Enterprise Vault™ Compliance Accelerator Installation Guide

Last Published:
Product(s): Enterprise Vault (15.1)
  1. Introducing Compliance Accelerator
    1.  
      About Compliance Accelerator desktop application-specific updates
    2. Product documentation
      1.  
        White papers on the Veritas Support website
  2. Preparing to install Compliance Accelerator
    1. Configuration options for Compliance Accelerator
      1.  
        Compliance Accelerator configuration for large installations
      2.  
        Compliance Accelerator configuration for smaller installations
    2.  
      Supported versions of Enterprise Vault in Compliance Accelerator environments
    3. Prerequisites for Compliance Accelerator
      1.  
        Prerequisites for the SQL Server computer
      2.  
        Prerequisites for the Compliance Accelerator server computer
      3.  
        Prerequisites for the Enterprise Vault server computer
      4. Prerequisites for Veritas Surveillance
        1.  
          Additional requirements for Veritas Surveillance
        2.  
          Set Kerberos Trusted Delegation
    4.  
      Configuring Outlook to enable the processing of items with many attachments or many recipients
    5.  
      Setting the Windows and ASP.NET Temp folder permissions
    6. Security requirements for temporary folders
      1.  
        Granting additional users and groups access to the temporary folders
    7.  
      Disabling networking facilities that can disrupt a Compliance Accelerator environment
    8.  
      Disabling the Windows Search Service on the Compliance Accelerator server
    9.  
      Ensuring that the Windows Server service is running on the Compliance Accelerator server
    10.  
      Configuring the SQL Server Agent service
    11.  
      Assigning SQL Server roles to the Vault Service account
    12.  
      Installing and configuring the SQL full-text search indexing service
    13.  
      Verifying that Enterprise Vault expands distribution lists
    14. Configuring Intelligent Review API Authentication and Authorization
      1.  
        Setting Kerberos trusted delegation between Compliance Accelerator Servers and Compliance Accelerator Database Servers
      2.  
        Setting Kerberos trusted delegation between Compliance Accelerator Servers and Compliance Accelerator Database Servers on IP address
  3. Installing Compliance Accelerator
    1. Installing the Compliance Accelerator server software
      1.  
        Allowing Enterprise Vault to communicate with Compliance Accelerator through the Windows firewall
      2.  
        Creating the configuration database and customer databases
      3.  
        Configuring a dedicated server for Intelligent Review processing (optional deployment configuration)
      4. Configuring Compliance Accelerator for use in a SQL Server Always On environment
        1.  
          Using SQL Server Reporting Services in an Always On environment
      5. Installing Compliance Accelerator in a clustered environment
        1.  
          Configuring Compliance Accelerator for use in a Network Load Balancing cluster
      6.  
        Maximizing security in your Compliance Accelerator databases
    2.  
      Uninstalling Compliance Accelerator
  4. Appendix A. Ports that Compliance Accelerator uses
    1.  
      Default ports for Compliance Accelerator
    2.  
      Changing the ports that Compliance Accelerator uses
  5. Appendix B. Troubleshooting
    1.  
      Error messages appear in the event log when upgrading to Compliance Accelerator 15.1
    2.  
      Enterprise Vault Accelerator Manager service not created
    3.  
      Enterprise Vault Accelerator Manager service does not start
    4.  
      "Access is denied" message is displayed when you try to create a customer database on a UAC-enabled computer
    5.  
      Cannot create or upgrade Compliance Accelerator customer databases when Symantec Endpoint Protection is running
    6.  
      Error messages when the Intelligent Review (IR) API authentication and authorization fails
  6. Appendix C. Installing and configuring the Enhanced Auditing feature
    1.  
      Overview
    2.  
      Prerequisites for the Enhanced Auditing feature
    3.  
      Installing the Enhanced Auditing feature
    4.  
      Post installation steps
    5.  
      Upgrading the Enhanced Auditing setup
    6.  
      Modifying the Enhanced Auditing setup
    7.  
      Repairing the Enhanced Auditing setup
    8.  
      Uninstalling the Enhanced Auditing setup
    9.  
      Managing access from Veritas Surveillance
  7. Appendix D. Introducing Veritas Surveillance web client
    1.  
      About Veritas Surveillance
    2.  
      Feature comparison: Compliance Accelerator desktop application Vs Veritas Surveillance web application

Installing the Compliance Accelerator server software

Follow the instructions in this section to perform a first-time installation of the Compliance Accelerator server software. If you want to upgrade an existing Compliance Accelerator installation, see the CAUpgradeInstructions file.

Before you proceed, note the following:

  • You must install this software as the Vault Service account.

  • Installing this software on a computer on which you have also installed the Discovery Accelerator server software is not supported.

  • You can configure Compliance Accelerator for use in a Network Load Balancing cluster. However, installing the software on the nodes in other types of clusters is not supported.

    See Installing Compliance Accelerator in a clustered environment.

To install the Compliance Accelerator server software

  1. Load the release media, and then do one of the following:

    • When the Install Launcher starts, follow the links to install the Compliance Accelerator server software.

    • In Windows Explorer, browse to the Veritas Enterprise Vault Compliance Accelerator\Server folder, and then run setup.exe.

      The setup.exe program launches the Windows Installer (.msi) package that is in the same folder with elevated privileges. This is necessary to enable the installation to complete all of its processes.

  2. On the Welcome screen, click Next.

    The installer navigates you to the Settings section, where you can configure the values required for the Compliance Accelerator and the Veritas Surveillance installation.

  3. On the Prerequisites screen, scroll up and down to view the list of hardware and software required for the Compliance Accelerator and the Veritas Surveillance installation.

    If you meet the listed prerequisites, select the I have read and met the above prerequisites check box and then click Next.

  4. On the Prerequisite Status screen, the installer performs a check for all required software. When the prerequisite check is completed, click Next.
  5. On the End-User License Agreement screen, read the Veritas Software License Agreement. If you agree the terms, select the I accept the terms in the License Agreement check box and then click Next.
  6. On the Choose Setup Type screen, choose between the following setup types:

    Typical

    Lets you install all the components. This option is recommended for most users.

    After you click Typical, The default path is displayed. Ensure that the path to the folder where you want to install Compliance Accelerator is appropriate. If not, click Browse to select path of the appropriate folder.

    Custom

    Lets you select or remove the components as per your requirement.

    Note:

    It is recommended to install the Compliance Accelerator website, as it provides functionality for some of the Compliance Accelerator reports.

    Note:

    While configuring Veritas Surveillance, specify details, such as Server Alias, Internal Port, and Website Port and ensure that you meet the additional prerequisites as needed.

  7. On the Accelerator Service Account Login screen, provide the accelerator service account details such as Domain, Username, and Password. Click Next.
  8. On the Intelligent Review Configuration screen, specify the following details, and click Next.

    Server Alias

    DNS Alias name or machine name for the Compliance Accelerator server.

    Port

    Port for the IRAPIEndPoint Website. By default, its value is 449. If required, user can change it to valid available port number.

    Holding Folder path

    A directory where files of the Intelligent Review features will be stored temporarily.

  9. Click Next.
  10. On the Ready to install screen, click Install to start Compliance Accelerator installation.
  11. If you have chosen to install the Accelerator Manager service then, when the installation program has finished, select the option to display the Enterprise Vault Accelerator Manager website. Then you can create the configuration database and customer databases.

    The installation program automatically opens the Accelerator Manager website with administrator privileges if you have installed Compliance Accelerator on a server in which User Account Control (UAC) is enabled. (This is a requirement when accessing the website in such environments.) If UAC is not enabled, a Run As dialog box may prompt you for the name and password of the user account under which to access the website. Enter the details of the Vault Service account with which you manage your Enterprise Vault server.

  12. If you have chosen to install the Veritas Surveillance, then after installation, select the option to restart the Enterprise Vault Accelerator Manager service (EVAMS) and Internet Information Services (IIS). You can use the Services snap-in to Microsoft Management Console to restart the Enterprise Vault Accelerator Manager service. For IIS, you should first stop EVAMS, run the iisreset command in an Administration Command Prompt, and then start EVAMS.
  13. To ensure that all the endpoints are encrypted, Compliance Accelerator generates self-signed certificates for the IRAPIEndPoint web application during configuration. It is recommended to replace such self-signed certificates with certificates signed by well-known authorities. Import these certificates into all Enterprise Vault Storage servers and then add these certificates to the Trusted Root Certification Authorities store. If there are multiple Compliance Accelerator servers, import the certificates from all these servers.
  14. To ensure that all the endpoints are encrypted, Compliance Accelerator generates self-signed certificates for the default websites during configuration. It is recommended to replace such self-signed certificates with certificates signed by well-known authorities.