Please enter search query.
Search <book_title>...
Enterprise Vault™ Compliance Accelerator Installation Guide
Last Published:
2024-09-02
Product(s):
Enterprise Vault (15.1)
- Introducing Compliance Accelerator
- Preparing to install Compliance Accelerator
- Configuration options for Compliance Accelerator
- Prerequisites for Compliance Accelerator
- Security requirements for temporary folders
- Configuring Intelligent Review API Authentication and Authorization
- Installing Compliance Accelerator
- Installing the Compliance Accelerator server software
- Configuring Compliance Accelerator for use in a SQL Server Always On environment
- Installing Compliance Accelerator in a clustered environment
- Installing the Compliance Accelerator server software
- Appendix A. Ports that Compliance Accelerator uses
- Appendix B. Troubleshooting
- Appendix C. Installing and configuring the Enhanced Auditing feature
- Appendix D. Introducing Veritas Surveillance web client
Prerequisites for Veritas Surveillance
If you want to install and use Veritas Surveillance, you must install and configure the following software items on the computer that is to run the Compliance Accelerator server. These are in addition to the prerequisites for Compliance Accelerator.
Note:
While installing the prerequisites, you must use the domain administrator account.
ASP .NET Core Runtime 8.0.x Hosting Bundle. The minimum supported version is 8.0.7.
IIS Security feature - IP and Domain Restrictions feature must be installed using the Roles and Features option of the System Configuration application.
Note:
Veritas Surveillance can be best viewed with Mozilla Firefox or Google Chrome. Internet Explorer is not supported.