Enterprise Vault™ Compliance Accelerator Installation Guide

Last Published:
Product(s): Enterprise Vault (14.4)
  1. Introducing Compliance Accelerator
    1.  
      Key features of Compliance Accelerator
    2.  
      About the Compliance Accelerator components
    3. Product documentation
      1.  
        White papers on the Veritas Support website
  2. Preparing to install Compliance Accelerator
    1. Configuration options for Compliance Accelerator
      1.  
        Compliance Accelerator configuration for large installations
      2.  
        Compliance Accelerator configuration for smaller installations
    2.  
      Supported versions of Enterprise Vault in Compliance Accelerator environments
    3. Prerequisites for Compliance Accelerator
      1.  
        Prerequisites for the SQL Server computer
      2.  
        Prerequisites for the Compliance Accelerator server computer
      3.  
        Prerequisites for the Enterprise Vault server computer
      4.  
        Prerequisites for Compliance Accelerator client computers
      5. Prerequisites for Veritas Advanced Supervision
        1.  
          Additional requirements for Veritas Advanced Supervision
        2.  
          Set Kerberos Trusted Delegation
    4.  
      Configuring Outlook to enable the processing of items with many attachments or many recipients
    5.  
      Setting the Windows and ASP.NET Temp folder permissions
    6. Security requirements for temporary folders
      1.  
        Granting additional users and groups access to the temporary folders
    7.  
      Disabling networking facilities that can disrupt a Compliance Accelerator environment
    8.  
      Disabling the Windows Search Service on the Compliance Accelerator server
    9.  
      Ensuring that the Windows Server service is running on the Compliance Accelerator server
    10.  
      Configuring the SQL Server Agent service
    11.  
      Assigning SQL Server roles to the Vault Service account
    12.  
      Installing and configuring the SQL full-text search indexing service
    13.  
      Verifying that Enterprise Vault expands distribution lists
    14. Configuring Intelligent Review API Authentication and Authorization
      1.  
        Setting Kerberos trusted delegation between Compliance Accelerator Servers and Compliance Accelerator Database Servers
      2.  
        Setting Kerberos trusted delegation between Compliance Accelerator Servers and Compliance Accelerator Database Servers on IP address
  3. Installing Compliance Accelerator
    1. Installing the Compliance Accelerator server software
      1.  
        Allowing Enterprise Vault to communicate with Compliance Accelerator through the Windows firewall
      2.  
        Creating the configuration database and customer databases
      3.  
        Uploading the Compliance Accelerator report templates
      4.  
        Configuring a dedicated server for Intelligent Review processing (optional deployment configuration)
      5. Configuring Compliance Accelerator for use in a SQL Server Always On environment
        1.  
          Using SQL Server Reporting Services in an Always On environment
      6. Installing Compliance Accelerator in a clustered environment
        1.  
          Configuring Compliance Accelerator for use in a Network Load Balancing cluster
      7.  
        Maximizing security in your Compliance Accelerator databases
    2. Installing the Compliance Accelerator client software
      1.  
        Modifying the configuration file for the Compliance Accelerator client
      2.  
        Using the MSI installer package to install the Compliance Accelerator client
    3.  
      Uninstalling Compliance Accelerator
  4. Appendix A. Ports that Compliance Accelerator uses
    1.  
      Default ports for Compliance Accelerator
    2.  
      Changing the ports that Compliance Accelerator uses
  5. Appendix B. Troubleshooting
    1.  
      Error messages appear in the event log when upgrading to Compliance Accelerator 14.4
    2.  
      Enterprise Vault Accelerator Manager service not created
    3.  
      Enterprise Vault Accelerator Manager service does not start
    4.  
      "Access is denied" message is displayed when you try to create a customer database on a UAC-enabled computer
    5.  
      Cannot create or upgrade Compliance Accelerator customer databases when Symantec Endpoint Protection is running
    6.  
      Permissions error when uninstalling the Compliance Accelerator client from a UAC-enabled computer
    7.  
      Uninstalling the Compliance Accelerator client from a shared location may prevent other users from starting the client
    8.  
      Error messages when the Intelligent Review (IR) API authentication and authorization fails
  6. Appendix C. Installing and configuring the Enhanced Auditing feature
    1.  
      Overview
    2.  
      Prerequisites for the Enhanced Auditing feature
    3.  
      Installing the Enhanced Auditing feature
    4.  
      Post installation steps
    5.  
      Upgrading the Enhanced Auditing setup
    6.  
      Modifying the Enhanced Auditing setup
    7.  
      Repairing the Enhanced Auditing setup
    8.  
      Uninstalling the Enhanced Auditing setup
    9.  
      Managing access from Veritas Advanced Supervision

Configuring a dedicated server for Intelligent Review processing (optional deployment configuration)

Compliance Accelerator supports the installation of multiple Compliance Accelerator Servers in a single Compliance Accelerator environment. The Intelligent Review (IR) services get installed along with the installation of each Compliance Accelerator Server. Every IR component, by default, processes the customers for its own Compliance Accelerator Server.

In Compliance Accelerator 14.3, a new feature - Dedicated IR Server - is introduced, which enables a single Compliance Accelerator Server to be dedicated to processing all customers for Intelligent Review, irrespective of which Compliance Accelerator Server they are configured on. This option is provided so that the end user can move a load of IR processing to a less-loaded Compliance Accelerator Server if required.

To configure a Compliance Accelerator server as a dedicated IR server

  1. On Enterprise Vault Accelerator Manager, select EVBAADMIN, and open the Server Properties dialog box
  2. Select the Dedicated IR Server check box adjacent to the Compliance Accelerator server you want to dedicate for Intelligent Review processing.

    Note:

    There can only be a single Dedicated IR Server in the environment and is supported in a scenario where Configuration Database is shared. Refer to the following example.

Refer to the scenario below.

Server TKVAS has only one customer (CAVAS2).

Server TKWIN2016TEST1 has two customers (CA1 and CA2).

By default, IR 2.0 services on TKVAS will process the customer CAVAS2 and IR 2.0 services on TKWIN2016TEST1 will process customers CA1 and CA2.

However, if you select the TKWIN2016TEST1 server as a Dedicated IR Server, it will serve as the only IR Server in the environment. It will process all the customers - CAVAS2, CA1, and CA2 for Intelligent Review. The IR components on another server TKVAS will not be used for IR Processing. These servers will only verify if there is any work to do. Else, these servers remain dormant. If you change the Dedicated IR Server to some other Compliance Accelerator Server, those services will then start processing Intelligent Review-related work.

Another deployment option is installing an additional Compliance Accelerator server only for IR processing. This server may not have any customers associated with it. For example, in the below sample image, there are 2 servers, where TKVAS does not have any customers and is only used for IR processing.