Enterprise Vault™ Discovery Accelerator Installation Guide
- Introducing Discovery Accelerator
- Preparing to install Discovery Accelerator
- Configuration options for Discovery Accelerator
- Prerequisites for Discovery Accelerator
- Security requirements for temporary folders
- Installing Discovery Accelerator
- Installing the Discovery Accelerator server software
- Creating the configuration database and customer databases
- Setting up a Custodian Manager website
- Configuring Discovery Accelerator for use in a SQL Server Always On environment
- Installing Discovery Accelerator in a clustered environment
- Installing the Discovery Accelerator client software
- Installing the Discovery Accelerator server software
- Appendix A. Ports that Discovery Accelerator uses
- Appendix B. Troubleshooting
- Appendix C. Installing and configuring the Enhanced Auditing feature
Maximizing security in your Discovery Accelerator databases
The following actions can be taken to maximize the security in your Discovery Accelerator databases.
By default, the Vault Service account owns all the Discovery Accelerator databases and can access all the objects in them. To maximize security in your SQL Server environment, you may want to change the ownership of each database and revoke many of the Vault Service account's access privileges. The following article on the Veritas Support website describes how to perform these activities:
Configuration Database contains crucial security information such as encryption keys for every customer. This information is used to encrypt the data stored in Discovery Accelerator. To protect this security information, it is recommended to back up the configuration database regularly.