Understanding Shadow Users in HubStor
HubStor has the concept of 'Shadow Users'. When the security identifiers that are present in the data that do not resolve to any user or group found in the directory provider, HubStor creates a shadow user profile automatically. A shadow user is a placeholder account that illuminates an identity present in the data but not in the directory. Shadow users will display in HubStor as an external user that is not enabled in the directory provider. However, using any of the custodian-based policies or search capabilities in HubStor will allow you to specify shadow users. If a shadow user is later discovered in the directory provider, HubStor automatically resolves its preexisting access rights mapping for the identity.
This is done for two reasons:
- It allows HubStor to archive content from your organization prior
to your first directory synchronization completing.
- It enables data governance in orphaned data scenarios. Often times, what's in the scope of archiving is data that's orphan (that's content where all users with access rights are no longer at the organization). In HubStor, automatic shadow user profiles provide an efficient way of identifying orphan content in your archive. HubStor's
ability to leverage custodians in searches and policies means that you
can specifically target orphan user's data. For instance, perhaps you
wish to run a retention policy specifically for orphan data, or perhaps
exclude it from a Discovery search.
Error 0x80070780 When Trying To Restore a Folder with Volume Shadow Copy Previous Versions
Problem Seamless Stubs have been deleted from a source server and are attempted to be restored by using the 'Restore previous versions' option. (see below) Symptom This process fails with the error below: 'Error 0x80070780: The file cannot be ...
External Users and How to Configure Them in HubStor
This article will discuss the different aspects of how External users work within a HubStor tenant. External users are either: Users not in your corporate domain that have been granted shared access to content in HubStor, and/or; Shadow users, ...
Understanding DLP in HubStor
In HubStor, data loss prevention (DLP) capabilities are native to the storage. In this article, we'll provide an overview of what can be achieved with HubStor's DLP features. Tagging and Blocking HubStor includes the concept of DLP Tags. DLP Tags ...
Understanding ACL Synchronization in HubStor
There are two types of access control lists (ACL) maintained by HubStor for use in its authorization layer: Source ACL and Sharing ACL. The Source ACL is discovered during the archive’s collection process. As content is archived the ACL information ...
How to Interpret HubStor Invoices
First, thank you for being a HubStor customer! This article shows you how to dissect and reverse engineer the numbers in a HubStor invoice. Before we walk through a few examples, here are some essentials you need to know: HubStor invoices are posted ...