Enterprise Vault™ Compliance Accelerator Installation Guide
- Introducing Compliance Accelerator
- Preparing to install Compliance Accelerator
- Configuration options for Compliance Accelerator
- Prerequisites for Compliance Accelerator
- Security requirements for temporary folders
- Configuring Intelligent Review API Authentication and Authorization
- Installing Compliance Accelerator
- Installing the Compliance Accelerator server software
- Configuring Compliance Accelerator for use in a SQL Server Always On environment
- Installing Compliance Accelerator in a clustered environment
- Installing the Compliance Accelerator client software
- Installing the Compliance Accelerator server software
- Appendix A. Ports that Compliance Accelerator uses
- Appendix B. Troubleshooting
- Appendix C. Installing and configuring the Enhanced Auditing feature
Maximizing security in your Compliance Accelerator databases
The following actions can be taken to maximize the security in your Compliance Accelerator databases.
By default, the Vault Service account owns all the Compliance Accelerator databases and can access all the objects in them. To maximize security in your SQL Server environment, you may want to change the ownership of each database and revoke many of the Vault Service account's access privileges. The following article on the Veritas Support website describes how to perform these activities:
Configuration Database contains crucial security information such as encryption keys for every customer. This information is used to encrypt the data stored in Compliance Accelerator. To protect this security information, it is recommended to back up the configuration database regularly.