Enterprise Vault™ Compliance Accelerator Installation Guide
- Introducing Compliance Accelerator
- Preparing to install Compliance Accelerator
- Configuration options for Compliance Accelerator
- Prerequisites for Compliance Accelerator
- Security requirements for temporary folders
- Configuring Intelligent Review API Authentication and Authorization
- Installing Compliance Accelerator
- Installing the Compliance Accelerator server software
- Configuring Compliance Accelerator for use in a SQL Server Always On environment
- Installing Compliance Accelerator in a clustered environment
- Installing the Compliance Accelerator server software
- Appendix A. Ports that Compliance Accelerator uses
- Appendix B. Troubleshooting
- Appendix C. Installing and configuring the Enhanced Auditing feature
- Appendix D. Introducing Veritas Surveillance web client
Installing the Compliance Accelerator server software
Follow the instructions in this section to perform a first-time installation of the Compliance Accelerator server software. If you want to upgrade an existing Compliance Accelerator installation, see the CAUpgradeInstructions
file.
Before you proceed, note the following:
You must install this software as the Vault Service account.
Installing this software on a computer on which you have also installed the Discovery Accelerator server software is not supported.
You can configure Compliance Accelerator for use in a Network Load Balancing cluster. However, installing the software on the nodes in other types of clusters is not supported.
See Installing Compliance Accelerator in a clustered environment.
To install the Compliance Accelerator server software
Load the release media, and then do one of the following:
When the Install Launcher starts, follow the links to install the Compliance Accelerator server software.
In Windows Explorer, browse to the
Veritas Enterprise Vault Compliance Accelerator\Server
folder, and then runsetup.exe
.The
setup.exe
program launches the Windows Installer (.msi
) package that is in the same folder with elevated privileges. This is necessary to enable the installation to complete all of its processes.
- On the Welcome screen, click Next.
The installer navigates you to the Settings section, where you can configure the values required for the Compliance Accelerator and the Veritas Surveillance installation.
- On the Prerequisites screen, scroll up and down to view the list of hardware and software required for the Compliance Accelerator and the Veritas Surveillance installation.
If you meet the listed prerequisites, select the I have read and met the above prerequisites check box and then click Next.
- On the Prerequisite Status screen, the installer performs a check for all required software. When the prerequisite check is completed, click Next.
- On the End-User License Agreement screen, read the Veritas Software License Agreement. If you agree the terms, select the I accept the terms in the License Agreement check box and then click Next.
- On the Choose Setup Type screen, choose between the following setup types:
Typical
Lets you install all the components. This option is recommended for most users.
After you click Typical, The default path is displayed. Ensure that the path to the folder where you want to install Compliance Accelerator is appropriate. If not, click Browse to select path of the appropriate folder.
Custom
Lets you select or remove the components as per your requirement.
Note:
It is recommended to install the Compliance Accelerator website, as it provides functionality for some of the Compliance Accelerator reports.
Note:
While configuring Veritas Surveillance, specify details, such as Server Alias, Internal Port, and Website Port and ensure that you meet the additional prerequisites as needed.
- On the Accelerator Service Account Login screen, provide the accelerator service account details such as Domain, Username, and Password. Click Next.
- On the Intelligent Review Configuration screen, specify the following details, and click Next.
Server Alias
DNS Alias name or machine name for the Compliance Accelerator server.
Port
Port for the IRAPIEndPoint Website. By default, its value is 449. If required, user can change it to valid available port number.
Holding Folder path
A directory where files of the Intelligent Review features will be stored temporarily.
- Click Next.
- On the Ready to install screen, click Install to start Compliance Accelerator installation.
- If you have chosen to install the Accelerator Manager service then, when the installation program has finished, select the option to display the Enterprise Vault Accelerator Manager website. Then you can create the configuration database and customer databases.
The installation program automatically opens the Accelerator Manager website with administrator privileges if you have installed Compliance Accelerator on a server in which User Account Control (UAC) is enabled. (This is a requirement when accessing the website in such environments.) If UAC is not enabled, a Run As dialog box may prompt you for the name and password of the user account under which to access the website. Enter the details of the Vault Service account with which you manage your Enterprise Vault server.
- If you have chosen to install the Veritas Surveillance, then after installation, select the option to restart the Enterprise Vault Accelerator Manager service (EVAMS) and Internet Information Services (IIS). You can use the Services snap-in to Microsoft Management Console to restart the Enterprise Vault Accelerator Manager service. For IIS, you should first stop EVAMS, run the iisreset command in an Administration Command Prompt, and then start EVAMS.
- To ensure that all the endpoints are encrypted, Compliance Accelerator generates self-signed certificates for the IRAPIEndPoint web application during configuration. It is recommended to replace such self-signed certificates with certificates signed by well-known authorities. Import these certificates into all Enterprise Vault Storage servers and then add these certificates to the Trusted Root Certification Authorities store. If there are multiple Compliance Accelerator servers, import the certificates from all these servers.
- To ensure that all the endpoints are encrypted, Compliance Accelerator generates self-signed certificates for the default websites during configuration. It is recommended to replace such self-signed certificates with certificates signed by well-known authorities.
More Information