Enterprise Vault™ Compliance Accelerator Installation Guide

Last Published:
Product(s): Enterprise Vault (15.0)
  1. Introducing Compliance Accelerator
    1.  
      Key features of Compliance Accelerator
    2.  
      About the Compliance Accelerator components
    3. Product documentation
      1.  
        White papers on the Veritas Support website
  2. Preparing to install Compliance Accelerator
    1. Configuration options for Compliance Accelerator
      1.  
        Compliance Accelerator configuration for large installations
      2.  
        Compliance Accelerator configuration for smaller installations
    2.  
      Supported versions of Enterprise Vault in Compliance Accelerator environments
    3. Prerequisites for Compliance Accelerator
      1.  
        Prerequisites for the SQL Server computer
      2.  
        Prerequisites for the Compliance Accelerator server computer
      3.  
        Prerequisites for the Enterprise Vault server computer
      4. Prerequisites for Veritas Surveillance
        1.  
          Additional requirements for Veritas Surveillance
        2.  
          Set Kerberos Trusted Delegation
    4.  
      Configuring Outlook to enable the processing of items with many attachments or many recipients
    5.  
      Setting the Windows and ASP.NET Temp folder permissions
    6. Security requirements for temporary folders
      1.  
        Granting additional users and groups access to the temporary folders
    7.  
      Disabling networking facilities that can disrupt a Compliance Accelerator environment
    8.  
      Disabling the Windows Search Service on the Compliance Accelerator server
    9.  
      Ensuring that the Windows Server service is running on the Compliance Accelerator server
    10.  
      Configuring the SQL Server Agent service
    11.  
      Assigning SQL Server roles to the Vault Service account
    12.  
      Installing and configuring the SQL full-text search indexing service
    13.  
      Verifying that Enterprise Vault expands distribution lists
    14. Configuring Intelligent Review API Authentication and Authorization
      1.  
        Setting Kerberos trusted delegation between Compliance Accelerator Servers and Compliance Accelerator Database Servers
      2.  
        Setting Kerberos trusted delegation between Compliance Accelerator Servers and Compliance Accelerator Database Servers on IP address
  3. Installing Compliance Accelerator
    1. Installing the Compliance Accelerator server software
      1.  
        Allowing Enterprise Vault to communicate with Compliance Accelerator through the Windows firewall
      2.  
        Creating the configuration database and customer databases
      3.  
        Configuring a dedicated server for Intelligent Review processing (optional deployment configuration)
      4. Configuring Compliance Accelerator for use in a SQL Server Always On environment
        1.  
          Using SQL Server Reporting Services in an Always On environment
      5. Installing Compliance Accelerator in a clustered environment
        1.  
          Configuring Compliance Accelerator for use in a Network Load Balancing cluster
      6.  
        Maximizing security in your Compliance Accelerator databases
    2.  
      Uninstalling Compliance Accelerator
  4. Appendix A. Ports that Compliance Accelerator uses
    1.  
      Default ports for Compliance Accelerator
    2.  
      Changing the ports that Compliance Accelerator uses
  5. Appendix B. Troubleshooting
    1.  
      Error messages appear in the event log when upgrading to Compliance Accelerator 15.0
    2.  
      Enterprise Vault Accelerator Manager service not created
    3.  
      Enterprise Vault Accelerator Manager service does not start
    4.  
      "Access is denied" message is displayed when you try to create a customer database on a UAC-enabled computer
    5.  
      Cannot create or upgrade Compliance Accelerator customer databases when Symantec Endpoint Protection is running
    6.  
      Error messages when the Intelligent Review (IR) API authentication and authorization fails
  6. Appendix C. Installing and configuring the Enhanced Auditing feature
    1.  
      Overview
    2.  
      Prerequisites for the Enhanced Auditing feature
    3.  
      Installing the Enhanced Auditing feature
    4.  
      Post installation steps
    5.  
      Upgrading the Enhanced Auditing setup
    6.  
      Modifying the Enhanced Auditing setup
    7.  
      Repairing the Enhanced Auditing setup
    8.  
      Uninstalling the Enhanced Auditing setup
    9.  
      Managing access from Veritas Surveillance
  7. Appendix D. Introducing Veritas Surveillance web client
    1.  
      About Veritas Surveillance
    2.  
      Feature comparison: Compliance Accelerator desktop client Vs Veritas Surveillance web client

Key features of Compliance Accelerator

Compliance Accelerator enables organizations to perform cost-effective supervisory reviews (required to follow regulatory compliance) of employee communications. Some important key features are listed below:

  • The Compliance Accelerator desktop client is replaced with the Veritas Surveillance web client

    The Compliance Accelerator desktop client, used until the 14.5 release, is discontinued. It has been entirely replaced by the more efficient web-based alternative, Veritas Surveillance. Compared to the desktop client, Veritas Surveillance, being a web-based client, offers more convenient workflows for managing departments, employees, item searches, intelligent reviews, exporting search results, and various other operations.

  • Efficient items sampling modes

    The Veritas Surveillance web client captures items that are archived from the Microsoft Exchange, Domino journal mailboxes, SMTP, and Shared Compliance Accelerator archives. Users can select their preferred any of the below-mentioned sampling mode during configuring monitoring policy when creating a department.

    • Guaranteed sampling: This is the default mode. In this mode, the application captures all items for each monitored employee throughout the day. There is no option to restrict or limit the number of items that are added to the review set.

    • Random sampling: In this mode, the application randomly selects items from each monitored employees according to the specified monitoring policy and adds these sampled items to the review set.

    • Statistical sampling: In this mode, the application selects the items that are randomly sampled in the previous 24-hours period and adds these sampled items to the review set. As a result, certain employees may have fewer captured items compared to others.

  • Deduplication of items

    This feature empowers organizations to identify and eliminate duplicates from search results, preventing their inclusion in the review set. The fingerprint mechanism is used to determine whether one item is a duplicate of another. Deduplication works within individual searches only, and does not work across multiple searches, even when conducted within the same department.

    During sampling, the duplicate items in all search types (immediate, scheduled, and guaranteed sample searches) are removed. In guaranteed sample searches, it includes randomly sampled items in the review set to make up for any shortage caused by the deduplication process.

  • Effective review process: Messages from specific employees who are exceptions can be kept apart and checked by assigned reviewers.

  • Intelligent Review

    This feature helps application to learn from the reviewer's actions of marking items as relevant or irrelevant, allowing it to intelligently capture and sample items the next time and categorize items as relevant or irrelevant before presenting then to reviewers. This way, reviewers can efficiently spend their review time by focusing more on the relevant items over irrelevant ones.

  • Secured database

    A secured SQL database stores details about monitored employees, captured items, and the review processes applied to those items.

  • Enhanced Reporting: This feature empowers organizations to enhance their reporting and analytics capabilities.

    • SSRS reports: Though the support for SSRS reports is discontinued, users can still access the previously generated SSRS reports from database.

    • OData reports: The Open Data (OData) web service enables users to retrive information from the configuration and customer databases using OData-compatible reporting tools like Microsoft Excel and PowerQuery.

    • Enhanced reports: New reporting endpoint APIs, such as Departments, Users, UserRoles, Roles, ItemMetrics, EvidenceOfReviewByDept, and EvidenceOfReviewByUser are introduced.

  • Enhanced Auditing: This feature enables users to search and export audit records for different modules and operations within Veritas Surveillance.