Enterprise Vault™ Discovery Accelerator Installation Guide
- Introducing Discovery Accelerator
- Preparing to install Discovery Accelerator
- Configuration options for Discovery Accelerator
- Prerequisites for Discovery Accelerator
- Security requirements for temporary folders
- Installing Discovery Accelerator
- Installing the Discovery Accelerator server software
- Creating the configuration database and customer databases
- Setting up a Custodian Manager website
- Configuring Discovery Accelerator for use in a SQL Server AlwaysOn environment
- Installing Discovery Accelerator in a clustered environment
- Installing the Discovery Accelerator client software
- Installing the Discovery Accelerator server software
- Appendix A. Ports that Discovery Accelerator uses
- Appendix B. Troubleshooting
Assigning the required Active Directory permissions to the Custodian Manager synchronization account
By default, Custodian Manager uses the account under which the Accelerator Manager service is running when it synchronizes custodians and custodian groups with the corresponding Active Directory accounts. However, if you prefer, you can nominate a different account on a per-domain basis.
For instructions on how to specify a different user account for synchronization purposes, see the Administrator's Guide.
The nominated synchronization account must have certain delegated permissions to query the Active Directory domain.
To assign the required delegated permissions to the Custodian Manager synchronization account
- Open Active Directory Users and Computers.
- Right-click the domain object, and then select Delegate Control.
- In the Delegation of Control Wizard, click Next, and then click Add.
- In the Select Users, Computers, or Groups dialog box, enter the required account name, and then click OK, and then click Next.
- In the Tasks to Delegate page, in Delegate the following common tasks, select the following tasks, and then click Next:
Read all user information
Read all inetOrgPerson information
- Click Finish.
The Custodian Manager synchronization account must also have List Content and Read Property permissions on the Deleted Objects container in Active Directory. Without these permissions, it is not possible to deactivate any custodians and custodian groups whose Active Directory details have been moved to the Deleted Objects container.
The following article on the Microsoft website provides detailed instructions on how to view and set permissions on the Deleted Objects container:
https://technet.microsoft.com/library/cc816824.aspx
Note:
You require a recent version of the dsacls command-line utility to complete the instructions in this article. Some older versions of the utility do not support all the required commands.
In brief, the procedure is as described below.
To enable the Custodian Manager synchronization account to access the Deleted Objects container
- Open a Command Prompt window with administrator privileges.
- Take ownership of the Deleted Objects container by running the dsacls command-line utility, as follows:
dsacls deleted_objects_dn /takeownership
Where the parameters are as follows:
deleted_objects_dn
The distinguished name of the Deleted Objects container.
/takeownership
Take ownership of the Deleted Objects container.
For example:
dsacls "CN=Deleted Objects,DC=Contoso,DC=com" /takeownership
- Grant the List Content and Read Property permissions to the user account under which Custodian Manager synchronizes custodians and custodian groups, as follows:
dsacls deleted_objects_dn /G user_or_group:permissions
Where the parameters are as follows:
deleted_objects_dn
The distinguished name of the Deleted Objects container.
user_or_group
The user or group to whom the permissions apply.
permissions
The permissions to grant. For List Content and Read Property, specify the permissions as LCRP.
For example:
dsacls "CN=Deleted Objects,DC=Contoso,DC=com" /G CONTOSO\VaultAdmin:LCRP