Enterprise Vault Whitepaper Netbox Blue Integration with Enterprise

Transcription

Enterprise Vault Whitepaper Netbox Blue Integration with Enterprise
Enterprise Vault Whitepaper
Netbox Blue Integration with
Enterprise Vault
This document describes how Netbox Blue’s Social Risk Management products can capture unified
communications, instant messages, collaboration, and social media traffic and archive the contents into
Enterprise Vault with rich metadata and indexing for enhanced search value from the data.
This document applies to the following version(s) of Enterprise Vault: 10 and 11 (including 11.0.1)
If you have any feedback or questions about this document please email them to iig-tfe@symantec.com
stating the document title.
Copyright © 2015 Symantec Corporation. All rights reserved. Veritas and the Veritas Logo are trademarks or
registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating
to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law.
The information in this document is subject to change without notice.
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Document Control
Contributors
Who
Contribution
Daniel Strydom
Author
Andy Joyce
Reviewer
David Scott
Contributor/Reviewer
John Fison (Netbox Blue)
Contributor/Reviewer
Trent Davis (Netbox Blue)
Contributor/Reviewer
Revision History
Version
Date
Changes
1.0
April 2015
Initial release
Related Documents
Document Title
Version / Date
Upgrade to Enterprise Vault 11.0.1
http://www.symantec.com/page.jsp?id=upgrade-ev
Netbox Blue’s Social Risk Management Capabilities and EV integration
demonstration https://youtu.be/GCnckLMWC54
Page i
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Table of Contents
Terminology .................................................................................................................................................. 1
Introduction.................................................................................................................................................... 1
Netbox Blue’s Social Risk Management (SRM) Platform ............................................................................. 2
Capture ...................................................................................................................................................... 2
Secure ....................................................................................................................................................... 2
Control ....................................................................................................................................................... 3
Supervise ................................................................................................................................................... 3
Archive ....................................................................................................................................................... 3
Architectural Overview of Netbox Blue’s SRM platform ................................................................................ 4
Deployment options for the Netbox Blue SRM Platform ............................................................................... 5
Microsoft Lync ........................................................................................................................................... 5
ICAP .......................................................................................................................................................... 6
Direct Proxy ............................................................................................................................................... 7
Secure Web Gateway................................................................................................................................ 8
Netbox Blue Integration with Enterprise Vault ............................................................................................ 10
Rich Metadata and Intelligent Indexing ................................................................................................... 10
Capturing Content and Enterprise Vault Ingestion .................................................................................. 11
Enterprise Vault Search ....................................................................................................................... 15
Compliance Accelerator ....................................................................................................................... 15
Discovery Accelerator .......................................................................................................................... 16
Licensing ..................................................................................................................................................... 17
Conclusion................................................................................................................................................... 17
Appendices
Appendix A – Deploying the Netbox Blue SRM software
Appendix B - Extensive Metadata Capture
Page ii
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Terminology
The following terms and abbreviations are referred to throughout this document:
Term
Description
AD
Active Directory
AV
Anti-virus
EV
Enterprise Vault
ICAP
Internet Content Adaptation Protocol
LSI
Local Software Instance – the VM itself that does the capture
SRM
Social Risk Management
SWG
Secure Web Gateway
Introduction
Netbox Blue is a Symantec Technology Enabled Partner and the Social Risk Management platform is
certified for use with Symantec Enterprise Vault.
Netbox Blue’s unique platform offers:

Reliable capture of Social Media, IM, Collaboration communications and even web search
requests.

Active compliance to allow organizations to implement a range of innovative pre-posting security
and compliance policies to ensure regulatory, workplace and cultural compliance.

Archive ingestion to Symantec’s Enterprise Vault platform with full metadata and intelligent indexing
to provide ease of search and discovery, as well as digital sustainability.
This integration ensures that the associated Symantec tools – Discovery Accelerator, Compliance
Accelerator and eDiscovery Platform (powered by Clearwell) can easily perform unified search and
discovery across all content stored in the Symantec Enterprise Vault.
This document describes the methods available to capture social content, the active security and
compliance services offered by Netbox Blue and the ingestion of the social content to Enterprise Vault.
Examples of the search and discovery and summary details on how the platforms are integrated is also
included in this document.
The document also describes the rich metadata and intelligent indexing that is created by the integration of
Netbox Blue’s platform with Symantec Enterprise Vault.
Page 1
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Netbox Blue’s Social Risk Management (SRM) Platform
Netbox Blue’s SRM Platform has the ability to capture and control instant messages from public IM
networks, enterprise IM networks (such as Microsoft Lync), community networks (such as Google
Hangouts), as well as web and messaging networks. In addition the platform offers the ability to capture
web search requests. The value in doing this is to add context to an audit or compliance review case. All of
the captured content can be archived and intelligently indexed by Enterprise Vault.
Messaging Category
Public IM Networks
Enterprise Unified
Communication and
Collaboration
Public Social Media
Google
Web search
Supported Platforms
•
AOL Instant Messenger
•
Google Talk and Google Hangouts
•
Yahoo Messenger
•
Microsoft Lync
•
Microsoft Yammer
•
Cisco Unified Presence (Jabber)
•
Facebook
•
Twitter
•
LinkedIn
•
Google Apps for Work (Gmail, Hangouts and Chat)
•
GMail
•
Google
•
Yahoo
•
Bing
•
YouTube
•
Wikipedia
Table 1 – Platforms Supported by Netbox Blue’s Social Risk Management Platform
Netbox Blue’s Social Risk Management (SRM) platform offers a wide range of features for managing and
capturing messaging. These features include flexible capture methods, security, management and control
as well as compliance.
Even content such as saving drafts can be captured, preventing potential data leaks or unapproved content
leaving the organization. The “save drafts” feature of Gmail has been used by malware as a place to interact
with the command and control servers as it is normally just the completed emails that are ever captured (if
at all), rather than the saved drafts.
An overview of these SRM features is provided in the next section.
Capture
Customers can choose how to capture communications – from a proxy-based capture solution, including
integrating with an existing proxy solution, endpoint capture technologies or other methods. All of these
methods provide comprehensive security and risk management solutions.
Secure
As the use of Social Media, IM and collaboration tools increases, so do the security risks. Netbox Blue
offers a broad range of security features, including:

Malware scanning – detection and blocking of web borne malware

Secure Access Controls for corporate social media accounts
Page 2
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration

Identity Management – linking each communication to each staff member

Prevention of vicarious liability through the addition of disclaimers

Identifying rogue accounts in use within an organization that could otherwise have a far-reaching
reputational impact.
Control
Risk-averse organizations have been managing their internet-based communication channels for email and
in some cases voice and other file sharing applications for many years. As Social Media, IM and
collaboration tools pervade office environments, so the controls must adapt to these otherwise uncontrolled
communication channels.
Netbox Blue’s platform provides a unique ability to apply pre-defined pattern matching technology on
communications before they are transmitted or posted. This unique ability to apply active compliance “instream” gives organizations the ability to prevent issues occurring.
In-built patterns are available, while custom policies can easily be set up.
A full reporting and alerting system is included with the Social Risk Management platform to ensure
breaches are recorded and supervisors notified as required.
Supervise
Many organizations are now looking to enable digital transformation by engaging their staff on social
channels. This can improve customer service or add many new brand advocates to help promote new
products or services.
Netbox Blue’s platform offers the ability to hold messages that meet predefined criteria for review. This can
be used to review any potentially sensitive messages that may include an executive’s name, a released
product name or financially or market sensitive data such as an acquisition target. The feature offers
automated workflow and logging for training purposes and all data can also be passed into the
organization’s archive platform.
Further supervisory capabilities are available including ethical wall establishment.
Archive
Netbox Blue’s platform is able to present social communications into the organization’s Enterprise Vault
archive platform. Using the COM API for EV 10, and as of EV 11.0.1, through the direct SMTP ingestion
method.
These communications are presented in an evidentiary quality format that is digitally sustainable.
Netbox Blue adds value to the data by:

Passing it to the Enterprise Vault archive platform in a standard format, enabling ease of search
and discovery

Adding all associated metadata

Time stamping each message
Page 3
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration

Adding the unique user identity (i.e.: the AD user name, not just the user name on the social
platform)

De-duplicating the messages to ensure the data store remains manageable and
threading communications for contextual value.
Netbox Blue identifies each unique user by integrating with the organization’s Directory Services.
Capitalizing on existing Secure Web Gateway authentication services, user identity is preserved through
on each message, both inbound and outbound.
Architectural Overview of Netbox Blue’s SRM platform
The platform is deployed as a Local Software Instance (LSI) running in a virtualized (VMware) environment.
This enables ease of deployment as well the ability to build on the High Availability options provided by
VMware.
The next section outlines the various ways the LSI can be deployed to capture the traffic. Once the traffic
has been captured, it can be ingested into to EV using ether the legacy API method, or the SMTP direct
ingestion method available as part of EV 11.0.1.
An extension is then installed into the EV server to facilitate direct ingestion of SMTP data. When the LSI
prepares the captured data for archiving, the metadata is also set using MIME headers. With the assistance
of the extension, the data is correctly then indexed by EV. This means that searches can look for specific
values in specific fields – providing a much richer search experience, and accelerating the time it takes to
get the results that are needed. See the section “Rich Metadata and Intelligent Indexing” for more
information on the values captured, and the attribute names in EV.
By using the EV extension, the LSI is also able to associate each content source with an existing Retention
Category. This allows for simple management of required storage, without the administrator having to
manually configure each content source.
The deployment of the LSI is covered in Appendix A.
Page 4
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Deployment options for the Netbox Blue SRM Platform
Netbox Blue's Social Risk Management Platform can be deployed within an organisation's network in four
primary ways, depending on the capture requirements. More than one method can be used at a time with
a single instance, allowing for different capture methods for different networks. For example, a WiFi network
with BYO devices may have a different deployment method and rule set to users on corporate wired
devices. This can all be one in a single instance saving on compute resources, and simplifying
administration.
Microsoft Lync
The Netbox Blue SRM platform can capture Lync 2010 and Lync 2013 chat messages and package them
in a universal format to be submitted to the Enterprise Vault Archiving service. It's role is to query the Lync
archive service to extract the Lync messages, then package these messages into the correct format before
sending to EV, (with all the relevant metadata information such as user identity, profile name, timestamps,
etc.), to the Enterprise Vault archiving service.
Note: Lync Archiving services (in addition to the core Lync services) must have a valid license and be
correctly configured before this deployment role can be supported. More information can be found at
technet.microsoft.com.
Diagram 1 - Microsoft Lync integration with Netbox Blue's SRM and ingestion into Symantec EV
Page 5
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
There are three key aspects to this deployment method:
1. Installing the Netbox Blue Lync Service, which is a service typically installed onto the Lync Archive
Server.
2. The Netbox Social Risk Management Platform Local Software Instance (LSI). This is a virtual
machine to which the Netbox Blue Lync Service will communicate.
3. Setting the destination server within the Netbox Blue platform for Enterprise Vault.
The Netbox Blue Lync Service queries the Lync Database, and sends all the relevant chat messages to the
Netbox LSI via an encrypted and secure connection.
The Netbox LSI then collates the data and sends it, via secure SMTP, to the Symantec Enterprise Vault
Archiving service.
ICAP
ICAP (Internet Content Adaptation Protocol) is a fast, reliable process where two complementary services
can talk together (for example, a secure web gateway (the ICAP client) sending HTTP data to an Anti-Virus
server (the ICAP server) for scanning, and then the AV server responding to the proxy with an action to
take based on if it is “clean” or “infected”). ICAP is also often used by DLP servers.
Most enterprise Secure Web Gateways (SWG), web proxy and caching solutions support ICAP, and can
be configured to send traffic destined to specific domains to the Netbox Blue SRM Platform for further
action.
This mode is ideally suited to environments where the firewall is not being replaced and the Netbox Blue
SRM platform is being implemented to work with an existing web proxy that is performing HTTPS inspection.
In ICAP mode the Netbox Blue Platform is configured to sit behind the existing firewall and is connected to
a SWG with a standards-based ICAP connection.
The SWG is then configured to pass traffic to the Netbox Blue Platform, which then performs pattern
matching analysis and rules on this data stream. The Netbox Blue platform then makes a determination on
Page 6
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
this information and passes allowed traffic back to the SWG, or returns a denied message within the
platform interface.
Diagram 2 - Netbox Blue's SRM ICAP integration with an existing Secure Web Gateway showing the
active compliance and ingestion to Symantec EV
Direct Proxy
Direct proxy or “Explicit Proxy” is typically used within organisations that do not already have a direct proxy
configuration (such as when no web filtering is in place).
Web traffic is redirected to the Netbox Blue Platform, usually via a proxy.pac file that can be pushed out to
a select group of users via a Group Policy.
Furthermore, the .pac file can be configured to send traffic to those sites you're specifically interested in
(e.g., *.twitter.com, *.aim.com) to the Netbox, where all other traffic goes out directly through the firewall.
Netbox Blue can help customise a suitable proxy automatic configuration file for you as part of the
implementation process.
Page 7
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Diagram 3 – Netbox Blue’s Direct Proxy showing the active compliance and ingestion to Symantec
EV
Secure Web Gateway
A secure web gateway deployment means the Netbox Blue platform becomes a gateway for one or more
networks. In essence, the Netbox Blue platform is now a router, with at least two network interfaces, each
of which sits in a different subnet. Traffic will flow through it courtesy of network routing - be that either
default/static routing, or Policy Based Routing.
This method is more complex to integrate into an existing network and therefore consultation
with Netbox Blue engineers should be conducted before any plan is agreed upon. This gives the ability for
the organisation to leverage the other technologies Netbox Blue provides such as user identification, web
filtering and virus scanning as part of an integrated solution.
Page 8
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Diagram 4 - Netbox Blue’s Secure Web Gateway showing the active compliance and ingestion to
Symantec EV
Page 9
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Netbox Blue Integration with Enterprise Vault
Content can be ingested directly into Enterprise Vault using the new SMTP ingestion method provided as
part of version 11.0.1 and later. Using the Netbox Blue EV extension, the extensive metadata provided by
the Netbox Blue capture solution can be surfaced in EV and accompanying solutions, including Compliance
Accelerator, Discovery Accelerator and eDiscovery Platform1.
The data flow from capture to ingestion is shown is this diagram:
Diagram 5 - Data flow from capture to ingestion
Rich Metadata and Intelligent Indexing
Once the captured data is ingested into EV, a number of additional attributes are available on each message
from the Netbox Blue LSI. By having all of the metadata in their own attributes in EV, it makes the searching
and retrieval of data much faster and easier. For example, rather than having to know the profile name of
a user, they can be searched by their AD username. This will retrieve not only their corporate email, but
also all their interactions with the various social platforms. This covers both incoming and outgoing user
generated content. Additionally, having the metadata attributes available, the filter can then easily be
narrowed to just one platform, and even a direction.
For example a single search could cover all of Bob’s outgoing IM conversations where NBB was mentioned
on Google Hangouts. As the search is done on the metadata, it is quick and easy to create the search, and
it will return reliable results. Traditional solutions (if there was any capture of social media), would not tie
the interactions back to an AD user, nor would it have the metadata available as their own attributes. So a
filter by “Google” would pick up all messages that mentioned Google anywhere in the body.
1
At the time of publishing this document eDiscovery Platform support for search SMTP data was still
pending. Full support for searching SMTP data will be added to version 8.1.1 of eDiscovery Platform.
Page 10
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Some of the metadata captured includes:
Search attribute name
EVSP.OriginalLocation
Display name
Reference URL
EVSP.CreatedDate
First time
EVSP.ModifiedDate
Edit times
EVSP.CreatedBy
User
EVSP.ModifiedBy
Editors
NBB.Usernames
Organisational
Users
Thread ID
NBB.ThreadID
Description
List of original web locations, such as links to the user
profiles of those who have participated in a Facebook post
Local time for the scanned user, when the first contribution
to an item of social content was made. For example, the
date a search was performed, or, the date of the first post
in a discussion.
Local times for the scanned user, when each contribution
to an item of social content was made. For example, a list
of date-times for each post in a discussion, starting with
the creation time.
The organisation user that read a thread, first posted in a
thread, or that performed some search or status update,
etc.
All users that posted to a thread or participated in a
discussion in some way (whether they are organisation
users or not).
A list of users involved in a social item that belong to the
organisation being archived (e.g., Active Directory users).
Netbox identifier for an archived item
Table 2 - Metadata search attributes sent to Symantec EV
The full mapping of available attributes and their meaning is available on the LSI in the online help. The
online help is updated as new metadata becomes available.
Capturing Content and Enterprise Vault Ingestion
The EV extension provides the ability to automatically configure archives and archive types for the different
platforms and content providers. The following screen shot shows the Netbox extension installed into
Symantec Enterprise Vault.
Page 11
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Diagram 6 - Screen shot of the installed Symantec EV extension
The Extension is configured using a local web interface, loaded from the extension using the Manage
button. The web configuration, shown below, connects the EV Extension to the Netbox Blue LSI.
Diagram 7 - Screen shot of the local extension configuration screen
Page 12
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Once connected to the LSI, the capture options and the archives used for each content type are configured
on the LSI web interface.
These configuration options include the SMTP ingestion address of the EV server (note: this is the direct
SMTP ingestion address of the server, not a journal mailbox), the content to be captured (based on group
membership, platform, inbound/outbound, time of day and even content patterns) and setting the policies
for which communication platform(s) should go to which archive. The retention category can also be
configured based on the platform.
A suggested configuration can be provided, and this will automatically create all of the archive types and
archives in EV, greatly simplifying the deployment process. The available archive categories are extracted
directly from the EV instance, allowing for complete flexibility in the available options. An example
configuration is shown below.
Page 13
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Diagram 8 - Screen shot of the Netbox Blue SRM configuration user interface for Enterprise Vault
integration
Once the EV Extension is installed and connected to the Netbox Blue LSI and enabled, the archive types
and archives will automatically be created and configured. This process is completely automated. Captured
data is then submitted to EV on a scheduled basis (once a day in the example above but it can be as
frequently as every 30 minutes).
Page 14
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Enterprise Vault Search
The process to search by each of these attributes depends on the tool selected. Below is a simple search
in Enterprise Vault Search, showing the additional metadata in the last column.
Diagram 9 - Screen shot of a search in Symantec EV, showing some of the additional metadata
Compliance Accelerator
The additional metadata can also be accessed in Compliance Accelerator. The screen shot below shows
the type of the message highlighted as “social”, shown in the History tab that exposes these additional
attributes.
Page 15
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Diagram 10 - Screen shot of a search in Compliance Accelerator, showing some of the additional
metadata
Discovery Accelerator
The filter creation in Discovery Accelerator is shown in the following image. This is filtering by a specific AD
user (irrespective of social media profile used), and filtering to just searches that have been made.
Discovery Accelerator makes searching by additional attributes very easy in the search creation user
interface.
Page 16
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Diagram 11 - Screen shot of Symantec Discovery Accelerator showing searching by the additional
metadata
Licensing
The Netbox Blue Service requires a subscription license for each user that is being supported by the
services.
This license is charged based on the platforms being captured and the range of services required.
Please contact Netbox Blue for more details: http://netboxblue.com/webform/implementation-checklist.
Conclusion
Netbox Blue provides flexible solutions to help organizations control and capture activities by employees
on public and corporate IM networks and corporate collaboration networks as well as social media networks
such as Facebook, Twitter, and LinkedIn.
Captured content can be automatically archived into Enterprise Vault. The archived content can then be
searched by Compliance Accelerator, Discovery Accelerator and eDiscovery Platform. This allows
organizations to provide a more complete picture of their environment when the need for eDiscovery arises
by not only being able to search mail and file archives, but also have the ability to search against instant
messages and social media networks.
Page 17
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
APPENDIX A - Deploying the Netbox Blue SRM software
platform
This document outlines the prerequisites and basic steps to install the Netbox image into VMware. This
will get the core OS installed. A license key and download link will be provided upon request. This same
process is followed for all instances of the Netbox appliance, the registration key then activates and
installs the relevant components for your installation.
Minimum System (for testing)
The guest OS must have at least the following (this is suitable for a testing environment):

RAM: 4GB

Storage: 20GB SCSI drive

Network: 2x Ethernet connections (VMXNET 3)

VMware version: ESX/ESXi v5.0 or later (with 64-bit guest support)
Recommended System (for production)
This system is the recommended system for the Netbox Blue software (note: this will vary depending on
the number of users of the system, following is for around 100 users.):

RAM: 8Gb

Storage: 100GB SCSI drive

Network: 2x Ethernet adaptors (VMXNET 3)
Unsupported Configurations
Items that are not supported and/or will not work with the Netbox Blue software.

IDE drives
Supported Extras (additional users)
Additional resources will be required for more users. The following items may be added to the VMware
system and will be supported by the Netbox Blue software. Note that some items may require activation
by Netbox Blue or an update initiated via the user interface.

Additional memory, the maximum memory supported is 64GB
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration

Additional storage, up to 2TB is supported
o
An additional 2TB disk is supported for the Content Acceleration Platform

Additional Ethernet adapters

Additional CPU's, up to 8
As a rule of thumb, for every 100 users, an additional 2GB of RAM and 50GB of storage should be
allocated. An extra CPU core should also be added per 200 users.
Important Notes on Creating the Guest Environment
Following are the options for creating the recommended guest environment for the Netbox Blue
software:

Create a new VM

Start with a typical configuration, for Linux, Red Hat Enterprise Linux 5 (64-bit)

Add 2 NIC's (the first is the LAN connection, the second the Internet connection), these should
be “VMXNET 3”

Create a disk with the required amount of storage (this should be at least 20GB, but typically
much larger)

Adjust the RAM to what is desired

Add additional processors if desired

The ISO image may also be connected to the “New CD/DVD” device, ensure “Connect at power
on” is selected
Powering the System On and Off
As VMware Tools are automatically installed once the system is activated, the system can be powered
down gracefully using the standard VMware options.
Installing the Netbox Software
To install the Netbox software, connect the ISO image to the virtual CD-ROM drive after creating the
VM. The VM should then boot from the CD and start the install process.
Note: There may be errors and alerts during the boot process. This is normal as drivers and services for
all configurations are tested during the boot sequence.
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Once installation is complete, the CD-ROM drive is not required, and can be removed from the VM
configuration if desired
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
APPENDIX B – Extensive Metadata Capture
Netbox Blue's Social Risk Management (SRM) solution has the ability to capture social and IM messages
and send them to Symantec Enterprise Vault in a native format. Capturing extensive metadata allows for
much faster eDiscovery and retrieval at the time you need it – in the case of an incident.
The available metadata and auxiliary data the solution can capture for each "message" includes:
Message ID: A unique identifier for the specific message, be that a post, IM or a search. Message ID's are
the same for the same post both incoming and outgoing. This provides the ability to correlate when a
message was sent, and when it was read.
Thread ID: An identifier for a conversation stream. This provides a way to quickly identify what a specific
message by viewing it in the full context of the communication. With out it a single line IM would likely
have little meaning.
Parent ID: In the case of a comment for example on a post, this provides a reference as to what message
this was in response to, allowing the look and feel of the original conversation to be reconstructed.
IP Address: The IP address of the user sending or receiving the content when this was captured. This
helps to identify the device a specific post was made from or consumed on.
Received Time: The time with the message was captured by the solution, but before it has been pushed
to the archive queue. Depending on deployment, this is normally a few seconds before Queued Time.
Queued Time: This is the time the message was made available in the archive queue. Depending on the
archive provider this may be pushed in near real time, or queued up and sent as a batch on a regular
interval.
Sent Time: The time the platform reports when the message was sent in the case of incoming messages.
This is the time it was captured in the case of outgoing messages.
Source: How the message was captured, it could be from a plug-in app in the platform, real time via
ICAP or via our secure web gateway.
User ID: This is the Active Directory (or other directory server if configured) identifier of the user making
a specific post or read. This allows tracking of the source of a message to an individual in the
organization, not just to a social account. It becomes even more relevant when there are many users
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
interacting with an organization’s public social media assets, as everyone typically would log in with the
same social account. Without this metadata, identifying the individual who actually made a post is not
possible.
User Email: Linking back to the User ID, the users internal email address is also recorded. This simplifies
searches across all platforms in the archive as when searching for an email address, not only will emails
be returned, but also all social and IM interactions in a single view.
Application: The application to which a specific message relates to, this could be Twitter, LinkedIn,
Google etc.
Services: Messages are grouped into a number of services across all of the applications. This again allows
for easy searching, for example fining all chat messages for a user, or searches that were done.
Actions: For each Service, there is an action that can be taken, the most common ones are send and
receive, but things such as accept friend request, safe draft and the like can also be captured.
Recipients: All of the recipients of a message, where applicable, are captured. These are the recipients
on the social platform. The metadata captured of each of these can include:
Social Media display name
Profile URL
Email address (used on the social platform)
Sender: The same metadata on the Senders an the Recipients is also captured.
Bodies: The full body of the post is captured, if it is not just plain text, the HTML representation (or other
format if applicable) is also captured.
Subject: For items where there is a subject, such as web mail, this is captured.
Events: If Netbox Blue's governance enforcement module is activated, and a policy is triggered, this is
recorded. This includes additional metadata such as the policy that was matched, if the message was
blocked or held for moderation, and if an alert was sent.
Tags: Any additional metadata that does not have a specific field and specific to a platform or service,
this can include things such as geolocation information, dates etc.
Groups: For platforms that support the creation of groups (for example Yammer), the information about
the group is captured, which can include:
Enterprise Vault Whitepaper – Netbox Blue and Enterprise Vault Integration
Status: Such as public of private
URL: The public URL to access this group
ID: A unique identifier for the group
Name: The name of the group that is displayed to the user.
Attachments: Attachments can also be captured, including images, videos and documents. Where
possible additional data is also captured including:
Name: The original name of the attachment
Size
URL: If a public URL is available, this is included
Content Type: The MIME type of the attachment, such as "image/jpeg"
Content ID: If required, to link it back to the body of the message, such as an image in an email coming
in via webmail.
About Symantec:
Symantec is a global leader in
providing security, storage, and
systems management solutions
to help consumers and
organizations secure and
manage their information-driven
world. Our software and
services protect against more
risks at more points, more
completely and efficiently,
enabling confidence wherever
information is used or stored.
Headquartered in Mountain
View, Calif., Symantec has
operations in 40 countries. More
information is available at
www.symantec.com.
About Netbox Blue:
Since 1999 Netbox Blue has
been a leading provider of
network security and content
filtering solutions. Netbox Blue is
also now a leading provider of
Social Risk Management
solutions. This patented
technology was launched in
2008 and since then Netbox
Blue has built a global reputation
for innovation and reliability.
Netbox Blue was recognized by
Gartner as a ‘Cool Vendor’, with
specific relevance to the Archive
and eDiscovery market.
Headquartered in Australia,
Netbox Blue can be contacted at
ev@netboxblue.com or via
www.netboxblue.com
Copyright © 2015 Symantec
Corporation. All rights
reserved. Veritas and the
Veritas Logo are trademarks or
registered trademarks of
Symantec Corporation or its
affiliates in the U.S. and other
countries. Other names may be
trademarks of their respective
owners.
Symantec Corporation
For specific country offices and
contact numbers, please visit
our Web site:
www.symantec.com
World Headquarters
350 Ellis Street
Mountain View, CA 94043 USA
+1 (650) 527 8000
+1 (800) 721 3934
This document is provided for
informational purposes only and
is not intended as
advertising. All warranties
relating to the information in this
document, either express or
implied, are disclaimed to the
maximum extent allowed by law.
The information in this
document is subject to change
without notice.