Please enter search query.
Search <book_title>...
Enterprise Vault™ Compliance Accelerator Installation Guide
Last Published:
2024-09-02
Product(s):
Enterprise Vault (15.1)
- Introducing Compliance Accelerator
- Preparing to install Compliance Accelerator
- Configuration options for Compliance Accelerator
- Prerequisites for Compliance Accelerator
- Security requirements for temporary folders
- Configuring Intelligent Review API Authentication and Authorization
- Installing Compliance Accelerator
- Installing the Compliance Accelerator server software
- Configuring Compliance Accelerator for use in a SQL Server Always On environment
- Installing Compliance Accelerator in a clustered environment
- Installing the Compliance Accelerator server software
- Appendix A. Ports that Compliance Accelerator uses
- Appendix B. Troubleshooting
- Appendix C. Installing and configuring the Enhanced Auditing feature
- Appendix D. Introducing Veritas Surveillance web client
Post installation steps
Install certificates
After successful installation of the audit server, the installer creates a self-signed certificate named AuditAppCert. It is recommended that the self-signed certificate on the audit server should be replaced with a valid certificate from a well-known authority.
You must export the certificate from the audit server and manually install it on the Veritas Surveillance server's trusted certificate store.
Configurations in Veritas Surveillance client
After you complete the installation of Enhanced Auditing, complete the required steps for configuring the
settings in the tab in the Veritas Surveillance client. For details, refer to the Veritas Surveillance client Help.Configurations in Veritas Surveillance
Later, you also need to perform additional Auditing settings in Veritas Surveillance. For details, refer to the Veritas Surveillance Help.