Enterprise Vault™ Discovery Accelerator Installation Guide

Last Published:
Product(s): Enterprise Vault (14.4)
  1. Introducing Discovery Accelerator
    1.  
      Key features of Discovery Accelerator
    2.  
      About the Discovery Accelerator components
    3. Product documentation
      1.  
        White papers on the Veritas Support website
      2.  
        Discovery Accelerator training modules
  2. Preparing to install Discovery Accelerator
    1. Configuration options for Discovery Accelerator
      1.  
        Discovery Accelerator configuration for large installations
      2.  
        Discovery Accelerator configuration for smaller installations
    2.  
      Supported versions of Enterprise Vault in Discovery Accelerator environments
    3. Prerequisites for Discovery Accelerator
      1.  
        Prerequisites for the SQL Server computer
      2.  
        Prerequisites for the Discovery Accelerator server computer
      3.  
        Prerequisites for the Enterprise Vault server computer
      4.  
        Prerequisites for Discovery Accelerator client computers
    4.  
      Configuring Outlook to enable the processing of items with many attachments or many recipients
    5.  
      Setting the Windows and ASP.NET Temp folder permissions
    6. Security requirements for temporary folders
      1.  
        Granting additional users and groups access to the temporary folders
    7.  
      Disabling networking facilities that can disrupt a Discovery Accelerator environment
    8.  
      Disabling the Windows Search Service on the Discovery Accelerator server
    9.  
      Ensuring that the Windows Server service is running on the Discovery Accelerator server
    10.  
      Configuring the SQL Server Agent service
    11.  
      Assigning SQL Server roles to the Vault Service account
    12.  
      Installing and configuring the SQL full-text search indexing service
    13.  
      Verifying that Enterprise Vault expands distribution lists
  3. Installing Discovery Accelerator
    1. Installing the Discovery Accelerator server software
      1.  
        Allowing Enterprise Vault to communicate with Discovery Accelerator through the Windows firewall
      2. Creating the configuration database and customer databases
        1.  
          Configuring analytics database locations
      3. Setting up a Custodian Manager website
        1.  
          Assigning the required Active Directory permissions to the Custodian Manager synchronization account
      4.  
        Uploading the Discovery Accelerator report templates
      5. Configuring Discovery Accelerator for use in a SQL Server Always On environment
        1.  
          Using SQL Server Reporting Services in an Always On environment
      6. Installing Discovery Accelerator in a clustered environment
        1.  
          Configuring Discovery Accelerator for use in a Network Load Balancing cluster
      7.  
        Maximizing security in your Discovery Accelerator databases
    2. Installing the Discovery Accelerator client software
      1.  
        Modifying the configuration file for the Discovery Accelerator client
      2.  
        Using the MSI installer package to install the Discovery Accelerator client
  4. Appendix A. Ports that Discovery Accelerator uses
    1.  
      Default ports for Discovery Accelerator
    2.  
      Changing the ports that Discovery Accelerator uses
  5. Appendix B. Troubleshooting
    1.  
      Error messages appear in the event log when upgrading to Discovery Accelerator 14.4
    2.  
      Enterprise Vault Accelerator Manager service not created
    3.  
      Enterprise Vault Accelerator Manager service does not start
    4.  
      "Access is denied" message is displayed when you try to create a customer database on a UAC-enabled computer
    5.  
      Cannot create or upgrade Discovery Accelerator customer databases when Symantec Endpoint Protection is running
    6.  
      Permissions error when uninstalling the Discovery Accelerator client from a UAC-enabled computer
    7.  
      Uninstalling the Discovery Accelerator client from a shared location may prevent other users from starting the client
  6. Appendix C. Installing and configuring the Enhanced Auditing feature
    1.  
      Overview
    2.  
      Prerequisites for the Enhanced Auditing feature
    3.  
      Installing the Enhanced Auditing feature
    4.  
      Post installation steps
    5.  
      Upgrading the Enhanced Auditing setup
    6.  
      Modifying the Enhanced Auditing setup
    7.  
      Repairing the Enhanced Auditing setup
    8.  
      Uninstalling the Enhanced Auditing setup
    9.  
      Managing access from Discovery Accelerator

Installing the Enhanced Auditing feature

Follow the instructions in this section to perform a first-time installation of the Enhanced Auditing feature.

Before you proceed, note the following:

  • You must belong to the local Administrators group.

  • You must be a domain user.

  • You meet the minimum hardware and software requirements.

To install the Enhanced Auditing feature

  1. Copy the MSI file of the Enhanced Auditing feature on the server you want to use as an audit server.
  2. Run the MSI file from the Command Prompt to launch the Veritas Enhanced Auditing installer. The installer opens the Welcome wizard.

    Note:

    Click Cancel if you want to cancel the installation at any stage. After you click Cancel, the application prompts you to confirm the operation. If you interrupt the installation process, the installer prompts you to run the installation again whenever required. Click Yes to complete the operation and click Finish to abort the installation. Click No to continue the installation.

  3. Click Next on the Welcome screen.
  4. On the Prerequisites screen, see if you meet the listed prerequisites. If yes, select the I have read and met the above prerequisites check box and then click Next.
  5. On the Prerequisite Status screen, the installer performs a check for all required software. When the prerequisite check is completed, click Next.
  6. On the End-User License Agreement screen, read the Veritas Software License Agreement. If you agree to the terms, select the I accept the terms in the License Agreement check box and then click Next.
  7. On the Installation location screen, the default installation location is displayed. If you want to use a different installation location, click Browse to select the installation location.
  8. On the Auditing Service Account Login screen, provide the following account details for the Auditing Service.
    • Domain

    • Username

    • Password

  9. On the Veritas Enhanced Auditing Configuration Welcome screen, provide the following required details for creating the Audit Server URL and enabling it for secure access.
    • Server Name: DNS Alias name or FQDN for the audit server.

    • Port: Port for the audit server site. Enter a port that is available to use. You must not use the default IIS port 80.

    • Comma-separated list of IP addresses from where the audit server can be accessed: Enter a comma-separated list of IP addresses of the servers from which the audit server will be accessed. These are the IP addresses for each protocol (IPv4 and IPv6) that are enabled on the Discovery Accelerator server.

    • Holding folder Path: A directory where the audit data will be stored temporarily.

      Note:

      Ensure that the Access Control List (ACL) of the Holding Folder is not changed.

    Based on these details, the audit server URL format becomes: https://<auditservername>:<portnumber>.

    Click Next after entering all required details.

  10. On the Veritas Enhanced Auditing Configuration Settings screen, enter details of either an existing Elasticsearch server or a new Elasticsearch server.

    For an existing Elasticsearch server, select the Use an existing Elasticsearch server details, and then provide the following details:

    • Elasticsearch URL: URL of the Elasticsearch server.

      Note:

      Ensure that security is enabled with native realm.

      If Elasticsearch has TLS enabled, then ensure that the required configurations also exist on the audit server. For more information on security in Elasticsearch, refer to the Elasticsearch documentation.

    • Elasticsearch Username: Username of the Elasticsearch superuser. This superuser is displayed at the time of upgrading and modifying the Enhanced Auditing feature. The Enhanced Auditing feature uses this superuser to perform the user and role management operations on Elasticsearch.

    • Elasticsearch Password: Password of the Elasticsearch superuser.

    To install a new Elasticsearch server, enter the password in the Set password for Elasticsearch built-in users field. When prompted, specify the Elasticsearch installation location where you want to install Elasticsearch.

    Click Next after entering all required details.

  11. Click Install to proceed with the installation.
  12. On the final screen of the setup, the Audit Server URL is displayed. You need this URL while configuring the Auditing settings in the Configuration > Settings tab in the Discovery Accelerator client.
  13. To view the installation-specific logs, navigate to the folder where you have installed the Veritas Enhanced Auditing setup and access the Logs folder.

Note:

Even after the Enhanced Auditing feature is uninstalled, Elasticsearch does not get uninstalled.