Enterprise Vault™ Compliance Accelerator Administrator's Guide

Last Published:
Product(s): Enterprise Vault (15.1)
  1. Overview and latest updates
    1.  
      About Compliance Accelerator desktop application-specific updates
  2. Understanding Veritas Surveillance
    1.  
      About Veritas Surveillance
    2.  
      Routine operations executed with Veritas Surveillance
    3.  
      About Veritas Surveillance system security
    4.  
      Feature comparison: Compliance Accelerator desktop application Vs Veritas Surveillance web application
  3. Configuring Compliance Accelerator Desktop Client
    1.  
      Customizing the reviewing action statuses
    2. Importing configuration data from an XML file
      1.  
        About importing configuration data
      2.  
        Sample XML files
      3.  
        Format of the Dataload.xml file
      4.  
        Importing the configuration data
    3.  
      Specifying the Windows domains with which to synchronize employee details
    4.  
      Mapping employee properties to Active Directory or Domino directory attributes
    5. Grouping departments into partitions
      1.  
        Creating department partitions
      2.  
        Editing department partitions
      3.  
        Deleting department partitions
    6.  
      Setting up department attributes
    7.  
      Setting up custom message types
    8. Setting Compliance Accelerator system configuration options
      1.  
        Ad Hoc Searches configuration options
      2.  
        Diagnostics configuration options
      3.  
        Document Conversion configuration options
      4.  
        Export/production configuration options
      5.  
        General configuration options
      6.  
        Home Page configuration options
      7.  
        Hotword Analysis configuration options
      8.  
        Item Prefetch Cache configuration options
      9.  
        Item Prefetch Cache (Advanced) configuration options
      10.  
        Policy Integration configuration options
      11.  
        Profile Synchronization configuration options
      12.  
        Random Capture configuration options
      13.  
        Reviewing configuration options
      14.  
        Search configuration options
      15.  
        Security configuration options
      16.  
        System configuration options
      17.  
        Vault Directory Synchronization configuration options
  4. Creating and viewing reports
    1.  
      About the Compliance Accelerator reports
    2.  
      Accessing data through the Microsoft SQL Server Reporting Services (SSRS)
    3. Enhanced reporting
      1.  
        Configuring a reporting endpoint
      2.  
        Authentication
      3. Departments API
        1.  
          Departments - List
      4. Roles API
        1.  
          Roles - List
        2.  
          Roles - List by filters
      5. Users API
        1.  
          Users - List
      6. UserRoles API
        1.  
          UserRoles - List by filters
      7. ItemMetrics API
        1.  
          ItemMetrics - List
        2.  
          ItemMetrics - List by filter
      8. Evidence of Review by Department API
        1.  
          EvidenceOfReviewByDept - List by filter
      9. Evidence of Review by User API
        1.  
          EvidenceOfReviewByUser - List by filter
      10.  
        Supported OData query options
      11.  
        Supported reporting endpoint API filters and their values
      12.  
        Responses
    4. Accessing reports through the OData web service
      1.  
        Available Compliance Accelerator datasets
      2.  
        Accessing the Compliance Accelerator datasets
      3.  
        Using the OData service with Microsoft Excel
      4.  
        Using the OData service with Microsoft SQL Server Reporting Services (SSRS)
    5.  
      Configuring a Power BI template for reporting
  5. Appendix A. Troubleshooting
    1.  
      Veritas Surveillance user interface user interface is not displayed properly in non-English environment
    2.  
      Issues with the random sampling of items
    3.  
      Display issues when you open a Compliance Accelerator website in Internet Explorer 10 or later
    4.  
      Vault stores not displayed in the Veritas Surveillance web client
    5.  
      TNEF-encoded attachments to Internet Mail (.eml) messages may not be readable after you export the messages from a review set
    6.  
      Synchronization errors after you rename the SQL Server computer
    7.  
      Performance counter errors when the Accelerator Manager service starts
    8.  
      SQL Service Broker warning when restoring a customer database to a different server
    9.  
      Error messages when the Intelligent Review (IR) API authentication and authorization fails
    10.  
      Known issues after enabling FIPS

Security configuration options

Use these settings to implement Chinese walls security restrictions on what users can access in Compliance Accelerator.

A Chinese wall is a metaphor used to refer to the practice of ensuring that different parts of an organization are kept apart so that information does not circulate freely and to prevent conflicts of interest. By implementing Chinese walls, you can stop users in one part of your organization from giving access to departments and folders to users in another part of the organization.

Bypass Department Users Permissions check when removing all roles

Lets users who do not have the Manage Department User permission remove Department Users from departments.

Enable Chinese Wall Department Users

Prevents users from being assigned to roles in a department unless they have first been assigned to the Department User role in that department.

Use SQL Server SysAdmin Server Role for Schedules

When selected, makes the SQL Server sysadmin logon the creator and owner of Compliance Accelerator search schedules.

If you want to lock down your SQL Server instance, clear this setting and consult the following article on the Veritas Support website for further instructions:

https://www.veritas.com/docs/100038151