Title Page EMC® Kazeon-eDiscovery Version 4.8.0 IS1200 Web-Admin User Guide EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.EMC.com Legal Notice Copyright © 2007 - 2015 EMC Corporation. All rights reserved. Published December 2015 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. Adobe and Adobe PDF Library are trademarks or registered trademarks of Adobe Systems Inc. in the U.S. and other countries. All other trademarks used herein are the property of their respective owners. Documentation Feedback Your opinion matters. We want to hear from you regarding our product documentation. If you have feedback about how we can make our documentation better or easier to use, please send us your feedback directly at: [email protected] The IS1200 software is based in part on software licenses from the following: Outside In® Content Access © 1991-2015, Chicago, Inc. Open Source code from www.java2s.com called the itext.asian.jar available at: http://www.java2s.com/Code/Jar/GHI/itext-asian.jar.htm Copyright 2009 - 12 Demo Source and Support. All rights reserved In part on the work of the Independent JPEG Group. Code from Inxight Software, Inc. Copyright © 1996-2015. All rights reserved. www.inxight.com. Certain icons used by the Kazeon Web applications come from the Silk Icon set (http://www.famfamfam.com/lab/icons/silk/) licensed under the Creative Commons Attribution 2.5 license (http://creativecommons.org/licenses/by/2.5/). ii IS1200 Web-Admin 4.8.0 User Guide Contents Tables.......................................................................................................xxi Figures....................................................................................................xxiii Preface..................................................................................................xxix Audience ..................................................................................................xxix Related Documentation ............................................................................xxix Conventions used in this document ..........................................................xxx Where to get help ....................................................................................xxxii Revision History .....................................................................................xxxii Chapter 1: Introduction About the IS1200....................................................................................................... 2 IS1200 Product Offerings......................................................................................... 3 IS1200-Enterprise Content Server....................................................................3 IS1200-File Intelligence Enterprise...................................................................4 IS1200-File Intelligence......................................................................................5 Remote Office Editions......................................................................................5 Key Concepts............................................................................................................ 5 Optional Add-on Modules...................................................................................... 8 Symantec Enterprise Vault Connector............................................................8 Microsoft Exchange Connector........................................................................8 Microsoft SharePoint Connector......................................................................9 EMC Celerra Retention Manager.....................................................................9 EMC Centera Connector...................................................................................9 EMC Documentum Connector.........................................................................9 EMC SourceOne Archive Connector...............................................................9 Lotus Domino Connector..................................................................................9 Concepts Search..................................................................................................9 IS1200 Web-Admin 4.8.0 User Guide iii Contents Information Center Server (Federation).......................................................10 Legal App License............................................................................................10 Legal Hold LIcense..........................................................................................10 Laptop and Desktop Connector.....................................................................10 NetApp SnapSearch.........................................................................................10 NetApp Retention Manager...........................................................................10 EMC Atmos Cloud Connector.......................................................................11 Chapter 2: Initial Configuration Overview, Options, and Outlines Overview................................................................................................................. 14 Basic Configuration.........................................................................................14 Advanced Configuration................................................................................15 Chapter 3: The IS1200 Graphic User Interfaces GUIs Overview....................................................................................................... 20 Supported Browsers and Browser Setup............................................................ 21 The Manager Page.................................................................................................. 23 Opening the Manager Page............................................................................23 The Web-Admin Application............................................................................... 25 Launching Web-Admin...................................................................................25 Launching IS1200 Web-Applications............................................................26 Concurrent Web Application Logins............................................................27 The IS1200 Web Application Page Header and Login Bar.........................28 Web-Admin Navigation...............................................................................29 Navigation Pane...........................................................................................30 The Web Search Application................................................................................. 31 The Web Reports Application............................................................................... 31 Chapter 4: The Command Line Interface Using the IS1200 Command-Line Interface........................................................ 34 Accessing the CLI from the network.............................................................35 Accessing the CLI from a Serial port.............................................................36 Common CLI Commands...............................................................................37 Usage Tips.........................................................................................................38 Troubleshooting SSH Connections..............................................................39 Chapter 5: Role Based Administration Introduction............................................................................................................ 42 Setting Up Access for Multiple Users...........................................................42 Local Users..................................................................................................42 Authenticated Users.....................................................................................42 Roles and Privileges Overview......................................................................43 iv IS1200 Web-Admin 4.8.0 User Guide Contents Roles and Cases.................................................................................................44 Roles and External Authentication...................................................................... 45 Using External Authentication Groups with IS1200 Roles.........................45 Detailed Role Privileges......................................................................................... 46 Using the CLI For Role Maintenance................................................................... 49 To list role entitlements:..................................................................................49 To add a user to a role......................................................................................49 To add all users to a role..................................................................................50 To remove a user from a role..........................................................................51 To remove all users from a role......................................................................51 To display a user’s roles..................................................................................52 Chapter 6: Creating and Managing Clusters About Nodes and Clusters.................................................................................... 54 Cluster and Node Setup Guidelines..............................................................54 What You Need to Know to Start a Cluster........................................................ 55 Exporting the Cluster Key...............................................................................56 First Time Startup Procedures........................................................................56 Managing a Cluster................................................................................................ 58 Starting a cluster...............................................................................................59 To stop a cluster................................................................................................60 Exporting Cluster keys....................................................................................60 To add nodes to a cluster.................................................................................61 To remove nodes from a cluster.....................................................................62 To rename a cluster..........................................................................................62 To migrate nodes between clusters................................................................63 The Intelligent Platform Management Interface (IPMI).................................... 63 IPMI vs. DRAC.................................................................................................64 Cluster Leadership...........................................................................................65 The Split Brain Situation..................................................................................65 Chapter 7: Configuring External Authentication Overview of External Authentication.................................................................. 68 The Authentication Services Listing Display...............................................69 Managing Authentication for Network Information Services......................... 69 Adding NIS external authentication using...................................................70 To remove external authentication for NIS using Web-Admin...................70 To configure NIS external authentication using the CLI............................71 Managing Authentication for Active Directory................................................. 71 Specifying AD Server Identities.....................................................................72 Active Directory Server Protocols Supported..............................................72 Additional Requirements for AdvancedAD and Kerberos Authentication IS1200 Web-Admin 4.8.0 User Guide v Contents 73 Active Directory Authentication Procedures..................................................... 74 Adding AD Authentication Using Web-Admin............................................74 To configure AD external authentication using the CLI............................75 Verifying Active Directory Configuration...................................................76 Verifying Advanced AD and Kerberos Protocol.........................................76 Recommended Settings in centrifydc.conf for High Load IS1200 Servers.. 78 Additional Parameters in centrifydc.conf File.............................................79 Troubleshooting Adding Authentication Errors..........................................81 To remove AD external authentication using Web-Admin..........................84 Overriding the current AD communication protocol using Linux..............84 Checking the current AD communication protocol using Linux.................84 Managing AD authentication using the CLI................................................84 Configuration Issues with Multiple Domain Controllers..........................85 Support for Multiple Organization Units (OUs).........................................87 Organizational Unit Persistence..................................................................88 Chapter 8: The Identity Vault Identities and Identity Vault Purpose and Usage.............................................. 92 Using an Identity with External Authentication.........................................93 Adding Identities to the Identity Vault............................................................... 93 To add an identity from Web-Admin...........................................................93 To add an identity from the Command Line...............................................95 To view identities from Web-Admin............................................................96 To view identities from the Command Line................................................96 To remove an identity from Web-Admin.....................................................96 To remove an identity from the Command Line........................................97 Using Identities to Configure Report and Services Notifications................... 97 Chapter 9: Repository Registration and Management Introduction to Registration............................................................................... 100 Data Repositories...........................................................................................100 Local Data Repositories.............................................................................101 Metadata Repositories...................................................................................101 Local Metadata Repositories.....................................................................102 Primary Metadata Repositories..................................................................102 Data to Metadata Repository Registration Limitations............................103 Storage Tiers...................................................................................................103 Repository Registration: Rules and Guidelines............................................... 104 Directory, File, and Filepath Limitations....................................................104 Metadata Repositories Requirements.........................................................105 Data Repository Requirements and Recommendations..........................105 vi IS1200 Web-Admin 4.8.0 User Guide Contents Permissions for NFS and CIFS Data Repositories.....................................106 Addressing Requirements for VMware Repositories...............................107 CIFS Server, Laptop, and Desktop Setup Requirements..........................107 Best Practices...................................................................................................107 Moving Primary Metadata Repositories........................................................... 107 Requirements and Preparations for Metadata Repositories........................... 110 Preparing an NFS Metadata Repository Share Overview........................111 Preparing a CIFS Metadata Repository Share Overview.........................111 Local Metadata Repository (localkazfs) Requirements.............................112 Registering NFS or CIFS Metadata Repositories.............................................. 114 Registering an NFS Metadata Repository:..................................................115 Registering a CIFS Metadata Repository:...................................................117 Adding a Local Metadata Repository (localkazfs):...................................119 The Discovery Process......................................................................................... 120 Discovery Preparation...................................................................................120 Discovering Laptops and Desktops.............................................................120 Discovery Methods.........................................................................................121 Scheduling a Discovery Service....................................................................122 Running Environment Discovery Jobs Again............................................126 Registering Discovered Repositories...........................................................126 Registering Known NFS or CIFS Data Repositories........................................ 130 Registering an NFS Data Repository:..........................................................132 Registering a CIFS Data Repository:............................................................135 Kazeon Support for EMC CTA.....................................................................139 Adding a Laptop or Desktop Repository:..................................................141 Adding a Local Data Repository (localdatafs)...........................................144 Adding a Local USB Drive as a Data Repository......................................145 Removing a Local USB Drive/Data Repository........................................146 Adding Repositories Using Optional Modules..........................................147 Managing Repositories........................................................................................ 147 Repository Listings and Status.....................................................................148 Filters..........................................................................................................148 Toolbar.......................................................................................................148 The Repository Listing...............................................................................149 Editing and Viewing Registered Repositories...........................................150 Importing Data and Metadata Repositories...............................................151 Removing Repositories..................................................................................152 To Remove a Repository............................................................................153 IS1200 Web-Admin 4.8.0 User Guide vii Contents Removing all Repositories.........................................................................153 Moving Metadata Repositories.......................................................................... 153 Managing Repository States............................................................................... 155 Changing Repository State...........................................................................156 Chapter 10:Policies: Classification, Extraction, and Assignment Rules Classifying Files Using Classification Rules..................................................... 158 Basic Classification.........................................................................................161 Deep Classification........................................................................................161 The IS1200 Object Data Model.....................................................................162 Metadata Classifications...............................................................................162 Metadata Extracted by Classification Service............................................163 Classification Service Management.............................................................164 Optimizing Classification of Large Files....................................................164 Limiting the Size of Extracted Full-text....................................................165 Partial Classification..................................................................................165 Classifying Index Text Header..................................................................166 Computing Partial Hash.............................................................................166 Resetting Minimum/Maximum file classification time-outs.....................167 About Classification Rules and Rulesets.......................................................... 167 Types of Rule Sets..........................................................................................169 Named Rule Sets........................................................................................169 Default Rule Sets.......................................................................................169 Initial Rule Sets..........................................................................................170 Sample Extraction Rule Set.......................................................................170 Using Extraction Rules..................................................................................170 Using Assignment Rules...............................................................................171 When to Use Extraction or Assignment Rules...........................................172 Creating and Managing Rules and Rule Sets................................................... 173 To create a rule set.........................................................................................173 To delete a rule set.........................................................................................174 Creating an Extraction Rule..........................................................................175 Using Regular Expressions in Extraction Rules........................................177 Using RegEx to Set Configuration Properties from the GUI...................177 Example: Creating Full-text Indexes with the Optional Parser.................178 Creating an Assignment Rule......................................................................178 Creating KQL Queries...............................................................................180 KQL Query Format....................................................................................180 KQL Examples..........................................................................................182 Moving Rules Between Rule Sets................................................................183 Changing the Listing Order of Rules in Rule Sets.....................................185 viii IS1200 Web-Admin 4.8.0 User Guide Contents Chapter 11:Policy Groups: Authorization Policies About Policies and Policy Groups...................................................................... 190 Authorization Policies....................................................................................191 Maintaining Policy Groups................................................................................. 192 To create a policy group................................................................................193 To remove a policy group.............................................................................194 Authorization Policies.......................................................................................... 194 Resolving Permission Conflicts....................................................................194 Maintaining Authorization Policies................................................................... 195 To add an Authorization (Access) policy....................................................195 To view, edit, or delete a policy....................................................................197 Chapter 12:Custodian Mapping Overview................................................................................................................ 200 Using Global Mappings....................................................................................... 202 Adding a Global Rule....................................................................................202 Modifying a Global Rule...............................................................................203 Deleting a Global Rule...................................................................................203 Using the Exceptions Pane.................................................................................. 204 Adding an Exception.....................................................................................204 Modifying an Exception................................................................................205 Deleting an Exception....................................................................................206 Chapter 13:Working with PST Files How the IS1200 Provides World Class Searching............................................ 210 How PST Files Fit In The Picture........................................................................ 214 Failures Encountered with Open PST Files....................................................... 215 PST Failure Solutions.....................................................................................216 Reprocessing PST Files in Another Location.................................................... 217 Identifying Live-Locked Errors During Processing..................................217 Reprocessing Files with Live-Locked Failures...........................................218 Increasing Classification Performance for PSTs............................................... 219 Chapter 14:Job Scheduling and Classification Services Job Scheduling Overview.................................................................................... 223 Basic and Deep Classifications Compared.................................................224 Selective Classifications.................................................................................225 Initial and Differential Classifications.........................................................225 Differential Classifications.........................................................................226 Metadata Repositories...................................................................................226 Factors Affecting Job Scheduling, Completion, and Speed............................ 227 Licensing and Job Scheduling.......................................................................227 Repository Status and Availability..............................................................228 IS1200 Web-Admin 4.8.0 User Guide ix Contents Ensuring Complete Classifications..............................................................229 Computing File Hash Values.......................................................................230 Other Types of Classifications and Services..................................................... 230 Metadata Classifications...............................................................................230 Metadata Synchronizations..........................................................................231 Single Step Collections..................................................................................231 Job Editing............................................................................................................. 232 The Job Manager Page......................................................................................... 233 Opening the Page...........................................................................................233 The Jobs Manager Pane Interface................................................................233 The Job List Tab..............................................................................................233 The Tool-bar..............................................................................................236 The Job Listing..........................................................................................237 Managing Jobs................................................................................................238 Deleting a Job............................................................................................238 Editing a Job From Web-Admin................................................................238 Editing a Job From The CLI......................................................................239 Viewing or Reprocessing Job Failures from Web-Admin........................239 Viewing Job Failures From The CLI.........................................................241 Starting, Stopping, Suspending, or Resuming a Job..................................241 Refresh Job Listings..................................................................................242 Job Details.................................................................................................242 Manifests................................................................................................................ 244 Viewing Collection Manifests......................................................................245 Viewing Actionable Services Summary Manifest Reports......................246 Viewing Detailed Manifest Reports............................................................248 Limiting Custodian Lists in Detailed Manifest Reports............................249 Scheduling Jobs.................................................................................................... 250 Job Scheduling Overview.............................................................................250 Job limit............................................................................................................251 Submitting or Scheduling Jobs.....................................................................251 Using job Scheduling Options:.....................................................................252 Run Now Jobs............................................................................................252 Run Once Jobs...........................................................................................253 Recurring Jobs...........................................................................................253 Run Forever Jobs.......................................................................................255 Job Scheduling Procedures................................................................................. 255 Scheduling Classification Services..............................................................256 Scheduling a Basic Crawl..............................................................................257 Scheduling a Deep Crawl.............................................................................264 Scheduling a Metadata Classification.........................................................284 Scheduling a Metadata Synchronization....................................................287 Scheduling a Single Step® Collection.........................................................291 x IS1200 Web-Admin 4.8.0 User Guide
Description: