Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
governance [2018_06_15 23:47] – steven | governance [2024_04_24 22:01] (current) – [Archiving and Erasing Audit Logs] smeadmin | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Governance Settings ====== | ====== Governance Settings ====== | ||
+ | == last updated on April 27, 2020 == | ||
===== 1 User Management ===== | ===== 1 User Management ===== | ||
- | {{:/governance:steps: | + | {{ ::screenshot_2020-10-30_at_15.23.05.png?600 |}} |
Users and user roles can be controlled directly by the Cloud Administrator when setting up the Cloud File Server. | Users and user roles can be controlled directly by the Cloud Administrator when setting up the Cloud File Server. | ||
Line 9: | Line 10: | ||
===== 2 Permissions and access control ===== | ===== 2 Permissions and access control ===== | ||
- | {{:/governance:steps: | + | {{ ::screenshot_2020-10-30_at_15.25.15.png?600 |}} |
Once shared folders for the Cloud File Server have been added, the Cloud File Server Admin can control access to folders and sub folders using an access control list. If a user has no permission to a folder the folder is not displayed at all in their file tree. | Once shared folders for the Cloud File Server have been added, the Cloud File Server Admin can control access to folders and sub folders using an access control list. If a user has no permission to a folder the folder is not displayed at all in their file tree. | ||
- | FAQ: We often get asked if we support Active Directory integration. We support Active Directory integration, | + | FAQ: We often get asked if we support Active Directory integration. We support Active Directory integration, |
Line 19: | Line 20: | ||
- | {{:/governance:steps: | + | {{ ::screenshot_2020-10-30_at_15.27.16.png?600 |}} |
- | The Cloud File Server | + | The Access Anywhere |
- | ===== 4 Event Auditing and other Governance | + | ===== 4 Event Auditing and Other Governance |
+ | Event logging is built into Access Anywhere and it works above any storage provider that is mapped to Access Anywhere. Which types of events are logged can be controlled by the org. admin from the Security tab of the Policies page: | ||
+ | {{ : | ||
- | {{:/ | + | ===== 5 Displaying and Filtering Event Logs ===== |
- | Auditing is built into the Cloud File Server and it works above any information Cloud that is mapped | + | The org. admin can view the events belonging |
+ | {{ : | ||
- | ===== 5 Event Logs ===== | ||
+ | There are five filters: | ||
+ | **Search logs** | ||
- | {{:/ | + | The contents of the Log field will be filtered by the value you provide here without regard to case. |
- | Event logs are generated if auditing is turned on and these can be displayed, filtered, exported or archived. | + | {{ : |
+ | **Type** | ||
- | ===== 6 Recording GEO locations ===== | + | Events are classified by type. You can filter by any single type or allow all types: |
+ | {{ : | ||
+ | **User, Date and Tool** | ||
+ | You can also filter by the user whose action caused the events, the date or range of dates during which the events occurred, and the tool that was used. | ||
+ | {{ : | ||
- | {{:/ | + | The date range is inclusive. |
- | GEO locations are recorded with regards to where a file was uploaded from and also where a file was uploaded to. This can ensure companies comply with electronic data laws and international compliance regimes | ||
+ | You can set values in any or all of the five filters and then search. | ||
- | ===== 7 Disable File Sharing ===== | + | Use the Search button at the bottom left of the page to re-filter the results after you change a filter value. You can reset all of the filters to their default (no value) state by clicking in the link under the Search button. |
+ | {{ : | ||
+ | === Exporting Audit Logs === | ||
+ | Your filtered set of audit log entries can be downloaded in four forms: | ||
+ | * Excel workbook | ||
+ | * .csv file | ||
+ | * .zip archive. | ||
+ | * PDF file as a formatted report | ||
+ | Access these three options from the Export pulldown near the top of the Audit Event Logs page: | ||
+ | {{ : | ||
+ | === Archiving and Erasing Audit Logs === | ||
+ | Because audit log entries accumulate quickly you will probably want to archive the entries from time to time and then erase them. You can access archiving and deletion features from the Options pulldown near the top of the Audit Event Logs page: | ||
+ | {{ : | ||
+ | To archive the audit log entries, select Archive from the pulldown menu and a confirmation box will be displayed: | ||
+ | {{:: | ||
- | {{:/ | + | Select a folder to archive the logs to. |
- | The Cloud FIle Server Admin can disable any sharing or collaboration features of the Cloud File Server entirely by disabling the ability for any user to do any form of file sharing | + | Click on Archive |
+ | If you proceed a background task will be created which will create a zip file containing the audit log entries. | ||
- | ===== 8 Controlling other Data Clouds ===== | + | {{ : |
+ | Audit logs archives will be placed by the background task into the directory chosen when archiving was started. | ||
+ | Select Erase Logs from the pulldown menu to erase old audit log entries. | ||
+ | <WRAP center round important 60%> | ||
+ | When you erase audit log entries they will no longer be available from Access Anywhere. | ||
+ | </ | ||
+ | When you erase audit log entries, only entries from before a date that you select will be erased: | ||
- | {{:/governance:steps: | + | {{ :server:erase_logs_date.png? |
- | As the Organization, | + | After you have selected |
- | For example if each user has a corporate Google Apps Docs account, then the Admin can enable users to add this directly, and any use of it can also be monitored and audited. | + | === Tracing Downloads by Watermark === |
+ | The Access Anywhere provides a [[watermarking|]] feature that affixes a random watermark code to downloaded PDF files. You may sometimes want to learn the details of when a watermarked file was downloaded. | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | This will take you to the Watermarking Logs page: | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | When this page loads it displays a list of all watermarked file downloads in reverse chronological order. | ||
+ | |||
+ | ### Also See | ||
+ | |||
+ | [[server/ | ||
+ | |||
+ | ===== 6 Recording GEO locations ===== | ||
+ | |||
+ | |||
+ | {{ : | ||
+ | |||
+ | GEO locations are recorded with regards to where a file was uploaded from and also where a file was uploaded to. This can ensure companies comply with electronic data laws and international compliance regimes | ||
+ | |||
+ | |||
+ | ===== 7 Disable File Sharing ===== | ||
+ | |||
+ | {{ :: | ||
+ | |||
+ | The Access Anywhere Admin can disable any sharing or collaboration features of Access Anywhere entirely by disabling the ability for any user to do any form of file sharing or collaboration from Access Anywhere policies page. | ||
+ | |||
+ | ===== 8 Controlling User Access to Storage ===== | ||
+ | |||
+ | {{ :: | ||
+ | |||
+ | As the Organization, | ||
+ | |||
+ | For example if each user has a corporate Google Apps account, then the Admin can enable users to add this directly | ||
===== 9 Encryption options ===== | ===== 9 Encryption options ===== | ||
- | {{:/ | + | {{:/ |
- | Cloud Admins can choose for all files to be encrypted when stored on Cloud. This encryption is AES 256 bit military grade encryption. | + | Cloud Admins can choose for all files to be encrypted when stored on private / cloud storage. This encryption is AES 256 bit military grade encryption. |
+ | |||
+ | See the [[cloudencryption|encryption section]] for further information. | ||
===== 10 File versioning Options ===== | ===== 10 File versioning Options ===== | ||
- | {{:/ | + | {{:/ |
To ensure the lifecycle of a file is tracked then file versioning can be turned " | To ensure the lifecycle of a file is tracked then file versioning can be turned " | ||
+ | For further information see the [[versions|versioning section]]. | ||
+ | |||
+ | ### Also See | ||
+ | |||
+ | * [[features/ | ||
+ | * [[geoip|IP white listing / black listing]] | ||
+ | * [[antivirus|Virus Scanning Protection]] | ||
+ | * [[watermarking|Watermarking Documents]] |