close

Crypto-virus Ransomware Attack

Some interesting resources for Enterprise Vault and SQL:

In addition to the Best Practices to implement in SQL, we learn the following:

Information in the Enterprise Vault Directory database:

  • Enterprise Vault server configuration
  • Enterprise Vault services configuration
  • Enterprise Vault policies
  • Content source server details and their configuration
  • Target object and provisioning or synchronization configuration
  • Archive and folder structure details
  • Security identifiers and access control lists
  • Index location and index volume configuration
  • Storage sharing group, vault store and partition configuration
  • Archive, PST and Index management tasks

Information contained in the Audit database:

  • Admin and synchronization configuration changes
  • Archive activity (archive item, view item, delete item, restore item) [detailed]
  • Item changes to folder location or retention category
  • Item recovery
  • SharePoint services activity including item retrieval
  • Migration activity (PST/NSF) [detailed]
  • Advanced searches
  • Move archive operations and tasks
  • Indexing task operations

Information contained in the database Monitoring:

  • Monitoring counter, collection and threshold configuration
  • Gathered metric values and historic records

Information contained in the database Reporting Database:

  • Enterprise Vault service and task status
  • Volume of items archived per Enterprise Vault server
  • Mailbox archiving status
  • Archive quota usage per user
  • Most frequently accessed archived items (requires audit database)
  • Journal mailbox archiving status and trends (requires monitoring database)
  • Vault store usage by archive or billing account

Information contained in the database Vault Store:

  • All items archived within the vault store and associated metadata
  • Archive statistics and, in Enterprise Vault 10.0.4 and later, content provider statistics
  • Items requiring indexing, backup or synchronization of client applications
  • Items requiring updates such as folder path or retention category
  • Items requiring deletion or expiry
  • Items currently in processing by the indexing services
  • Item legal hold status details

Information contained in the database Fingerptint:

  • All sharable item content hash values
  • All sharable item shared link references

Information contained in the database FSA Reporting:

  • Server and drive statistics
  • Folder and file statistics
  • User statistics

This article has been read 102 times.


endpoint security eset     endpoint security by bitdefender blocked this page

TAGS

CATEGORIES