Please enter search query.
Search <book_title>...
Veritas™ Surveillance User Guide
Last Published:
2024-09-26
Product(s):
Veritas Alta Surveillance (1.0)
- Introducing Veritas Surveillance
- Getting started
- Working with dashboard widgets
- Managing employees and employee groups
- Managing departments
- Managing department users
- Managing department-level archives
- Managing department-level searches
- Managing department-specific hotword sets
- Managing department-specific labels
- Managing department-specific review comments
- Viewing employees associated with departments
- Managing users, roles, and permissions
- Managing application-level archives
- Managing application-level searches
- Managing application-specific hotword sets
- Managing application-specific labels
- Managing application-specific review comments
- Managing search schedules
- Managing export operations
- Managing reviews
- Working with reports
- Enhanced reporting
- Departments API
- Roles API
- Users API
- UserRoles API
- ItemMetrics API
- ReviewerMapping API
- MonitoredEmployees API
- Evidence of Review API
- Managing Power BI templates for reporting APIs
- Managing Audit Settings
- Working with Audit viewer
About Veritas Surveillance system security
Veritas Surveillance provides role-based permissions to users. As every role has limited permissions, functions like configuration, review, access control, escalation, and export are always performed by an authorized user.
Veritas Surveillance provides several security features that help ensure the integrity of your archived items. For detailed instructions, see the Enterprise Vault™ Compliance Accelerator Installation Guide.
If you are accessing Veritas Surveillance from a computer other than your Compliance Accelerator server, you need to import the certificate on that computer and add it to the Trusted Root Certification Authorities store. You also need to configure HTTPS on that computer.