-
INITIAL TOPICS
-
NORTHERN USE CASES
-
GETTING STARTED WITH NSS
-
ANALYZE FILE SERVICE CONTENT
-
-
- Contact Northern for Information
-
- Contact Northern for Information
-
-
-
- Add/Edit a Function Column
- Function Column Examples - Identify Sensitive Data
- Content Scanning Supported File Types
-
- Contact Northern for Information
-
- Contact Northern for Information
-
- Contact Northern for Information
-
-
WORK WITH ANALYSES
-
CONTROL GROWTH AND CONTENT
-
- Contact Northern for Information
-
MAINTAINING NSS
-
TROUBLESHOOT
-
- Empty or Invalid QS UPDATE Settings [Event ID 7065]
- Failed to call system-get-version [Error 10061]
- Failed to Call System-get-version [Error 13002]
- Failed to call system-get-version [Errors 10060, 11001]
- Failed to Get License … Now Running in Grace Period [Event ID 2702, 2713]
- Failed to Get License to Manage ... Quotas [Event ID 7054]
- Failed to LockDir or Connect: Failed to Call [Error 13003]
- Failed to Process Request for Resending Quotas ... [Event ID 7062]
- Failed to Queue Notification for Drive Root [Event ID 2906]
- Out of Memory [Event ID 2645]
- Report Definition ... [Event ID 303]
-
RELEASE NOTES
-
FEEDBACK
Introduction to Use Cases
Introduction to Use Cases
Northern is able to deliver on a range of needs, from controlling storage infrastructure use, to improving data governance, compliance, and Records Management.
This section of the Knowledge Base provides examples of how customers are using Northern’s software solution (NSS) to manage their unstructured and semi-structured data – the specific challenges they are overcoming and the value they are realizing.
Each article is a simplified example of how challenges are being overcome. In many cases the solution does not need to be made more complicated, in other cases adaptations are required – NSS, and Northern’s delivery team, are well equipped to adapt and meet more complex needs.
USE CASE EXAMPLES
- Manage Redundant and Unused Files
- Redundant IT-Related Files
- Identify and remove redundant installers, disk images, application logs, data exports, database backups, etc.
- Abandoned File Shares
- Identifiy and remove file shares that have not been used in a long time.
- Manage Special Data Types
- Identify and Remove Email Archives
- Identify and remove all types of Email archives, particularly PST and MSG files.
- Illegally Stored Copyright-Protected Data
- Identify and delete illegally downloaded data, such as music, movies and tv shows etc.
- Files with Login Information and Credentials
- Identify and remove files containing login information, both in content and file name.
- Non Business-Related Data in Personal Drives
- Identify and review all non business related files in the users Personal Drives.
- Interrupt and Track Ransomware Attacks
- Block attempted Ransomware attacks, and alert security team of a possible breach.
- Involve Data Owners
- Engage Users in Active Management
- Give users access to the Console in order to manage their own Personal Drive.
- Give Managers Insight
- Create an overview for managers about how their team is using the file service.
- Identify Unwanted Permissions
- Administrators Have Limited Access
- Identify and review folders where admins do not have full access.
- Inappropropriate Groups Have Elevated Privileges
- Identify and review folders where regular users have too high access.
- Obsolete Accounts Have Access
- Identify and review folders where deleted accounts still have permissions.
MORE INFORMATION
If you wish to discuss one of these use cases, or a scenario related to what is being described here, please contact your Account Manager or the Professional Services team.