Enterprise Vault™ Compliance Accelerator Installation Guide

Last Published:
Product(s): Enterprise Vault (15.1)
  1. Introducing Compliance Accelerator
    1.  
      About Compliance Accelerator desktop application-specific updates
    2. Product documentation
      1.  
        White papers on the Veritas Support website
  2. Preparing to install Compliance Accelerator
    1. Configuration options for Compliance Accelerator
      1.  
        Compliance Accelerator configuration for large installations
      2.  
        Compliance Accelerator configuration for smaller installations
    2.  
      Supported versions of Enterprise Vault in Compliance Accelerator environments
    3. Prerequisites for Compliance Accelerator
      1.  
        Prerequisites for the SQL Server computer
      2.  
        Prerequisites for the Compliance Accelerator server computer
      3.  
        Prerequisites for the Enterprise Vault server computer
      4. Prerequisites for Veritas Surveillance
        1.  
          Additional requirements for Veritas Surveillance
        2.  
          Set Kerberos Trusted Delegation
    4.  
      Configuring Outlook to enable the processing of items with many attachments or many recipients
    5.  
      Setting the Windows and ASP.NET Temp folder permissions
    6. Security requirements for temporary folders
      1.  
        Granting additional users and groups access to the temporary folders
    7.  
      Disabling networking facilities that can disrupt a Compliance Accelerator environment
    8.  
      Disabling the Windows Search Service on the Compliance Accelerator server
    9.  
      Ensuring that the Windows Server service is running on the Compliance Accelerator server
    10.  
      Configuring the SQL Server Agent service
    11.  
      Assigning SQL Server roles to the Vault Service account
    12.  
      Installing and configuring the SQL full-text search indexing service
    13.  
      Verifying that Enterprise Vault expands distribution lists
    14. Configuring Intelligent Review API Authentication and Authorization
      1.  
        Setting Kerberos trusted delegation between Compliance Accelerator Servers and Compliance Accelerator Database Servers
      2.  
        Setting Kerberos trusted delegation between Compliance Accelerator Servers and Compliance Accelerator Database Servers on IP address
  3. Installing Compliance Accelerator
    1. Installing the Compliance Accelerator server software
      1.  
        Allowing Enterprise Vault to communicate with Compliance Accelerator through the Windows firewall
      2.  
        Creating the configuration database and customer databases
      3.  
        Configuring a dedicated server for Intelligent Review processing (optional deployment configuration)
      4. Configuring Compliance Accelerator for use in a SQL Server Always On environment
        1.  
          Using SQL Server Reporting Services in an Always On environment
      5. Installing Compliance Accelerator in a clustered environment
        1.  
          Configuring Compliance Accelerator for use in a Network Load Balancing cluster
      6.  
        Maximizing security in your Compliance Accelerator databases
    2.  
      Uninstalling Compliance Accelerator
  4. Appendix A. Ports that Compliance Accelerator uses
    1.  
      Default ports for Compliance Accelerator
    2.  
      Changing the ports that Compliance Accelerator uses
  5. Appendix B. Troubleshooting
    1.  
      Error messages appear in the event log when upgrading to Compliance Accelerator 15.1
    2.  
      Enterprise Vault Accelerator Manager service not created
    3.  
      Enterprise Vault Accelerator Manager service does not start
    4.  
      "Access is denied" message is displayed when you try to create a customer database on a UAC-enabled computer
    5.  
      Cannot create or upgrade Compliance Accelerator customer databases when Symantec Endpoint Protection is running
    6.  
      Error messages when the Intelligent Review (IR) API authentication and authorization fails
  6. Appendix C. Installing and configuring the Enhanced Auditing feature
    1.  
      Overview
    2.  
      Prerequisites for the Enhanced Auditing feature
    3.  
      Installing the Enhanced Auditing feature
    4.  
      Post installation steps
    5.  
      Upgrading the Enhanced Auditing setup
    6.  
      Modifying the Enhanced Auditing setup
    7.  
      Repairing the Enhanced Auditing setup
    8.  
      Uninstalling the Enhanced Auditing setup
    9.  
      Managing access from Veritas Surveillance
  7. Appendix D. Introducing Veritas Surveillance web client
    1.  
      About Veritas Surveillance
    2.  
      Feature comparison: Compliance Accelerator desktop application Vs Veritas Surveillance web application

Feature comparison: Compliance Accelerator desktop application Vs Veritas Surveillance web application

If you previously used the Compliance Accelerator desktop application and would like to examine the features of both the Compliance Accelerator desktop application and the Veritas Surveillance web application, refer to the table provided below.

Feature

Compliance Accelerator

Veritas Surveillance

Details

Only server installation required

No

Yes

Accessing Veritas Surveillance does not require application installation; server installation alone is sufficient.

Windows-based Authentication and Authorization

Yes

Yes

 

Dashboard

Dashboard: Summary

Yes

Yes

 

Dashboard: Summary: Pin/Unpin Departments

No

Yes

 

Dashboard: Task

Yes

No

Links are provided to perform some tasks.

Departments

Department: User Summary

Yes

Yes

 

Department: User Action

Yes

Yes

 

Department: Department Attributes

Yes

No

 

Department: Role assignment

Yes

Yes

 

Department: Searches

Yes

Yes

 

Department: Searches: Custom Attributes

No

Yes

 

Department: Monitoring Employees

Yes

Yes

 

Department: Archives

Yes

Yes

 

Department: Export

Yes

Yes

 

Department: Hotwords

Yes

Yes

 

Department: Labels

No

Yes

 

Department: Review Comments

No

Yes

 

Research Folders

Yes

No

 

Employees

Yes

Yes

Profile creation and management

Reports

Yes

Partially yes

 

Monitor

Yes

Yes

 

Application

Application: Roles

Yes

Yes

 

Application: Roles Assignments

Yes

Yes

 

Application: Hotwords

Yes

Yes

 

Application: Label

No

Yes

 

Application: Reviewing Comments

Yes

Yes

 

Application: Searches

Yes

Yes

 

Application: Archives

Yes

Yes

 

Review

Review: Review Pane Actions

Yes

Yes

Copy action is not available in Veritas Surveillance.

Review: Advanced Filter

No

Yes

Filter on Author/Domain and Subject is provided.

Review: Filters

Yes

Yes

 

Review: Filters: Sentiment Score

No

Yes

 

Review: Delegate review (on behalf of mode)

Yes

No

 

Review: Printable View

Yes

No

 

Review: Bulk Review

Yes

Yes

 

Review: Review Status

Yes

Yes

 

Review: Research folder review

Yes

Yes

Some actions, such as Escalate, Commit, and Copy are not available in Veritas Surveillance.

Review: Hit highlight navigation for Hotwords

Yes

Yes

 

Review: Labels

No

Yes

 

Review: Review Comments

No

Yes

 

Review: Hit highlight navigation for Tags

No

Yes

 

Configuration

Configuration: Search Schedules

Yes

Yes

 

Configuration: Reviewing status

Yes

No

 

Configuration: Import configuration

Yes

No

 

Configuration: Account Information

Yes

No

 

Configuration: Directory Mappings

Yes

No

 

Configuration: Department partitions, Attributes

Yes

No

 

Configuration: Message Types

Yes

No

 

Configuration: Settings

Yes

No

 

Configuration: Audit settings

No

Yes

Modules can be enabled or disabled for auditing purposes.

Enhanced Auditing

Yes

Yes

 

Audit Viewer

No

Yes

The operations and modifications made to any modules are shown in the Audit Settings.

Hotword analysis and statistics

Yes

Yes

Hotword analysis is done, and filters and counts are updated to view the statistics.

Tag (Policy) analysis and statistics

No

Yes

Tag (Policy) analysis is done, and counts are updated to view the statistics.

Custom attributes

Yes

Yes

 

Intelligent Review

Yes

Yes

Advanced Intelligent Review

No

Yes

The relevance score and the reasoning behind classifying the item as Unreviewed Relevant or Unreviewed Irrelevant are provided. Content snippets are added to train the learning model.

Microsoft Teams Chat and Channel support

No

Yes

 

Audio-Video Transcript support

No

Yes

 

Chinese Wall security

Yes

No

 

Localization of UI and Documentation

Yes

No

Compliance Accelerator user interface and user documentation are translated into Japanese, Chinese Simplified, and Chinese Traditional languages for localization purposes.