Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
governance [2018_06_15 23:14] – steven | governance [2024_03_18 21:10] – [2 Permissions and access control] steven | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Governance Settings ====== | ====== Governance Settings ====== | ||
+ | == last updated on April 27, 2020 == | ||
===== 1 User Management ===== | ===== 1 User Management ===== | ||
- | + | {{ ::screenshot_2020-10-30_at_15.23.05.png?600 |}} | |
- | {{:/governance:steps: | + | |
Users and user roles can be controlled directly by the Cloud Administrator when setting up the Cloud File Server. | Users and user roles can be controlled directly by the Cloud Administrator when setting up the Cloud File Server. | ||
- | |||
===== 2 Permissions and access control ===== | ===== 2 Permissions and access control ===== | ||
+ | {{ :: | ||
+ | Once shared folders for the Cloud File Server have been added, the Cloud File Server Admin can control access to folders and sub folders using an access control list. If a user has no permission to a folder the folder is not displayed at all in their file tree. | ||
- | {{:/ | + | FAQ: We often get asked if we support Active Directory integration. We support Active Directory integration, |
- | + | ||
- | Once shared folders for the Cloud File Server have been added, the Cloud File Server Admin can control access to folders and sub folders using an access control list. If a user has no permission to a folder the folder is not displayed at all in their file tree.\\ \\ FAQ: We often get asked if we support Active Directory integration. We support Active Directory integration, | + | |
Line 22: | Line 20: | ||
+ | {{ :: | ||
- | {{:/ | + | The Access Anywhere Admin can setup Audit Watch notifications. Notifications are based upon rules that are invoked on file events. If a file of a certain description, |
- | The Cloud File Server Admin can setup notifications. Notifications are based upon rules that are invoked on file events. If a file of a certain description, | ||
+ | ===== 4 Event Auditing and Other Governance Options ===== | ||
- | ===== 4 Event Auditing | + | Event logging is built into Access Anywhere |
+ | {{ : | ||
+ | ===== 5 Displaying and Filtering Event Logs ===== | ||
- | {{:/ | + | The org. admin can view the events belonging to the org. on the Audit Events Log page which is accessed from the admin' |
- | Auditing is built into the Cloud File Server and it works above any information Cloud that is mapped to the fileserver. The granularity of the events that are logged s controlled by the Cloud File Server Admin. | + | {{ : |
- | ===== 5 Event Logs ===== | + | There are five filters: |
+ | **Search logs** | ||
+ | The contents of the Log field will be filtered by the value you provide here without regard to case. \\ \\ | ||
- | {{:/governance:steps: | + | {{ :cloudappliance:better_logs.png? |
- | Event logs are generated if auditing is turned on and these can be displayed, filtered, exported or archived. | + | **Type** |
+ | Events are classified by type. You can filter by any single type or allow all types: \\ \\ | ||
- | ===== 6 Recording GEO locations ===== | + | {{ : |
+ | **User, Date and Tool** | ||
+ | You can also filter by the user whose action caused the events, the date or range of dates during which the events occurred, and the tool that was used. \\ \\ | ||
+ | {{ : | ||
+ | The date range is inclusive. | ||
- | {{:/ | ||
- | GEO locations are recorded with regards to where a file was uploaded from and also where a file was uploaded to. This can ensure companies comply with electronic data laws and international compliance regimes\\ | + | You can set values in any or all of the five filters |
+ | Use the Search button at the bottom left of the page to re-filter the results after you change a filter value. You can reset all of the filters to their default (no value) state by clicking in the link under the Search button. \\ \\ | ||
+ | {{ : | ||
+ | === Exporting Audit Logs === | ||
+ | Your filtered set of audit log entries can be downloaded in four forms: | ||
+ | * Excel workbook | ||
+ | * .csv file | ||
+ | * .zip archive. | ||
+ | * PDF file as a formatted report | ||
- | ===== 7 Disable File Sharing ===== | + | Access these three options from the Export pulldown near the top of the Audit Event Logs page: \\ \\ |
+ | {{ : | ||
+ | === Archiving and Erasing Audit Logs === | ||
+ | Because audit log entries accumulate quickly you will probably want to archive the entries from time to time and then erase them. You can access archiving and deletion features from the Options pulldown near the top of the Audit Event Logs page: \\ \\ | ||
+ | {{ : | ||
+ | To archive the audit log entries, select Archive from the pulldown menu and a confirmation box will be displayed: \\ \\ | ||
+ | {{ : | ||
+ | Click on Archive to proceed or Cancel to cancel. | ||
+ | If you proceed a background task will be created which will create a zip file containing the audit log entries. | ||
+ | {{ : | ||
- | {{:/ | + | Audit logs archives will be placed by the background task in an Audit logs Archive directory in the admin' |
- | The Cloud FIle Server Admin can disable any sharing or collaboration features of the Cloud File Server entirely by disabling the ability for any user to do any form of file sharing or collaboration. | + | {{ : |
+ | Select Erase Logs from the pulldown menu to erase old audit log entries. | ||
+ | <WRAP center round important 60%> | ||
+ | When you erase audit log entries they will no longer be available from Access Anywhere. | ||
+ | </ | ||
+ | When you erase audit log entries, only entries from before a date that you select will be erased: | ||
- | ===== 8 Controlling other Data Clouds ===== | + | {{ : |
+ | After you have selected the date click on Erase to proceed or click on Cancel if you have changed your mind. | ||
+ | === Tracing Downloads by Watermark === | ||
+ | The Access Anywhere provides a [[watermarking|]] feature that affixes a random watermark code to downloaded PDF files. You may sometimes want to learn the details of when a watermarked file was downloaded. | ||
- | {{:/governance:steps: | + | {{ :cloudappliance:ael_watermarking_logs.png? |
- | As the Organization, | + | This will take you to the Watermarking Logs page: |
+ | {{ : | ||
- | ===== 9 Encryption options ===== | + | When this page loads it displays a list of all watermarked file downloads in reverse chronological order. |
+ | ### Also See | ||
+ | [[cloudappliance/ | ||
- | {{:/ | + | ===== 6 Recording GEO locations ===== |
- | Cloud Admins can choose for all files to be encrypted when stored on Cloud. This encryption is AES 256 bit military grade encryption. | ||
+ | {{ : | ||
- | ===== 10 File versioning Options ===== | + | GEO locations are recorded with regards to where a file was uploaded from and also where a file was uploaded to. This can ensure companies comply with electronic data laws and international compliance regimes |
+ | ===== 7 Disable File Sharing ===== | ||
- | {{:/governance:steps: | + | {{ ::screenshot_2020-10-30_at_16.10.52.png?600 |}} |
- | To ensure | + | The Access Anywhere Admin can disable any sharing or collaboration features of Access Anywhere entirely by disabling |
+ | ===== 8 Controlling User Access to Storage ===== | ||
- | ===== 11 HIPAA Compliance ===== | + | {{ :: |
+ | As the Organization, | ||
+ | For example if each user has a corporate Google Apps account, then the Admin can enable users to add this directly (with any use also being monitored and audited. | ||
- | {{:/ | ||
- | HIPAA provides national minimum standards to protect an individualâs health information.\\ \\ Although many vendors advertise HIPAA compliance, there is no standard "HIPAA certificate of compliance" | + | ===== 9 Encryption options ===== |
+ | |||
+ | {{:/ | ||
+ | |||
+ | Cloud Admins | ||
+ | |||
+ | See the [[cloudencryption|encryption section]] for further information. | ||
+ | |||
+ | |||
+ | ===== 10 File versioning Options ===== | ||
+ | |||
+ | {{:/governance: | ||
+ | |||
+ | To ensure the lifecycle | ||
+ | For further information see the [[versions|versioning section]]. | ||
+ | ### Also See | ||
+ | * [[features/ | ||
+ | * [[geoip|IP white listing / black listing]] | ||
+ | * [[antivirus|Virus Scanning Protection]] | ||
+ | * [[watermarking|Watermarking Documents]] |