Selecting custom attributes for data user details
You must define and configure a set of custom attributes before you can get information about data users.
Initially, you can define the data user, the read count, write count, and one or two active readers and writers.
For a particular file of interest, the incident snapshot and
Veritas Data Insight
details provide the information to determine who uses a file.For example, to determine the data users of a cluster of files, perform the suggested steps in the following procedure. If all the files in a folder do not have appropriate access permissions, you can determine who has accessed those files.
- To determine the data users of a cluster of files
- Define a set of custom attributes for the Data Insight Lookup Plug-in.
- Set up and run aNetwork Discoverscan of the folder of interest in the file share.
- After the scan has run, display the incident list. TheFile Owneris one of the columns. However, this field does not provide the access pattern for these files.
- You can selectAdvanced Filters & Summarization. Then run a summary by theVeritas Data Insightdata user. This summary lists the users who most frequently accessed the files in the folder of interest.
- After an analysis of incidents, you can determine if additional custom attributes are needed from the information thatVeritas Data Insightprovides. Then new custom attributes can be defined, configured, and looked up.
- After you define any new custom attributes, click theLookupoption on the incident snapshot. Then make sure that no connection errors are recorded in theIncident Historysection.The values that appear in the incident snapshotAttributessection are the new ones.Any deleted custom attributes and values are no longer present.If the mapping of any custom attribute is changed and a new lookup is run, the new mapping overrides any old values in the reports.