DataPrivilege Operation and Administration Lab Guide
DataPrivilege Operation and Administration Lab Guide
Administration
Lab Instructions
DataPrivilege 6.4.56.70
6. A request will be sent to the Varonis Partner team that will need to be approved before your
environment is deployed. You will receive an email once the request has been approved and your
environment has been deployed.
7. Once your environment has been deployed, you will see the environment if you click on “Environments” on the
left-hand side. The status of the environment will say “Up” if it is ready to be used.
9. Each machine has three action buttons. Connect, stop and restart.
a. Connect – Opens a new tab in your browser and opens a RDP connection to the selected server.
b. Stop – Turns off the virtual machine
c. Restart – Restarts the virtual machine
*Note: The connect button functions differently for Varonis employees. Clicking “Connect” will
download a link to an RDP session for the machine you selected. You will then have to enter the
username/password for the machine to connect. The username for all machines is
“vrnslab\itadmin” and the password is “P@ssword1!”.
10. If you do not finish the lab in the time period that you selected when deploying the environment, the
environment will shut down. You have the option to restart the lab the next day and pick up from the previous
spot you stopped at by selecting the “Start” option.
Overview: The goal of this lab is to understand how to configure commit credentials for DP and the Group OU that
groups will be created in.
Outcome: The domain will be configured so the groups that are created within DP will be created in a separate OU.
Before opening the DP portal, it’s important to configure the domain commit credentials and the Group OU that groups
will be created in. For the purpose of this lab, the OU in Active Directory has already been created. In DP 6.3 and
above, the domain is configured within the management console.
1. Connect to the machine “IDUxxxxx”. Open the Varonis Management console on the desktop.
2. Go to “Domains” and then highlight the domain that is configured in the Management Console and click “Edit”.
4. Here is where the Domain Commit Credentials and the Group OU are configured for DP. By default, DP will use
the account that was used to setup the domain when Varonis was installed. The only requirement for this
account is it must be a member of the administrators group. The Group OU is where all groups will be created
once they are created in DP. As you can see, an OU called “DP” was created for this lab. Review the settings
and click “cancel”.
Overview: The goal of this lab is to understand the available configuration options and to configure the settings of
DataPrivilege in the “Advanced Administration” section.
Outcome: The “Advanced Administration” menu allows access to DataPrivilege configuration options. The menu
provides workflow options to administer user roles, define permission types and exclude groups from the DataPrivilege
workflow. At the end of this lab you will have understood and configured the settings of the DataPrivilege “Advanced
Administration” menu.
3) First click on the “Excluded Groups” option on the left menu panel under “Advanced Administration” and then
on “Add”
6) To exclude the group you will need to click “Add” and then click “OK”
1) First click on the “Permission Types” option on the left menu panel. You will see the built-in list of default
permissions available. Click the “i” information button next to the Full permissions option
Is Monitored > If the permission type is monitored, it will be detected and available for use, if it is not
monitored, it will be hidden from use
Can be used for new permissions > Allows this permission to be commited to the file system if used
Visible > This option will allow all users of DataPrivilege to view this permission set if it is an option on a
folder
Type ‘ALL YOU NEED’ into the Alias field, and click OK to close out of the window
4) In addition to the existing permission types, you will now have the ability to choose the inheritance level for a
newly created permission type. Also you can define a SPECIAL permission if you specify the permission mask.
Please note that a permission type name is unique and can exist only once in DataPrivilege.
In the Permission type name box, enter Write Only, and in the Alias box, enter Blind Write. Below, in the
Apply onto section, click the down arrow and select “This folder, subfolders and files” option, and then place a
check in the box next to Write. Place a check the boxes in this order: Is monitored, Can be used for new
persmissions and then Visible. Click “OK”.
Please follow the steps to understand the “User Roles” section in this lab.
1) First click on the “User Roles” option. Additional user roles can be added by clicking the Add button. This step
does not need to be performed during this lab. The two available types of User Roles are:
• A System Administrator can configure and see all options.
• A Request Supervisor Role can only view items in DataPrivilege – This role is typically assigned to
Help Desk individuals so they have the ability to check on the status of any pending requests.
Overview: The goal of this lab is to understand the available configuration options and to configure the basic
settings of DataPrivilege in the “Administration” section. The Administration section includes the ability to assign
ownership to Active Directory security groups and also add and managed shared folders as well.
Outcome: At the end of this lab you will have understood and configured the basic settings of DataPrivilege
“Administration” menu:
• Base Folders – Configured folders to which people can request access
• Groups – Assigned owners to AD Security Groups for management
1) Expand the Administration section on the left hand side and click the Base Folders link. In the right section,
you will see the Lab server defined already. Select the default location and click on the Add Location button
below.
3) In order to see the Finance group appear under Lab, please press the "+” icon to view the nested locations as
seen below.
5) Place a check next to the Finance location, and remove the Check next to DP, and then click the Add Folder
button below.
7) Click the Search Hosts button and HUB-IDU will appear in the window. Click the + sign next to the root folder
to expand the tree. Click the + sign next to Share and finally, click on the Finance folder to select it, and then
click OK
9) The path to the share will now appear in the section below. You will have the option to manage existing
permissions on the directory or to have DataPrivilege create new permissions for this location. Under the New
Permissions section, place a check in the boxes next to Read and Write. DataPrivilege will automatically fill in
a generic group name. In the space provided next to Read, delete the generic permission names and fill in
LAB-FINANCE-R-R for Read. In the space provided next to Write, delete the generic permission names and
fill in LAB-FINANCE-RW-RW for Write). NOTE: If you copy and paste the group names into the lab,
please be sure to delete any trailing spaces to avoid errors.
11) Place a check in the box next to “Bypass Group Authorization” and click Next.
Note: Administrators may choose to exclude groups from the data authorization process if membership
authorization for the relevant group is not required for data authorization)
12) You will now be presented with the Data Owner selection screen. This screen is used to select the Data Owner
of the base folder configured above – the Finance folder. Click the “Add User” link underneath Users
14) You will now see Erin’s name in the window. Check the box under “Owner” to make her an owner of the
folder. Click on the Next button
16) You will now be back at the Base Folders section. Expand the Finance location and click on the Finance folder
in order to verify that Erin is the data owner. Note: You may need to refresh the page for this to show.
18) You will see a new Add Base Folders Wizard appear. Click the “…” button next to Select Folders
20) You will now see the path to the share listed in the Select Folders section. Click the Add button
22) You will now be presented with the Data Owner selection screen. This screen is used to select the Data Owner
of the base folder configured above – the HR folder. Click the” Add user” link underneath users
24) You will now see Erin’s name in the Select Data Owners window. Check the box under “Owner” to make her an
owner of the folder. Click on the Next button
26) You will now be back at the Base Folders section. Expand the HR location and select the HR folder in order to
verify that Erin is the data owner.
1) Under the Administration section, click on the Groups link. Select the LAB-Finance-R-R group, then click the
Add button under the Group Owners section
2) A Users Search window will appear. Click the “…” to bring up the search window.
5) This will move Erin’s name to the lower section. Place a check in the box next to “Add selected users as
authorizers” and click OK
7) Place a check in the box next to Lab-Marketing-R-R and Lab-Marketing-RW-RW, then click the Add button to
the right under the Group Owners section
8) A User Search box will come up. Click the “…” icon to bring up a search window.
10) Michael’s name will appear in the top User Search window. Click the Add button to move him to the lower
section.
12) Michael Lewis is now assigned as an owner and authorizor for both Marketing security groups
Overview: The goal of this lab is to understand the available configuration options and to configure the basic
settings of DataPrivilege in the “Configuration” section:
• Mapping Settings
• Application Settings
• DataPrivilege Appearance
• Navigational Menus
• Mail Appearance
• Mail Configurations
Outcome: At the end of this lab you will have understood and configured the basic settings of DataPrivilege
“Configuration” menu.
The Permission Requests and Group Membership Requests tabs allow you to configure the email behavior for
Data Privilege, including the options for individuals (requestee, authorizer, owner, admin and additional email
recipients) that should receive an email corresponding to different DataPrivilege actions (request made,
request handled, request summary). Data Privilege also allows you to select or customize the email sections
(subject, text at the top of message, text at bottom of message). In addition to the email options, one would
also have the ability to configure reminder emails, expiration times and expiration actions
3) You will see a Subject Formatting window appear. This allows you to change the subject on the emails sent
by DataPrivilege for this request type. For example, if you wanted to include the request time in the subject,
you could simply add the word ‘at’ followed by ‘<RequestTime>’ tag in the subject line. Click Cancel to close
out of this window without saving any changes
7) Click on the Edit link next to “Custom HTML formatting”. A new window will appear that allows you to browse
and upload an HTML template for the body of the email. This template can contain DataPrivilege keyword
tags as well. Click cancel to exit this window
9) The preview option will display an overview of the information that will be contained in the email based on the
configuration options you have selected. It will also contain some of the variables and logic that will
determine which options of the email will appear. The lower half of the Preview window also contains data
relevant to the ability for owners or authorizers to approve requests via email. Click the X button in the upper
right hand of the Preview window to close the window.
1) First, expand the Configuration menu if it is not already open, and then click on the “Mail Appearance” in the
menu. At the top of the Mail Appearance window, you will see an example of the layout and configurable
objects.
2) Scroll the window down until you see the configuration options. The mail appearance configuration menu
provides the ability to customize header images, text, font, and color options for the emails generated by
DataPrivilege.
3) In the Header section, to adjust the color settings, simply click the color swath next to any of the Background
Color options and drag the pointer to the desired color, or enter the HTML color code information in the box.
6) Click the Preview button at the bottom of the section to view a preview of the output based on the proposed
changes
8) You can click the X button on the upper right of the Preview window to close the box. You do not need to
save any of the settings. Click the Reset button to revert back to the default settings
1) First, expand the Configuration menu if it is not already open, and then click on “Data Privilege Appearance”.
Within this section, you will see one built-in theme; Light which is the default for DP 6.4.
2) As an example, the Header section will be used to demonstrate some of the available changes. Click on the
link to Header
4) Next, click the white square next to the Font color line. A color palette selection will appear. You may click
within the selection window to select a color or enter the HTML color code in the box below. Once you have
selected a new font color, click the color swath to confirm, and then click the Save link
6) You may revert back to the default state by selecting the Header option, and clicking the Revert link next to
both the Font family and Font color items.
8) Similar configuration options are available in the rest of the Appearance cateogires, however, they will not be
covered in detail in this lab
1) Within the Navigational Menu section, you will see each section (Top Menu, Left Menu, and Management Tabs)
listed, along with editable text fields for each as well as check boxes to enable or disable visibility for each role
within DataPrivilege. Please note that some of the roles do not have the checkboxes available for certain
options, which means that the section is not applicable to that role. Scroll down and to the left to view these
settings and familiarize yourself with them.
3) Scroll down and click the Save button at the very bottom of the screen to update the view.
5) The text for each item is configurable as well. For example, the first item under the “Menu Options” section is
“Summary”. Click in the textboxes to modify the text. In the example below, we have simply capitalized all
letters in the word summary, so it will now appear as “SUMMARY”. Scroll down and click the Save button at
the very bottom of the screen to update the view
1) First, expand the Configuration menu if it is not already open, and then click on the “Application Settings” in
the menu. Within this section, you will see all of the application categories which are available for
configuration.
2) Click on the General link to display a list of general configuration options. Click on the “i” next to “Allow
administrators to view and edit management screens”
4) In order for this change to take effect, you must refresh the browser. Click on the Refresh icon at the top of
the Firefox window.
5) You will see a message asking if you would like to resend the information you previously submitted. Click the
Resend button
6) The DataPrivilege window will appear again, and you will see the Management category on the left of the
window has disappeared. *Please revert the change once completed*
• Entitlement review signing options – this feature allows you to select the signing method for an
entitlement review, either forcing the reviewer to enter their domain password as a signature they have
performed the review, or allowing them to enter a defined text string (this option is set using the Text to
be used for signature field)
• Entitlement Review confirmation – this option allows you to enter custom text for the signature
verification, so you can include relevant company information (such as company policy sections) that
covers the signing of entitlement reviews
• Group prefix for new groups in Active Directory – this setting controls the default security group prefix
when DataPrivilege is used to create new AD security groups for permissions. This can be used to comply
with company naming conventions for security groups
• Grant traverse permissions to folders up to the share level – this feature will automatically grant traverse
permissions up to the share level. This is useful if a user connects at the share, then they will have the
ability to drill down until they reach the folder where they were granted rights
Overview: The goal of this lab is to understand the available information in the “Management” section of DP:
• Folder Owner
• Group Owner
• Folder Authorizer
• Group Authorizer
Outcome: At the end of this lab you will understand the information available in the “Management” section.
1) Expand the Management menu. Click on the “Folder Owner” link. You will be presented with an expandable
tree structure of the managed folders. To view data relevant to a particular folder, you can drill down in the
tree and place a check in the box next to the directory, as show in the picture below for the Finance folder. In
the right panel, it will show all of the security groups and users who are permissioned on the directory as well
as the level of permissions each has, as displayed in the picture below. In addition, you can select the
“Authorizers” tab to view any authorizers assigned to that folder. Similarly, you can select the “Auth Rules” or
“Automatic Rules” tabs to view any rules or workflows configured for the directory
3) Click on the “Folder Authorizer” link. You will be presented with a list of the managed folders. If you click on
the folder name, you will see all of the security groups and users assigned to the folder, the type of entity
(Global Group, Local Group and Person), and the permissions assigned for that folder location.
Overview: The goal of this lab is to give you a clear overview of the role and responsibilities of the Data Owners role in
DataPrivilege.
Outcome: At the end of this lab you will have configured and customized all the options you can have for a Data and
Group Owner.
1) While still logged in as Administrator, click on the Administration option on the left to expand the view, and then
click on Base folders. Drill down in the tree until you reach the Marketing folder. Place a check in the box next
to Marketing, then click the Add button on the bottom right under the Data Owners section
3) In the Search box, type in Erin and click the Search button. When Erin appears below, place a check next to her
name and click the OK button
4) Erin will appear in the top section, click the Add button to move Erin to the lower section. Check the box to add
the selected users as authorizers and then Click OK to complete the process
7) In Firefox, enter the credentials for Erin in the Windows Security box. The username will be “emanning” and
the password will be “P@ssword1!”. Click OK
8) Click on “Management” then “Folder Owner”. You will see that you are now the Data Owner of some folders.
Expand the directory tree to the right, drill down until you locate the “Finance” folder and place a check in the
box next to it. In the “Permissions” section, as a data owner, you have the ability to Edit the managed
directories and change the available permissions. Click on Edit button
12) In the Authorizer Details window, click the “…” icon next to Select Users to bring up the search window
14) Click the Add button to move Allen down to the bottom section, then click OK to complete the action
1) The Group Owners functionality is similar to the Directory Owners functionality. Click on the Group Owner link
to display the groups which Erin owns. Place a check in the box next to LAB-Finance-R-R, then click on the
Authorizers tab to the right.
3) In the membership request section, the owner has the ability to search and select users to add to the group,
as well as configure an automatic expiration which will automatically revoke the membership based on the
criteria selected. Click Cancel to close this window
Overview: The goal of this lab is to give you a clear overview of the role and responsibilities of the Authorizers role in
Data Privilege.
Outcome: At the end of this lab you will have a clear overview of the Authorizer role.
When data authorizers approve or decline requests, only those groups to which a user can be assigned are displayed.
With DataPrivilege, multiple levels of authorization can be defined to ensure data and group membership is protected.
An authorizer can be assigned to any authorization level, even if the preceding levels have not been defined.
1) Firefox was open from the previous section, please close IE and reopen it. In Firefox, enter the credentials for
“Allen” in the Windows Security box. The username will be “acarrey” and the password will be “P@ssword1!”.
Click OK
With DataPrivilege, multiple levels of authorization can be defined to ensure data and group membership is protected.
An authorizer can be assigned to any authorization level, even if the preceding levels have not been defined.
1) Firefox was open from the previous section, please close it and reopen it. In Firefox, enter the credentials for
Michael in the Windows Security box. The username will be “mlewis” and the password will be “P@ssword1!”.
Click OK
2) While still logged into DataPrivilege as Michael, click on the Group Authorizer option, then click on the LAB-
Marketing-R-R display name. As an authorizer, on the Permissions tab you will have the ability to view where
your security group grants access and what level of permissions it grants to a folder, but you will have no ability
to make changes. Similarly, on the Members tab, you have the ability to see any member of a security group for
which you are designated as an Authorizer; however, you will not be able to make any changes
Overview: The goal of this lab is to create one permission request to access a folder, and another to create membership
a request to a security group or distribution list. As of DataPrivilege 6.3, users can now create permission requests
directly from the file system. This functionality will not be covered in this lab guide. It is also possible to grant folder
permissions to a group nested within another group, if the parent group has direct permissions on the folder.
Outcome: At the end of this lab you will be able to do submit requests for your current user or for someone else.
PERMISSION REQUEST
1) Close Firefox if it is still open from the previous lab, and then re-open it.
2) In Firefox, enter the credentials for Allen in the Windows Security box. The username will be “acarrey” and
the password will be “P@ssword1!”. Click OK
3) Click on Permission Requests on the left bar. You will see a Permissions Request form. Since you are requesting
access for yourself, you do not need to make any changes in the User section. In the Folders section, click on the
“Browse…” button to select the folder to which you wish to request access
5) You will see the Finance folder path in the Folders section. Click the Add button to move the directory down to
the Operations section
7) In the Explanation section, the requestor will need to specify the reason they are requesting access. This is to
provide justification to the Authorizer so he knows to accept, modify or deny the request in a later stage. Type
the text, “Need access for reporting” into the text field
8) Clicking on the “Advanced” button allows you to specify the length of your request. You are able to request
permissions for a specific time frame (for example for financial reporting during one week at the end of a fiscal
month or fiscal quarter), so Data Privilege will be able to commit the access rights during that time period and
then revoke it automatically. Click on Advanced and make sure the Expiration is set to Never, then click on the
Finish button to complete the request
10) The permission request has been sent to the authorizers. Close Firefox and continue on to the next section
Note: You may need to click on the “Get Mail” tab in Thunderbird to check for new message. You may need
to repeat this process after a few minutes if the email does not arrive immediately
3) In Firefox, enter the credentials for Erin in the Windows Security box. The username will be “emanning” and
the password will be “P@ssword1!”. Click OK
5) Type “OK” into the authorization explanation window and click “approve”.
MEMBERSHIP REQUEST
1) You will now do the same process to complete a Group Membership Request. Close and re-open Firefox and
enter the credentials for Allen in the Windows Security box. The username will be ‘acarrey” and the password
will be “P@ssword1!”. Click OK
3) In the Group Search window, click on the LAB-Marketing-RW-RW group to select it, and then click OK
5) You will now see a widow indicating that your request has been sent. Close Firefox and move on to the next
section
Note: You may need to click on the “Get Mail” tab in Thunderbird to check for new message. You may need
to repeat this process after a few minutes if the email does not arrive immediately
2) To automatically get directed to the request, click on the link in the “To view the reqest page: click here”
section of the email
5) Type “OK” into the authorization explanation window and click “approve”.
Overview: The summary screen provides an easy, quick reference point for both users and data owners to quickly
review and take action on requests or entitlement reviews
Outcome: At the end of this lab you will understand the functionality available in the Summary Screen for Data
Owners
1) Close and re-open Firefox, and enter the credentials for Erin in the Windows Security box. The username will
be “emanning” and the password will be “P@ssword1!”. Click OK
For non-directory owners, they will only see the ‘My Requests’ and ‘Requests waiting for my approval’. The
My Requests section will display any recently submitted permissions or group membership requests. As a
requester, you will see the status of your request, the type of request and the resource target. The requester
may also view the details or cancel a request if it has not yet been approved.
4) The Requests waiting for my approval section is where a directory owner or authorizer would go to view and
open permissions or membership requests for resources assigned to them. They will be able to quickly see all
of the relevant information at a glance, such as the date and time the request was made, the requester, the
type of request and the target resource for the request. The owner or authorizer would also be able to access
the request details in this screen to approve or deny a pending request. *Note: The screenshots in step 4
and 5 will vary from what you see in the portal as we have already approved the request from
Allen Carrey in a previous lab.”
Overview: The goal of this lab is to build a custom workflow for authorizing permissions or group membership
requests using Varonis DataPrivilege. In the lab you will create a multi-level authorization process for access approval
based on clauses built from attributes pulled from Active Directory
Outcome: At the end of this lab you will have configured, customized and saved a multi-level authorization workflow
process for permissions or group membership requests
3) An Authorizer Rule Details window will appear. Click the Edit button under the Clauses section
5) The clause that was just created will now appear under the clause section of the Authorizer Rule Details
window. In the Rule name box, enter in ‘HR Workflow’. Click the Add button under the Authorizers section to
add request authorizers for this workflow
7) In the Users Search window, type in ‘eric’ into the search box and click the Search button. Eric Adler will
appear in the search results, click on his name to select him and then click the OK button
9) You will now be back at the Authorizer Rule Details window with Eric added as a level 1 Authorizer. Click the
Add button under Authorizers to add another authorizer
11) In the Users Search window, type ‘erin’ into the search box and click the Search button. Erin manning will
appear in the search results, click on her name to select her and then click the OK button
13) You will now see Eric Adler as a level 1 authorizer and Erin Manning as a level 2 authorizer. What this means
is that when someone requests access to the HR folder who does not have the HR department code in Active
Directory, it will require both Eric and Erin to sign off on the request before it is approved. Click the OK
button at the bottom right to save and close the Authorizer Rule Details window
15) Close and re-open Firefox and enter the credentials for Allen in the Windows Security box. The username will be
“acarrey” and the password will be “P@ssword1!”. Click OK
17) The folder selection window will appear. Click on the + sign next to vrnslab.se to expand the share tree.
Expand the HR location and click on the HR folder to select it, and then click on OK
20) As you can see, for this request, since it matched the criteria configured earlier, in order for the request to be
fully processed, it will need to be reviewed and approved by both Eric and Erin. Click the Close button to close
the window.
21) Click on the Summary link in the left column in DataPrivilege and expand the My Requests option to view
Allen’s pending request. To see details about the request for the HR share, click the blue “i” icon next to the
request
Note: You may need to click on the “Get Mail” tab in Thunderbird to check for new message. You may need
to repeat this process after a few minutes if the email does not arrive immediately
25) DataPrivilege will automatically load the approval page for Allen Carrey’s request. Under the Authorization
section, click “approve” then enter in the text “OK” in the request approval box and click “approve” to
complete the request approval. Once this is complete, close Firefox by clicking the X button in the upper right
of the window and return to Thunderbird.
Please note: This request email will not appear in Erin’s mailbox until after the request has been approved by
the 1st level approver, Eric Adler, because of the authorization workflow process configured
28) DataPrivilege will automatically load the approval page for Allen Carrey’s request. Under the Expiration Date
section, select the radio button next to the last option and enter 1 into the box. This will cause the permission
to be approved but it will be automatically revoked after 1 day. Click the “approve” button then enter “OK”
into the authorization explanation window. Click “approve” to complete the request.
30) In the left column of Data Privilege, click on the Summary link. In the middle section, underneath ‘My
Requests’, you will now see that the request has been Approved.
Overview: The goal of this lab is to build a custom ethical wall for denying permissions or group membership
requests using Varonis DataPrivilege based on clauses built off data fields pulled from Active Directory
Outcome: At the end of this lab you will have configured, customized and saved an ethical wall for preventing
unauthorized access to a resource
2) Click on the Management link in the left column to expand the options. Click on the Folder Owner link. Click
on the + sign next to vrnslab.se to expand the directory tree. Expand the Marketing location and then click
on the Marketing folder to select it. You will then be presented with information about this folder to the far
right. Click on the tab to the far right called ‘Automatic Rules’ and then click on the Add button below.
4) A Rule Clauses box will appear. In the first clause box, click the down arrow and select Department, in the
dropdown box immediately to the right, click the down arrow and select Equals, and finally in the last box type
in “HR” (no quotes). This will match the Department field extracted from the Active Directory properties
against the text string entered in the box, and if it equals HR, the clause will be flagged as true. Click the OK
button
6) Once back at the owner portal, the new automatic rule will appear under the Automatic Rules tab.
8) Click on the Permission Request link in the left column of the DataPrivilege window. Under section 2, Folders,
click on the Browse button
9) The folder selection window will appear. Click on the + sign next to vrnslab.se to expand the share tree.
Expand the Marketing location and click on the Marketing folder to select it, and then click on OK
12) Click on Summary, and you will see that the request has been declined instantly. This is because Eric is in the
HR department according to Active Directory and the automatic rule will deny any permission requests for the
Marketing folder which originate from a user with a department of HR.
Overview: The goal of this lab is to create an entitlement review and then walk through the steps of performing one
based on the criteria configured
Outcome: At the end of this lab you will have configured, customized and saved an entitlement review and walked
through the business user portion of completing an entitlement review
2) In the left hand column, click on the Administration link. The Administration group will expand and
underneath there will be several options. Click on the Entitlement Review link. The entitlement review
configuration will appear in the right-hand panel. The scheduling tabs will provide options for how often the
entitlement review should be run. In this example, you may leave the default scheduling as we will run the
report manually once it is configured.
4) The Add Managed Groups window will appear and it will display a list of groups which DataPrivilege has
detected. Click on LAB-Marketing-RW-RW to select it and then click OK.
6) A new window will open and you will be presented with a folder browser. To expand the tree, click the + sign
next to vrnslab.se. Expand the Finance location and click on the Finance folder to select it, and then click OK
8) Use the scroll bar to the right to scroll down to the bottom of the Entitlement Review page and save the
changes.
10) A new window will open, click on the Scheduling tab. At the bottom of the Entitlement Review scheduling
section, click on the “Run Now” button.
12) Open Thunderbird from the desktop and expand Erin’s email ([email protected])
14) Clicking the link in the body of the email will automatically launch Firefox. Enter the credentials for Erin in the
Windows Security box. The username will be “emanning” and the password will be “P@ssword1!”. Click OK
16) An Entitlement Review details window will pop up displaying the users who have permissions to the shares
which you are reviewing. You will also be provided with the options to keep or remove the user’s access. To
see additional information, you may click the drop down box on the right of the Entitlement Review window
and select “Detailed users’ effective permissions”.
18) From the “View” dropdown, if you select the File-system permissions option, you will be able to see the
security groups that are applied to the share
19) In the “View” dropdown box, select “Users’ effective permissions.” This will again display the user within the
security group. You will have the option to either keep the user or remove him from the security group as
part of the Entitlement Review. If you select the Remove option, you will be prompted to enter a reason.
21) Enter “Still Valid” as the reason to keep Allen Carrey and finally type “P@ssword1!” into the box under the
heading, “I confirm that I have reviewed the objects listed above, along with their content.” Click the Sign
button
22) This concludes the Entitlement review portion of the DataPrivilege lab, close Firefox.
Overview: The goal of this lab is to familiarize the users with what search options and features are available
Outcome: At the end of this lab you will understand how to use the DataPrivilege search features
2) Click on the Search category in the left column to expand the menu. Within DataPrivilege, there are two
different search features. Click on Simple Search in the sub-menu. The standard search option provides a
simple dropdown menu to select the operation type on which you would like to report, and a radio button that
allows you to select the time range on which to report, being weekly, monthly, or All
4) Click the “Advanced Search” link. The Advanced Search feature provides more fine-grained control over the
search results. This will allow you to filter by the requestor or requestee, the request type, request operation
type, or by a specific request status. Furthermore, you can filter the search by a specific request ID if it is
known. The advanced search also provides the option to limit an exact start and end date for the search as
well. Select “Pending” and click search. This will provide a view into all of the requests that are in a pending
state.
5) This concludes the Search section. Leave Firefox open for the next lab.
Overview: The goal of this lab is to create and customize the most common and useful reports with DataPrivilege
Outcome: At the end of this lab you will have configured, customized and saved two common reports within
DataPrivilege
2) You will need to authenticate before producing the report. Use “emanning” and “P@ssword1!” to
authenticate.
3) The report will appear in the bottom portion of the window (Note, this may a minute)
5) In the first dropdown box, select Request Date, then for the date mode, select ‘Relative last’ and finally, enter
30 into the days box to configure the report to display the results from the last 30 days
6) Click on the Group tab to group the results. Click the Add button to add a grouping option. Click the down
arrow and select Status as the grouping option
8) The report will output all of the entitlement reviews over the last 30 days, grouped by status and sorted from
oldest to newest. (Note, this may take a minute)