2-DatAdvantage Operational Use Training Lab Guide 7.5
2-DatAdvantage Operational Use Training Lab Guide 7.5
Lab Instructions
DatAdvantage 7.5.8.91
6. A request will be sent to the Varonis Partner team that will need to be approved before your
environment is deployed. You will receive an email once the request has been approved and your
environment has been deployed.
7. Once your environment has been deployed, you will see the environment if you click on “Environments” on the
left-hand side. The status of the environment will say “Up” if it is ready to be used.
9. Each machine has three action buttons. Connect, stop and restart.
a. Connect – Opens a new tab in your browser and opens a RDP connection to the selected server.
b. Stop – Turns off the virtual machine
c. Restart – Restarts the virtual machine
*Note: The connect button functions differently for Varonis employees. Clicking “Connect” will
download a link to an RDP session for the machine you selected. You will then have to enter the
username/password for the machine to connect. The username for all machines is
“corp.local\administrator” and the password is “password2”.
10. If you do not finish the lab in the time period that you selected when deploying the environment, the
environment will shut down. You have the option to restart the lab the next day and pick up from the previous
spot you stopped at by selecting the “Start” option.
2. A script will run that automatically starts Varonis services. Once it’s complete, the window will automatically
close and you can start the lab. Note: Ignore any red text that may appear during this process.
4. The script will run to automatically reset the clock. The window will automatically close and you can proceed
with starting the lab.
Note: If you plan on running the environment for multiple days/sessions, it’s recommended to re-run both
scripts at the start of each new day. Every time the environment shuts down for the day, these scripts will
need to be re-run in order to function correctly.
Labs:
i) Lab 1: Who can access a folder?
ii) Lab 2: Who are the members of a group?
iii) Lab 3: Which folders does a user have permission to access?
iv) Lab 4: Which groups does a user belong to?
v) Lab 5: Which folders does a global group have access to?
Functionality:
• The Work Area displays the Active Directory/NIS/LDAP users and groups, as well as all local accounts, which
may have permission to access unstructured data on monitored file servers, Exchange Servers, SharePoint
Servers, NAS devices, and data on Office 365.
• The Work Area provides a multi-dimensional view and allows the DatAdvantage operator to see the following:
• User permissions – To the folders the user can access
• Group permissions – To the folders the group can access
• Folder permissions – To the users, groups and nested groups that have access to the folder
• This multi-dimensional view makes an entitlement review a simple task
• Assign and manipulate data owners
Context:
For any folder, DatAdvantage makes it easy to view the NTFS and Share permissions that exist for that folder. DA
provides the ability to determine, not only the groups that have access to the folder but the individual users that each
group contains. Existing Microsoft functionality does not provide this capability.
Use Cases:
A business data owner wants to know who can access their data.
Procedure:
1) Open the DatAdvantage GUI from the desktop.
2) Click the ribbon on the left side to expand out “Existing Users and Groups”.
4) In the left pane, “Existing Users and Groups”, you will notice that the information has changed. It now shows
all groups that have access to the “Finance” directory and what level of permissions they have.
Note: DatAdvantage provides an easy way to determine all the individual users that have access to a folder
via the NTFS permissions. Share level permissions are available within the properties tab. The Work area GUI
will display the effective permissions by default. However, Microsoft best practices states to configure the
Share permissions so that they are available to everyone, Full Control.
Context:
DatAdvantage makes it easy to determine all the members of groups and nested groups. Daily, DA will update group
membership information by polling Active Directory (or any other user repository) for user and group information. DA
makes it easy to determine AD group membership with a simple click.
Use Cases:
The Legal department needs to know the members of the legal group.
Procedure:
1) In the left pane, “Existing Users and Groups”, within the “Look For” box, type the name “Legal” and click the
plus sign on the left of Legal (corp.local) to expand out the children of that group. This view will show all users
in the Legal group.
Note: It is very easy to determine all the members of any group with DA.
Context:
DatAdvantage makes it easy to see which folders any individual user has access to. By providing this information DA
will show the operator the potential access each user has.
Use Cases:
Marc Farhat is moving from Legal to Finance and IT Operations needs to audit his permissions
Procedure:
1) In the “Existing Users and Groups” pane, type “Marc Farhat” in the “Look For” field and press enter.
Double click on Marc’s name to see where Marc has permissions on directories.
2) Folders that are now green are folders that Marc can access. Listed next to each parent directory is a list of
permissions that Marc has to that directory and all its sub-directories. If those permissions are inherited, then
the permission line will be blank and you would look at the permissions of the parent folder. Notice that the
folder HR is yellow which means that Marc does NOT have access to that folder. These permissions include the
NTFS permissions, FMRWXL, respectively Full, Modify, Read, Write, eXecute and List. Share permissions are
not included in the GUI by default, but they can be selected under the view menu. In the “Explanations”
column you will see from which groups Marc inherits these permissions. This means that Marc is a member of
the listed groups.
Context:
DatAdvantage makes it easy to see all the individual groups that any users are members of.
Use Cases:
The Information Technology Department needs to identify all the groups Marc Farhat is a member of, as part of a
server consolidation project.
Procedure:
1) At the top of the “Existing Users and Groups” pane, choose “View” and then choose “Children”.
3) As you can see, Marc Farhat is a member of many groups, including the BCP-Mobile_Division group and many
others. DA makes it easy to determine all the groups that a person is a member of, including security groups,
nested groups, and distribution groups.
Context:
One of the primary benefits of DA is that it allows customers to reduce the over-permissive nature of global groups
such as the Everyone group, domain users, users, etc. DatAdvantage makes it easy to determine which folders are
accessible by global groups. With DA, Administrators can begin to clean up these permissions to ensure proper access
to the data is being followed.
Use Cases:
The IT Operations department needs to identify exactly where the “Everyone” group has access to critical folders.
Procedure:
1) Find the “Everyone” group by typing in the first few letters of the group name in the “Look for:” field at the
top of the “Existing Users and Groups” pane, and then press enter.
2) Double click on the “Everyone (Abstract)” group to see where it has access. Note that the “Everyone Group”
has access to any folder that turned green.
Labs:
1) Lab 1: Who has access to a specific mailbox?
2) Lab 2: Which mailboxes can a specific user access?
3) Lab 3: Who has access to a given Public Folder/ Which Public Folders can a user access?
Functionality:
• Complete, bi-directional view into the permissions of Exchange
• Complete Audit Trail
• Recommendations and Modeling
• Data Ownership Identification
• Extensible Framework
Context: The work area within DA for Exchange provides a bidirectional view of permissions on mailboxes within
Exchange, allowing the user to see who has access to a given mailbox as well as seeing which mailboxes a specific
user has access to.
Use Case: The Exchange Admin needs to know who has access to the CEO’s mailbox to ensure that only people who
need access for their job function can do so.
Procedure:
1) Click on the Work Area in DA. Open the Existing Users and Groups pane by clicking on the curtain bar.
Select the “EXCHANGE” server from the resources drop down list. Collapse the CORPFS02 server and
expand the EXCHANGE server and the Mailbox Store. You will see the Mailboxes grouped alphabetically.
Varonis groups the mailboxes this way so the screen doesn't get cluttered with mailboxes in large
environments.
3) DA makes it easy to determine the users that have access to a specific mailbox.
Context: The work area within DA for Exchange provides a bidirectional view of permissions on mailboxes within
Exchange, allowing the user to see who has access to a given mailbox as well as seeing which mailboxes a specific
user has access to.
Use Case: The Exchange Admin wants to make sure that a given user cannot access mailboxes other than their own.
Procedure:
1) Click Reload in the Directories Pane, then type ‘allen’ into the Look For box within the Existing Users and
Groups Pane.
2) Double click on Allen Carey. It can be difficult to view all of the mailboxes a given user or group has
access to when using Alphabetical Grouping for the Mailbox Store. Dynamic Grouping allows a user to
group by Changed, Not Permitted, or Permitted, making it a more user-friendly view. To group
dynamically, go to View in the Directories pane, and choose Exchange Grouping → Dynamic Grouping.
Context: The work area within DA for Exchange provides a bidirectional view of permissions on Public Folders within
Exchange. These folders often become repositories for critical information and managing access on these folders is
integral to maintaining the security of an organization.
Use Case: The Exchange Admin wants to know who has access to a Public Folder that they know contains sensitive
information related to HR (payroll, termination notices, etc)
Procedure:
1) Close the Mailbox Store. Expand the Public Folders to see where Allen Carey has access. As you can see, he
has Author permissions on a few folders, Editor on the Finance folder, etc…
2) You can also get the same bidirectional view we saw with the Mailboxes while looking at Public Folders.
Double-click on the Finance public folder to see which users and groups are able to access it.
New in Version 7.x: We now can provide permissions visibility and event collection into SharePoint Online and
OneDrive. SharePoint Online is represented in our demo as https://varonistest91.sharepoint.com and OneDrive is
https://varonistest91.my.sharepoint.com. These sites can be navigated the same way as SharePoint on-prem.
Labs:
i) Lab 1: Who can access a SharePoint site?
ii) Lab 2: Who are the members of a SharePoint group?
iii) Lab 3: What are the permissions contained within a SharePoint permission level?
iv) Lab 4: What are the effective permissions for a SharePoint group on a SharePoint site?
Functionality:
• Shows SharePoint permissions
• Explains the permissions that exist in each permission level
• Provides the ability to see all files accessed by any user who has access to a SharePoint site
• Enumerates the recommended permissions on SharePoint sites and resources
• Provides the ability to see changes to SharePoint permissions
• Provides the ability to commit permission changes to SharePoint resources
• Provides the ability to see permissions on SharePoint documents
• Provides the ability to model permission changes to SharePoint resources
• Provides an overview of the members of both SharePoint and AD groups that have access to SharePoint
resources
Context: SharePoint is a self-service application which allows any site or resource owner, including non-technical
people, to assign or make permission changes to a SharePoint resource. SharePoint administrators will periodically
need to determine the permissions that a user or group has on a SharePoint resource, including sites and document
libraries. DA for SharePoint provides a clear understanding of the permissions that exist for any SharePoint resource.
Use Case: The audit committee indicates that SharePoint is growing exponentially over time and they need to audit
the permissions for various important SharePoint resources.
Procedure:
1) Collapse the “Linux” server and go through the same process as previously mentioned to add the SharePoint
server to the work area. It’s named http://sharepoint2. Expand the “http://sharepoint2” server and then the
“/”. Double click on the “finance” SharePoint site. To the right you will see a list of the users and groups that
have access to the “finance” SharePoint site.
2) As you can see, DA for SharePoint provides an understanding of each of the SharePoint and Domain (AD)
groups that have access to the Finance site. In addition, DA provides the permission levels that each group
has on this folder. As an example, the “Finance Contributors” have “Contribute” permissions on the “Finance”
site. Located in parenthesis next to the Group name is the domain or user repository that the group belongs
to. Note that both AD and SharePoint Groups have access to the “Finance” site.
Context: SharePoint provides the ability to assign groups and users access to SharePoint resources. Both SharePoint
and Active Directory groups can be assigned to have access to these resources. SharePoint also provides the ability
for a SharePoint group to contain an AD group. This can be confusing, when trying to determine which people have
access to a SharePoint resource.
Use Case: A business owner needs to understand all of the people that can access a SharePoint site. Including the
members of both SharePoint and AD groups. They also need to see those users nested within the SharePoint groups.
Procedure:
1) On the right side expand out the group “Finance Contributors” and then “Group Finance”. This view displays
all users that currently have access via “Group Finance” to the “finance” SharePoint site.
2) As you can see, DatAdvantage makes it easy to see which users, groups and nested groups have access to
SharePoint resources.
Context: SharePoint permissions are complex. When an administrator assigns a permission to a SharePoint resource,
they assign a “Permission Level”. 8 Permission Levels exist by default and custom Permission Levels can be created.
Permission levels contain a set of any possible number of 33 Permissions. DA provides an easy way to understand the
actual permissions granted by a permission level.
Use Case: A data owner wants to review the permissions assigned via a custom permission level to verify that it is
not overly permissive
Procedure:
1) In order to see the permission set of “Finance Contributors” click on the permission level link on the right
called “Contribute”. This link will bring up the permissions which are assigned using this Permission Level.
These are the permissions granted to “Finance Members” on the “finance” SharePoint site.
2) As you can see, DA provides an easy way to determine the permissions that each user and group have on a
SharePoint resource.
3) Close the Effective Permissions Levels window and return to the Work Area.
Context: SharePoint provides the ability to assign multiple Permission Levels to the same SharePoint resource or site.
In the event multiple Permission Levels are assigned, it’s difficult for an administrator to determine the effective
permissions for that SharePoint resource. DA provides an easy way to understand the actual permissions granted for a
SharePoint group regardless of the number of Permission Levels assigned.
Use Case: Site owners may have inadvertently created and assigned multiple permission levels to a resource and the
IT administrator needs to understand the effective permissions for that resource.
Procedure:
1) The permissions for the “finance” SharePoint site are currently being displayed. Notice that the group
“Miscellaneous People” has two Permission Levels next to its name, “Design”, and “Limited Permissions”.
3) DatAdvantage combines the individual permissions from each Permission Level into an “Aggregated” view to
make it easy to determine the effective permissions that a group has on a specified SharePoint resource.
Labs:
i) Lab 1: Determine where POSIX ACLs exist
Functionality:
DatAdvantage provides the following functionality when monitoring Unix and Linux Servers:
Context: Unix file systems do not provide the ability to apply more than one group to a folder. POSIX ACLs expand
this capability to allow more than one group to be assigned to a Unix folder. DatAdvantage provides the ability to see
where this POSIX ACLS exist and determine which groups have access to a Unix folder.
Use Case: A data owner would like to understand the permissions that a user has on their data when POSIX ACLS are
used to grant permission.
Procedure:
1) Open the DatAdvantage GUI from the Desktop
2) Select “Resources” at the top and select “Linux”. Click “OK” when you are warned about adding more than 3
resources to the view.
3) Expand Linux then expand the “share” folder and then double-click on the Legal folder.
5) Right-click on the “legal” folder within the “Linux” server. Select “Edit Permissions”.
As you can see from the above screen, DA provides the ability to edit Unix permissions, using the standard
RWX permissions.
Section Overview:
The new web interface contains multiple new dashboards which show where you're at risk and track your progress as
you lock things down. Quickly pinpoint exposed folders, stale data, or inactive accounts that are still enabled. With
Data Classification Engine, which looks inside files, you'll also see where you have regulated and sensitive data that's
at risk. The alerts dashboard shows an overview of all alerted activity in the environment with the ability to perform
in-depth investigations into any alerted event.
The Analytics window provides a detailed overview of the files created, accessed, modified, moved, deleted and
permissions changes on any Windows, Unix, or Linux fileserver, Exchange, SharePoint server and NAS devices, such
as EMC Celera, NetApp, and Isilon. SharePoint Online, Exchange Online, OneDrive and Box are also supported in the
latest version of DatAdvantage.
Labs:
i) Lab 1: Dashboard Overview
ii) Lab 2: Find the files that a user accessed
iii) Lab 3: Find all the files accessed within a folder, i.e. the finance folder
iv) Lab 4: Find all the Excel spreadsheets accessed on a specific day
v) Lab 5: Determine who deleted a specific file
Functionality:
The new web dashboard provides the following functionality:
• The ability to quickly identify top alerted users, top alerted devices, top alerted assets and top alerted threat
models.
• Assess risk and track progress across all platforms added to DatAdvantage
• The Analytics view displays detailed information for all the events captured by DatAdvantage, including both
file system access events and permissions and/or group membership information.
• Events are displayed for entire resources (one or many), specific directories, and/or users/groups.
Context: An admin can quickly identify top alerted users, top alerted devices, top alerted assets and top alerted
threat models. An admin can investigate these alerts further within the dashboard to get better context around the
alerts that have been triggered. They can also get important key performance indicators for each file server that is
added to DatAdvantage.
Procedure:
1) From the Tools menu, select Varonis Web Interface…
2) Google Chrome will open and you will be presented with the DatAlert Dashboard. On the left-hand side, you
will see the different dashboards that are offered such as Alerts, File Servers, Directory Services, Exchange
SharePoint, Exchange Online, SharePoint Online, OneDrive and GDPR. We will explore all these dashboards
throughout this lab.
4) Top Alerted Assets shows what monitored assets have had the most alerts triggered on them. In our
dashboard, we can see that the asset “corp.local (DirectoryServices)” has had 2 alerts triggered on it. If you
want more context around these alerts, you can click the three dots on the right to view the alerts in more
detail.
5) The next panel you are presented with is Top Alerted Users. This panel will show you the users in your
organization who have triggered the most alerts. In our dashboard, we can see that BackupService has
triggered 5 alerts within the past 7 days. If you want more context around these alerts or the user, you can
click the three dots on the right to view the alerts in more detail or view the user’s context card.
7) Top Alerted Devices will show what devices have triggered the most alerts. The same options to view the
alerts in more context or the device in more context are available here as well.
9) Varonis now also provides a map of alerts with geolocation information to help you easily understand where
new unusual activity is coming from across the world.
10) Click on “File Servers” on the left-hand side. You will see the Key Performance Indicator (KPI) dashboard
populate for all file servers being monitored. The KPI dashboard shows a number of different widgets that give
an organization a better picture of what their current risk profile looks like. For example, we can see that
there are 25% of all folders with sensitive data are openly accessible to anybody in the organization.
12) Click on “Exchange” on the left-hand side. You will see the KPI dashboard for Exchange.
13) Click on “SharePoint” on the left-hand side. You will see the KPI dashboard for SharePoint.
15) Click on “SharePoint Online”. You’ll see widgets specifically related to key visibility problems organizations
have into SharePoint Online such as publicly shared information. Varonis also correlates shared information
with classification information to let organizations know if any of their sensitive information being stored in
SharePoint Online is being shared.
16) Click on “OneDrive”. The same widgets are available for content stored in OneDrive to give organizations a
complete picture of their risk profile when it comes to Office 365.
18) Return to the File Servers dashboard. There are additional options for each widget that can give you greater
insight into the statistics that are being reported. Click on the ellipse’s next to “Folders with Open Access”.
Click the middle button that looks like a graph.
19) A timeline will appear which can be useful for organizations to see how the number of folders with open access
is either increasing or decreasing over a period of time. This can be helpful during remediation projects. Click
the “X’ at the top.
21) The list of folders that have open access will appear. This may take a few minutes to load. In production, the
search shouldn’t take as long to load the list. Varonis makes it easy to not only get high level statistics about
the risk profile of the environment, but to also get the actual list of data that makes up the statistic.
Context:
Determining which files have been accessed by a user has never been easy. All Operating Systems including Unix,
Linux, Windows, etc. provide limited capabilities to allow administrators to see which files have been accessed,
moved, modified or deleted. DatAdvantage makes it very easy to determine which files have been accessed by any
user or group.
Use Cases:
The finance director wants to know which files were accessed by “Allen Carey”.
Procedure:
1) Open Chrome from the taskbar.
2) Click “Analytics”.
3) Click in the search box and go to “Event by user”. Type “Allen” and select “Allen Carey (corp.local)”. Change
the date filter to “Last 7 Days”.
5) As you can see, DA provides a quick and easy way to see the actions performed on any file regardless of what
platform the activity occurred on. In the below example, we can see that Allen Carey deleted the “Extra”
folder on 8/11/2019 at 1:36PM.
Context:
DatAdvantage makes it easy to determine which files were accessed within any monitored resource. In many cases,
files get deleted or modified and data owners need to know what happened to the data within their folder.
Use Cases:
The finance director wants to know which files were accessed on the “finance” folder within a specified date range.
Procedure:
1) Click on the “x” button next to “Allen Carey” to remove him from the search.
2) Click in the search box and select “Event on resource”. Click the “+” button next to “Select Folders”.
3) Type “Finance” and hit enter. Select the “finance” folder and click “Apply”.
5) To determine each user that has accessed the finance folder, drag the “User Name (Event By)” column header
to the area indicated by the phrase “Drag columns to group”.
6) As you can see, multiple users have accessed the Finance folder.
Context:
Inherent to DatAdvantage is a database which captures and stores all access activity. This functionality provides the
ability for operators of DA to perform complex queries, without the need to understand SQL or SOLR. DatAdvantage
makes it easy to determine all types of access activity and to drill down, making it easy to find files or file types that
were accessed, modified or deleted on a specific day or week.
Use Cases:
A company must display all log events for text files (.txt) from the “finance” folder in a specified date range to comply
with a regulation like SOX.
Procedure:
1) Click in the search box to add another filter. Select “Event on resource” and scroll down until you see “File
Type”. Enter “txt” into the search box and click “Search”.
2) Remove the grouping for “User Name (Event By)” by hovering over the text and click “x”.
Context:
Many different types of complex queries can be used to determine what happened to a file. DatAdvantage make it
possible for a user to find out what happened to his data and specifically a file that was deleted.
Use Case:
The Help Desk received a call from a user who indicated that their data has “disappeared”
Procedure:
1) Clear the search by clicking both “x” buttons next to the current search.
2) Click in the search box and go to “Event details”. Type “File Deleted” and then select “File deleted”.
4) The data shown will display any file delete operation that occurred on the specific file name that was searched.
As you can see, Alicia Rodriguez deleted the “Welcome to Box.pdf” file from her Archive folder on Box.
Section Overview:
The Statistics Section provides a high-level view of audit data for use by data owners, data users, and forensics. The
statistics section can be used to determine which data is inactive, which users are inactive, to identify data owners,
and to identify the largest users of data for a given server or NAS.
Labs:
i) Lab 1: Find the most active user.
ii) Lab 2: Determine and assign a data owner
iii) Lab 3: Determine the directories that a user accessed
Functionality:
The Statistics view allows you to review the cumulative data collected by the DatAdvantage probe.
At the end of each day, DatAdvantage generates the information required to view statistics. The data is available for
viewing the day after the events were recorded and collected. Data is available for direct access until it is archived.
Context:
For any server, DatAdvantage makes it easy to view the most active user. This is useful in isolating anomalous
behavior. Typically, the largest user of data is not doing something that is appropriate for their job function.
Use Case:
The Help Desk wants to know which user has the most activity on a specific server.
Procedure:
1) Click on the “Statistics” button at the top of the GUI. Change the date range to 8/7/2019 and 8/13/2019 and
then double click on the CORPFS02 server in the Directories pane.
Context:
DatAdvantage makes it easy to find out who owns data in a certain directory. This is useful in many projects, such as
data archival, data retention, date consolidation, etc.
Use Case:
The Help Desk wants to assign an owner to the HR folder by viewing the user activity on that folder.
Procedure:
1) Double click on the “HR” directory in the Directories pane.
2) Click on the “User Access” link at the top of the “Statistics” pane.
4) This operation has just set “Don Penisson” as the owner of the “HR” directory. You can now see that
ownership has been set by looking at the HR directory. Now, displayed next to the HR directory icon, is the
ownership icon stating that an owner has been set for this directory.
Context:
DatAdvantage makes it easy to determine the folders a user has accessed before checking in the log area. This
information can be used for several reasons, including determining the data that a person accessed before they
resigned, determine the folders that a person uses to perform their job, etc.
Use Case:
The Help desk wants to know which directories were accessed by “Allen Carey.”
Procedure:
1) Within the Statistics Window, in the left pane choose “Users and Groups” at the bottom and then in the “Look
for” area type “Allen Carey” and double click on his name. Click on “Directory Utilization.”
3) Click on the blue/purple bar again to drill down into the C:\ drive
4) Click on the blue/purple bar again to drill down into the Share.
5) In this next screen you will see all the directories accessed by “Allen Carey” during the specified dates, as well
as how many events were created in each directory. On any of these directories you can click on the
blue/purple bars to drill in deeper into the subdirectories of those folders.
6) From this screen, you can see that Allen did not have any events in the “groups” directory, but he did create 6
events in the sub-directories of the “groups” folder. He also created many events in the “finance” folder and
many more events in the sub-directories of the “finance” folder.
Labs:
i) Lab 1: What are the DatAdvantage recommendations for a specific group?
ii) Lab 2: What would be the impact of removing a person from a group based on a DA recommendation?
iii) Lab 3: How do we “model” a permission change using DatAdvantage?
Functionality:
In most organizations, people’s roles change on a regular basis. A person may work in the legal Department for a few
years and then move to the Finance department. In most cases, the IT department does not remove the permissions
from this person for accessing the Legal Department. DA provides the ability for administrators to easily determine
whether permissions are appropriate for any given individual or group, and identify which permissions should be
revoked, all based on product analytics.
Context:
DA makes recommendations to remove people from groups based on user access activity as compared to other
members within the same group. For any folder or group, DatAdvantage makes it easy to view and remediate
excessive permissions.
Use Cases:
Certain members of the Finance group are no longer in the Finance Department and should no longer have access to
the Finance data.
Procedure:
1) Click on the “Work Area” button up top of the GUI and double click on the “finance” folder.
3) The users with a red “X” by their names are recommended to be removed from “Group_Finance” because they
are not using their permissions like other members of the group over the last 120 days of monitoring. This
timeframe (120 days) is configurable within the configuration options of the product.
4) Notice the user “Jennifer Harrison”. The icon that looks like a pause button states that we have not seen any
activity from this user for the length of the time we have been monitoring the servers. This is due to the user
being disabled, hence the grayed out “user” icon next to her name. DA provides an easy way to determine
and provide insight into whether a person should continue to have permissions to access a specific folder or
data set.
Context:
Many administrators want to know the impact of removing permissions from a specific user, prior to doing so in a live
environment. DatAdvantage makes it easy to determine the resources a user will lose access to, if the user is
removed from a specified group.
Use Cases:
IT Operations would like to know the impact of the change they are about to make, before they make it.
Procedure:
1) With “Group_Finance” expanded under “Recommended Users and Groups” double click on “Andrew Weirich”.
Note that certain directories in the “Work Area” turn orange with a red “X” next to the folder. These are the
directories that Andrew will lose access to if he is removed from “Group_Finance” as recommended by
DatAdvantage.
2) This is not the only folder affected for Andrew Weirich - he will also lose access to the Sales-NY folder. DA will
display all folders that a user will be removed from and displays it accordingly.
Context:
Server administrators are usually hesitant to remove permissions from a group because they don’t know what the
impact of removing those permissions will be. DatAdvantage makes it easy to remediate excessive permissions
granted by global groups through the use of modeling permission changes to determine the impact. This allows
administrators to “test” permission changes prior to committing them in the live environment.
Use Case:
IT Operations needs to remove the “Everyone” Group from having access to the Legal folder.
Procedure:
1) Double-click on the Legal folder and notice in the right pane that Everyone has access to it.
4) Click “Calculate”. Once Synchronization completes, open the left window by clicking on the curtain bar.
6) As you can see, if the “Everyone” group is removed from the Legal folder, a total of 6 people will be impacted.
These six people include Alice Tanner and others. DA makes it easy to identify the users that will be impacted
when removing global groups.
8) Type “Legal” into the Search bar and click “Search.” Select legal from the top list and click “Add” Legal will
now appear in the bottom list. Press OK to continue.
10) Click “Reload” on the errors pane on the left and you will now see that only two users will be affected by this
change. These users may need to be added to the legal group because they moved departments and were
never added, or they could have been accessed materials in the legal group unchecked because of the global
access. Further investigation may be necessary.
12) This will open the Commit Console where you can view the changes that have been modeled so far. Here
administrators can select the changes they would like to commit to production. There is an option to commit
these immediately or on a schedule. The password of an account that has the permissions to make changes to
the file system will be required in order to commit the changes. After reviewing these options close the
Change Management Console.
Note: In the lab, this screen might not show up. Please refer the picture below for what it would
look like.
Labs:
Lab 1: How can I create a DTE rule in order to migrate data?
Lab 2: How can I tell what data has been moved by DTE recently?
Functionality:
DatAdvantage provides the following functionality when configuring DTE:
• Create various rules to move data based on any number of specific scenarios
• Schedule the data migration for a later date and time
Context: An admin can configure DA so that data is automatically moved from one file server to another while
maintaining the current permissions.
Use Case: A system admin is interested in migrating data from one file server to another.
Procedure:
1) Click on Tools → Data Transport Engine…
NOTE: If prompted with a warning about the amount of data that has been moved, click OK.
2) You will see that there are already some rules that have been created in this lab. Select the Department
Archival rule from the list of existing rules and click on the “Edit Rule” button
4) As you can see, the rule is configured to move data from the Legal, Finance and HR directories. Click on the
“Source File Scope” button on the left side of the window
6) This rule is configured to delete all the content once it’s copied to the destination, however a stub file will be
created for each deleted file on the source. Click “Folder Structure” on the left-hand side.
*Note: Before moving onto the next section, change the password to “password2”.
8) As you can see, this DTE rule is configured to move all of the selected data to the C:\Share\HRArchive-DTE
folder on corpfs02. Please also review the other available options in this window. Click on “Collision Behavior”
on the left side of the window.
10) It is possible to sandbox a data migration in DatAdvantage before actually performing the migration. In this
section you can chose to copy IDU analytics from the source, as well as the ability to commit these IDU
Analytics to the destination. Click on “Scheduling” on the left side of the window.
13) Click on the Close button to return to the DTE Configuration Window and then click on the OK button.
Context: An admin can run a report in order to find all the data that has been modified by the Data Transport Engine.
Use Case: A system admin needs to know what data has been touched by the Data Transport Engine.
Procedure:
1) Click on the Reports button
2) Expand Category name: 13. Data Transport Engine Reports and then expand Report Name: c. and click on
“01. Folders Transferred by Rule.” As you can see, this report will list all of the files and/or folders that have
been moved by the specified DTE rules during the specified date range.
Functionality:
The Varonis DatAdvantage Data Classification Engine is configured using the following process.
1. Data can be classified based on three types of conditions, Strings, Regular Expressions, and Pre-Defined
patterns. Examples of a Pre-Defined pattern would be a Credit Card Number.
2. The scope of each classification rule can be defined based on the following. This means that the
classification process does not have to be applied universally to all servers, etc.:
• Access statistics
• Permissions
• File system metadata properties
• Any other relevant criterion
• Any combination of the above
3. Schedules are then configured so that the Classification process is performed at a designated time and run
on the file servers defined for them.
4. DatAdvantage enables you to prioritize the issues that are most important to you in classifying unstructured
data based on:
• Modification time – Represents the time passed since a folder was last modified
• Access time – Represents the time passed since a folder was last accessed
• Utilization – The amount of activity on a folder
• Recommendations – Represents the number of recommendations made by the IDU
• Density – The number of files contained in a folder
• Size – Represents folder size, compared to the total size of the file server
• Risk factor – Indicates whether a folder has permissions for global access groups
5. After configuring the DCE Rules, Schedule and Priority, run the Data Classification Engine to execute the
rules on the relevant file servers.
6. Use any of DatAdvantage’s interactive views to investigate problems identified by the results of the
classification.
Context: DatAdvantage provides the ability to classify data as sensitive. Customers require the ability to understand
who has access to this sensitive data to understand the risk that it will be available to the wrong people.
Use Case: A business owner needs to understand what type of sensitive data exists within his folder, and who has
access to it.
Procedure:
1) Select the “CORPFS02” server from the resources dropdown. Collapse the “http://sharepoint” server and
expand the “Share” folder in the “CORPFS02” server.
3) Double-click on the Legal Folder. The “Classification Rules” column for the legal folder indicates that the legal
Folder contains 14,549 instances of sensitive data and the sensitive data includes CCPA, GDPR and PCI
information.
5) DatAdvantage makes it extremely easy to determine which folders have sensitive information within them and
who has access to this sensitive information.
Context: After classifying data as sensitive or important, customers can understand who has been accessing this
sensitive information. This feature gives customers the ability to identify the source of possible leaks or loss of
sensitive data.
Use Case: A Compliance Officer needs to identify all of the users who have accessed files which contains Visa credit
card numbers, in order to pass a PCI compliance audit.
Procedure:
1) Open Chrome from the taskbar.
2) Click “Analytics”.
3) In the search box, select “Event on Resource” and type “Visa” into “Classification Rules” and select
“Classification rules = Visa”.
5) DA makes it easy to determine the users that have accessed any type of sensitive data. This means that data
owners can now understand exactly which users have accessed files that contain sensitive information, as
defined by those data owners.
Context: The Data Classification Engine can be used to scan for any text string, regular expression, or predefined
pattern. It is important for the DatAdvantage Operator to understand how to configure DCE to meet the requirements
of their business.
Use Case: The General Counsel within a company is required to do eDiscovery and needs to find all files within a
folder that contain the word “Confidential.”
Procedure:
1) Within the Tools Menu, select DCE and DW→Configuration
Note: This may take a minute to appear
2) Within the Classification window, click on the plus button to create a new rule.
4) Click the save icon to save the new rule. DCE is now configured to scan for the word “Confidential” as well as
the previously configured rules. The results will show up in the GUI once the next DCE scan completes.
Labs:
Lab 1: What are the different objects in AD?
Lab 2: How can I see changes made within Directory Services?
Functionality:
DatAdvantage provides the following functionality when monitoring Directory Services:
• View domains and domain objects in the DatAdvantage GUI
• Audit Active Directory activity, including changes to users, groups, OU's and group policy
• Simulate changes/perform what-if modeling to AD groups and users
Context: The main benefit of the Work Area for the Directory Services module is the ability to see the entire
hierarchy within one view.
Use Case: A system admin is interested in seeing all of AD in one unified view.
Procedure:
1) Open the Work Area in DA. Open the Existing Users and Groups pane by clicking on the curtain button. Within
the Directories pane, select DirectoryServices from the resources drop down and expand the DirectoryServices
server and expand the corp.local domain. You will see the Active Directory objects appear below.
3) Expand Computers to see a list of all computers and NAS devices that belong to the domain.
Context: This is the main benefit of the DA for DS module- knowing who has made permission changes or other
changes within Active Directory can be invaluable in maintaining the security of an organization.
Use Case: A system admin is interested in seeing who has changed permissions in the past week.
Procedure:
1) Return to the Web UI and click “All Servers” in the Analytics section. Deselect all servers except
“DirectoryServices” and then click “Apply”.
Labs:
Lab 1: How can I enable pre-built threat model to send real time alerts to the event log?
Lab 2: Investigating an alert within the dashboard
Functionality:
DatAdvantage provides the following functionality when configuring Real Time Alerts:
• The use of prebuilt threat models to alert admins to behavior indicative of various steps in the Kill Chain or
sequence of events that occur during a breach or a virus.
• Utilizes UBA to learn user behavior and alert when something out of the ordinary occurs.
• Create various rules to alert on any number of specific scenarios
• Uses the same filters that are available in the Data Transport Engine.
• Alerts can be configured to be sent through an SMTP server or written directly to the Event Log.
• Syslog messages, SNMP Traps, and command-line scripts can also be used.
Context: Sending alerts to the event log or other SIEM solutions can help admins bring Varonis alerts into their
existing solutions.
Use Case: A system admin wants to enable an alert to write to the event log.
Procedure:
1) From the Tools menu, select DatAlert.
2) As you can see, a number of Threat Models are present in the menu. Scroll down and click on the “Encryption
of multiple files” rule and then click on Edit Rule.
4) In the Who (Acting Object) tab, you can specify what users or groups the rule should alert you about. Click on
the Where (Affected Object) button on the left side of the window.
7) In the When (Event Time) tab, you can specify what days of the week as well as what times of the day the
alert should be enabled. In this case, there are no filters as the rule should always be enabled.
Context: An admin can quickly investigate alerts within the dashboard without having to open DatAdvantage.
Use Case: An admin receives an alert email from DatAlert that identifies a user has triggered a threat model and the
admin wants to investigate the alert further.
1) Click on “Alerts” on the left-hand side to return to the alerts dashboard. We’re going to investigate the alerts
that Andrew Carlisle has generated over the past 7 days. Click on the three dots next to his name and click
“Open user context card.”
2) This page shows you a general profile of the user with the addition of being able to add them to a watch list.
Click on the “Alert Search Info” tab.
4) You are brought to the analytics section of the dashboard that will allow you to investigate the alerts further.
You will see a general overview of all the alerts such as the severity, the threat model name, username that
triggered the alert, number of alert events, device name and asset. Click on “Alert Details” next to the first
threat model that was triggered.
6) Scroll down and review the different insights into this specific alert on this page.
8) This page will show you a detailed list of what events triggered the alert. Here you can see the login event on
Exchange Online that came from Germany that triggered the alert.
Labs:
i) Lab 1: Schedule a user access log report
ii) Lab 2: Create a group membership report
iii) Lab 3: Determine the permissions for a user or group by running the effective permissions report
Functionality:
There are a number of features in the reporting section. Reporting provides the ability to schedule reports of various
types to be sent to various audiences using a number of different report formats. Each report can be scheduled for
regular delivery to meet business requirements.
Context:
User access log reports are useful to a variety of different people including data owners, data custodians, and
administrators. In order to provide easy access to the reports, DA provides report subscriptions, which allow any
individual to receive a report on a scheduled basis.
Use Case:
A group of data owners require the ability to see who is accessing their data on a regular basis.
Procedure:
1) Click on the “Reports” button at the top of the GUI and click on the “My Subscriptions” tab at the bottom left.
5) Press “OK” to create the subscription. (By default, the report will be scheduled for the same day 2 hours from
the current time). As you can see, it is extremely easy to schedule reports to be sent to any audience via
email.
Note: You may get an error upon creating the subscription. This is an issue with the VM. You can ignore this
message and hit “cancel” instead to proceed.
Context: In order to properly govern access to their data, data owners need to understand the members of their
groups. Report 3a can be created for just such a purpose
Use Case:
Report 3a is especially helpful when conducting entitlement reviews. Data owners can receive a list of groups that
they are responsible for, including the members of the groups that have access to their data.
Procedure:
1) Click on “Reports List” at the bottom left of the GUI and then expand and click on Report 3A.
3) Press the “Run” button to view the results. As you can see this report will show the domain that each person is
a part of, the users name, the Logon Name, membership inheritance path, member type and the
recommendations made by DA about whether the person should remain part of the group or should be
removed, which are all based on DA’s IDU analytics engine.
Context: In many cases, IT administrators need to understand the permissions that a user has, whether for forensics
reasons or for determining the role a person should have when configuring an Identity and Access Management
product. Report 4A provides them with this capability.
Use case:
This report can be used to determine the permissions for a user or group during an entitlement review.
Procedure:
1) Choose report 4A01 from the left-hand pane.
3) Press the ellipsis button to the right of the “User/Group” field, search for “Allen Carey” and add him as a
“Selected User or Group” and then press “OK”.
Labs:
i) Lab 1: Determine how to add authorized administrators to DA
ii) Lab 2: Determine how to configure the ADWalk, Filewalk and Pullwalk job schedules
iii) Lab 3: Adding a user to the filtered user list
iv) Lab 4: Adding a global group to the Global Group list
Functionality:
A number of configuration options are available for DatAdvantage. You can configure:
• General settings
• Commit process
• IDU Analytics
• Email settings
• Alerts
• Security
• Domains
• Extended properties
• Filtered users and groups
• Jobs
• File server settings
• Archive policies
• Special files to be managed in DatAdvantage
• Global access groups
• User interface
• DFS shares and namespaces
• Unmonitored folders
• Unmonitored users
Context:
The DA Security tab of the Configuration window enables you to add Active Directory users to DatAdvantage roles so
that they can perform functions within the DA GUI. There are currently 4 roles, Enterprise Manager, Power User,
System Admin or User within DA. Each role has different capabilities with the Enterprise Manager having full access to
the application including the configuration options.
Use Case:
Additional people need use the DA GUI. If a user is not in listed on the Security tab, they cannot access DatAdvantage
even if they have the desktop client installed on their computer.
Procedure:
1) Open the Varonis Management Console on the desktop.
2) Click on the Configuration button in the bottom left hand corner of the window and then click on
DatAdvantage Security on the left pane.
3) In order to give a user permission to use the DA GUI, you would choose the “Add” button from the top of the
DatAdvantage Security window, and then search for that user’s name in AD. This process will then add the
user’s AD account to the configuration screen. As you can see from this window, there are already a few
accounts configured with various roles.
Context:
In some cases, DA SQL jobs will need to be run manually when troubleshooting or when immediate access to
gathered permission information is required. In this case, the DA configuration allows administrators to run these jobs
manually. Although these jobs can be run from the SQL Enterprise Manager, using the DA configuration is much
easier.
Use Case:
A new file server was just installed and the administrator would like to see the new server, its folders and the
permissions immediately in the DA GUI.
Procedure:
1) Click on the Management button in the bottom left hand corner of the Management Console window and then
click on “Root” in the left pane. You will then see all of the various SQL jobs listed in the right-hand pane of
the console.
3) DatAdvantage relies on SQL jobs to perform data collection from file servers and directories such as Active
Directory. Administrators may periodically need to run these jobs manually in order to immediately force data
collection from monitored devices. In order to see data from a newly added server, the ADWalk, and Filewalk
jobs must be run in order to collect the data from the server. Once these jobs complete, the Pull Walks ::
Processing job needs to be started, which will in turn also run the Pull Walks :: Publishing job. Once both jobs
complete, the data will be pulled out of the SQL database and put into the GUI.
Context:
The filtered user list provides the ability to filter out specific users where collecting data about these users may not
provide any value. These users are typically service accounts or other accounts where an audit trail is not necessary.
Use Case:
This function is typically used to filter out service accounts that generate a lot of event data and have no real
actionable meaning
Procedure:
1) Click on the Configuration button in the bottom left corner of the management console and then click on
Filtered Users/Groups in the left-hand pane.
2) As you can see from this screen we are currently filtering the user “corp.local\Administrator”. This means that
we will not collect any events created by this user. If the check box in “Allow Event Collection” was checked
for this user, we would collect events for the user but we would not report any of these events in the
“Reports” section of the GUI. You can also add in new users to the list using one of the “Add” buttons at the
top.
You can also purge events already created by a user by selecting that user, and then clicking on the Purge
Existing Data button at the top right of the screen, if the requirement exists to delete the events associated
with this user.
Context:
Global access groups are security groups which impact most of the users in the organization.
Such groups include “everyone”, “users”, “domain users”, etc. By adding additional groups to the Global Groups list,
reports which provide the ability to model changes to these groups is provided. This allows administrators to
determine who needs access, when a person has access via a global group.
Use Case:
Define groups that contain a significant number of users in the organization for use in determining actual permission
requirements.
Procedure:
1) Click on “Global Access Groups” in the left pane of the management console.
2) By pressing the “Add” button, , you have the ability to add groups which contain a large
majority of users that access data. In this screen you can see that the “Everyone”, “Users”, and “Domain
Users” are just some of the groups that are included. These are all groups/abstracts in which the majority of
AD users reside. Report 4C, the Global Group Analysis report, refers to these groups when creating the report.
Labs:
i) Lab 1: Review the event viewer to determine if any issues exist with DA
ii) Lab 2: Check the status of the SQL and Varonis services to ensure they are operating properly
Functionality:
DatAdvantage creates a Varonis event log container on each of the monitored file servers, on every Probe, and on the
IDU. This event log container will collect all of the events associated with the application.
In addition, the SQL Management application contains a history of the status of each SQL job that runs. This status
can be used to troubleshoot issues that arise with jobs failing, data not being collected properly, etc.. These labs will
not review this functionality, but it is quite helpful when troubleshooting issues with SQL jobs.
Context: DatAdvantage normally operates properly and is very resilient to problems that occur. However, in some
cases, problems will occur and the administrator must understand how to troubleshoot the issues. The Event Viewer
contains categories of entries (Warning, Informational, etc.) similar to normal Event Viewer messages. These
categories can be used to quickly troubleshoot any issues that develop.
Use Case: An administrator needs to troubleshoot DA and must first look through the event log for any obvious
problems.
Procedure:
1) Right click on the Windows logo and select “Event Viewer” from the menu that pops up.
2) The “Event Viewer” pane will open. Click on the plus sign next to “Applications and Services Logs” and select
the “Varonis” container. This will display all log messages from the Varonis system. From this window you will
be able to view any errors and check the status of the Varonis services.
Note: Because this is a lab environment that has been disconnected from the resources it is monitoring there are
significantly more errors in the event viewer than you would see in a functioning production environment.
Context: The proper operation and state of Varonis and SQL services is critical to the operation of DatAdvantage.
Troubleshooting checklists should ensure that these services are checked first. The administrator should ensure they
are operating properly before proceeding with any other troubleshooting steps.
Use Case: DA does not appear to be operating properly and the administrator needs to determine the state of the
application.
Procedure:
1) Right click on the Windows logo and select “Run”. In the “Run” dialogue type in “services.msc” and press
“OK”.
2) In basic troubleshooting you can use the “Services” screen to check to see if the SQL and Varonis services are
running. In normal situations, the SQL services should all be running, except those that are disabled. The
Varonis services should also be running except for the file walk and file walk monitor services, as these only
run during the FileWalk job.