Please enter search query.
Search <book_title>...
Veritas Surveillance User Guide
Last Published:
2025-04-01
Product(s):
Veritas Alta Surveillance (1.0)
- Introducing Veritas Surveillance
- Getting started
- Working with dashboard widgets
- Managing employees and employee groups
- Managing departments
- Managing reviewer assignment
- Managing research folders
- Managing department users
- Managing department-level archives
- Managing department-level searches
- Managing department-specific hotword sets
- Managing department-specific labels
- Managing department-specific review comments
- Viewing employees associated with departments
- Managing users, roles, and permissions
- Managing application-level archives
- Managing application-level searches
- Managing application-specific hotword sets
- Managing application-specific labels
- Managing application-specific review comments
- Managing search schedules
- Managing export operations
- Managing reviews
- Working with reports
- Enhanced reporting
- Departments API
- Users API
- UserRoles API
- Roles API
- Classification Tags API
- Labels API
- Searches API
- ItemMetrics API
- ReviewerMapping API
- MonitoredEmployees API
- Evidence of Review API
- Item Classification Metrics API
- Item Label Metrics API
- Managing Power BI templates for reporting APIs
- TEMPLATE- Item Label Metrics By Employee - View Report Data
- Managing application wide audit settings
- Working with audit viewer
- Managing application wide review setting
About Veritas Surveillance system security
Veritas Surveillance provides role-based permissions to users. As every role has limited permissions, functions like configuration, review, access control, escalation, and export are always performed by an authorized user.
Veritas Surveillance provides several security features that help ensure the integrity of your archived items. For detailed instructions, see the Enterprise Vault™ Compliance Accelerator Installation Guide.
If you are accessing Veritas Surveillance from a computer other than your Compliance Accelerator server, you need to import the certificate on that computer and add it to the Trusted Root Certification Authorities store. You also need to configure HTTPS on that computer.