan the target host.
To add a remote agent:
Select the service account: Select a service account with sufficient permissions on the selected agent host.
Only previously configured service accounts that are registered with Data Governance Edition are available for selection. For more information, see Readying a service account and domains for deployment.
Click Add to add the agent to the agents list.
|
TIP: For remote managed hosts, add only one remote agent during the host's initial deployment. You can add additional remote agents later using the Edit host settings task after the managed host is deployed. |
Use the Managed Paths page to specify the directories to be scanned by the agent to create and maintain the security index.
To add managed paths:
In the Managed Paths Picker dialog, select the check box to the left of the directories to be scanned.
|
NOTE: When using multiple agents to monitor a remote managed host, select an agent from the Agent Selection drop-down after selecting the managed path(s) to be monitored. Repeat this process for all of the other agents, selecting different managed paths for each agent. The Scanning Agent field in the Managed Paths Selection grid displays the agent selected to scan the different paths. |
Click OK to save your selections and close the dialog.
The selected paths appear on the Managed Paths page.
By default, remote agents scan daily at 2:00 A.M. Use the Security Scanning tab to change the time and frequency with which the agent scans the target computer.
To modify the scanning schedule and settings:
Review the options at the bottom of the page to modify the default security scanning behavior:
Collect activity for real-time security updates: Select this check box to watch for changes to the structure and security of the file system on the target managed host and apply them to the scanned data.
|
Note: Collecting real-time security updates is not available for EMC Isilon NFS devices. |
|
NOTE: For NetApp 7-Mode managed hosts, real-time security updates and resource activity collection requires FPolicy. In order to use FPolicy, CIFS file system protocol must be enabled. |
By default, resource activity is not collected. Use the Resource Activity page to enable and configure resource activity collection on the target host.
|
IMPORTANT: Collecting resource activity on your managed hosts impacts network usage and increases the load on the database server and Data Governance server, especially when collecting activity on large busy servers. Configuring the proper exclusions and aggregation window is important to limit some of this load. Carefully plan out which resources you want to collect activity on and enable resource activity collection only on those resources. |
|
Note: Collecting resource activity is not available for EMC Isilon NFS devices. |
To enable and configure resource activity collection and aggregation:
Select the type of events to be collected:
Use the Aggregation control to set the time frame to be used to consolidate similar events. Valid aggregation intervals are:
By default, certain file extensions and folders are excluded from the resource activity collection. To modify the exclusion list, click the Resource Activity Exclusions button to specify the objects to be excluded.
Scanning of the specified managed paths begins on the configured schedule. Once the managed host is successfully added (Status is Managed), you are able to see and manage security information for the folders and shares on the target managed host using the Resource browser. Double-click a managed host in the Managed hosts view to launch the Resource browser.
Data Governance Edition supports the scanning of folders hosted on SharePoint Online and OneDrive for Business.
To add a cloud managed host
In the Managed hosts view, select Manage Cloud host from the Tasks view or right-click menu.
The Managed Host Settings dialog appears.
Agent Install Path: (Optional) Use this field to specify an alternate installation location. This must be a local path (for example, C:\MyPath) and cannot exceed 512 characters.
|
NOTE: By default, this field displays Use default install directory and the agent is installed in the Data Governance agent services installation directory (%ProgramFiles%\One Identity\One Identity Manager Data Governance Edition\Agent Services). |
On the Cloud Provider page, enter your Office 365 domain and the administrator account login credentials to be used to authenticate with the Data Governance Edition API Cloud proxy.
|
Note: Data Governance Edition only supports one Office 365 domain per cloud provider at this time. That is, you can deploy only one managed host for the SharePoint Online administrator account and one managed host for the OneDrive for Business administrator account. Data Governance Edition does not currently block you from deploying a second SharePoint Online or OneDrive for Business managed host; however, it will not work. |
|
Note: You must use a separate administrator account for this purpose. This administrator account must be, or have equal access as, a SharePoint Online Administrator. Each site will be modified to list this account as a Site Collection Administrator for the site. This provides the account with access to the site's contents. |
Click Continue.
Clicking the Continue button redirects you to Microsoft to sign in to your account and grant access to Office 365 data.
Click Sign In.
An additional screen describing the permissions required by the Data Governance Edition API cloud proxy are displayed.
Click Accept.
The Cloud Provider page now displays the account being used to authenticate with the Data Governance Edition API cloud proxy.
Use the Agents page to select the remote agent and service account to be used to scan the target host.
|
Note: You can only specify one agent to scan a cloud host. |
To add a remote agent:
Select the service account: Select a service account with sufficient permissions on the selected agent host.
Only previously configured service accounts that are registered with Data Governance Edition are available for selection. For more information, see Readying a service account and domains for deployment.
Click Add to add the agent to the agents list.
Use the Managed Paths page to specify the folders under the Documents site to be to be scanned by the agent to create and maintain the security index.
|
Note: OneDrive for Business support is limited to the Documents folder for the Administrator account. Therefore, all managed paths are selected within the scope of the Administrator's Documents folder. |
To add managed paths:
On the Managed Paths Picker dialog, click the check box to the left of the folder(s) to be scanned.
|
TIP: A check box appears to the left of the folders that can be selected. Click the expansion box to the left of a container to expand it and navigate to the folders available for scanning. |
Click OK to save your selections and close the dialog.
The selected paths appear on the Managed Paths page.
By default, remote agents scan cloud-based managed hosts daily at 2:00 A.M. Use the Security Scanning page to set the time and frequency with which the agent scans the target computer.
To modify the scanning schedule and settings:
Use the options at the bottom of the page to modify the default security scanning behavior:
Scanning of the specified managed paths begins on the configured schedule. Once the managed host is successfully added (Status is Managed), you are able to see and manage security information for the resources on the target managed host using the Resource browser. Double-click the managed host in the Managed hosts view to launch the Resource browser
© 2023 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy