Selecting custom attributes for data user details

You must define and configure a set of custom attributes before you can get information about data users.
Initially, you can define the data user, the read count, write count, and one or two active readers and writers.
For a particular file of interest, the incident snapshot and
Veritas Data Insight
details provide the information to determine who uses a file.
For example, to determine the data users of a cluster of files, perform the suggested steps in the following procedure. If all the files in a folder do not have appropriate access permissions, you can determine who has accessed those files.
  1. To determine the data users of a cluster of files
  2. Define a set of custom attributes for the Data Insight Lookup Plug-in.
  3. Set up and run a
    Network Discover
    scan of the folder of interest in the file share.
  4. After the scan has run, display the incident list. The
    File Owner
    is one of the columns. However, this field does not provide the access pattern for these files.
  5. You can select
    Advanced Filters & Summarization
    . Then run a summary by the
    Veritas Data Insight
    data user. This summary lists the users who most frequently accessed the files in the folder of interest.
  6. After an analysis of incidents, you can determine if additional custom attributes are needed from the information that
    Veritas Data Insight
    provides. Then new custom attributes can be defined, configured, and looked up.
  7. After you define any new custom attributes, click the
    Lookup
    option on the incident snapshot. Then make sure that no connection errors are recorded in the
    Incident History
    section.
    The values that appear in the incident snapshot
    Attributes
    section are the new ones.
    Any deleted custom attributes and values are no longer present.
    If the mapping of any custom attribute is changed and a new lookup is run, the new mapping overrides any old values in the reports.