Please enter search query.
Search <book_title>...
Enterprise Vault™ Compliance Accelerator Installation Guide
Last Published:
2024-09-02
Product(s):
Enterprise Vault (15.1)
- Introducing Compliance Accelerator
- Preparing to install Compliance Accelerator
- Configuration options for Compliance Accelerator
- Prerequisites for Compliance Accelerator
- Security requirements for temporary folders
- Configuring Intelligent Review API Authentication and Authorization
- Installing Compliance Accelerator
- Installing the Compliance Accelerator server software
- Configuring Compliance Accelerator for use in a SQL Server Always On environment
- Installing Compliance Accelerator in a clustered environment
- Installing the Compliance Accelerator server software
- Appendix A. Ports that Compliance Accelerator uses
- Appendix B. Troubleshooting
- Appendix C. Installing and configuring the Enhanced Auditing feature
- Appendix D. Introducing Veritas Surveillance web client
Overview
After configuring and enabling the Enhanced Auditing feature for customers, the audit records for that customer are sent to the audit server whenever certain operations and modifications are made to modules as selected in the Audit Settings tab in Veritas Surveillance. Changes to these modules made in Veritas Surveillance, Compliance Accelerator, or both are logged. The Audit viewer tab in Veritas Surveillance lets you search and export audit records for various modules and operations at the application, department, and folder levels.
To use the Enhanced Auditing feature, you need to follow the following workflow:
- Meet the requirements and prerequisites.
- Install the Enhanced Auditing feature.
- Set the Auditing configuration options in the Configuration tab in the Veritas Surveillance client.
- Use the Audit Settings tab in Veritas Surveillance to edit the required settings for auditing.
- Use the Audit viewer tab in Veritas Surveillance to search and export the audit records.