Enterprise Vault™ Compliance Accelerator Installation Guide
- Introducing Compliance Accelerator
- Preparing to install Compliance Accelerator
- Configuration options for Compliance Accelerator
- Prerequisites for Compliance Accelerator
- Security requirements for temporary folders
- Configuring Intelligent Review API Authentication and Authorization
- Installing Compliance Accelerator
- Installing the Compliance Accelerator server software
- Configuring Compliance Accelerator for use in a SQL Server Always On environment
- Installing Compliance Accelerator in a clustered environment
- Installing the Compliance Accelerator server software
- Appendix A. Ports that Compliance Accelerator uses
- Appendix B. Troubleshooting
- Appendix C. Installing and configuring the Enhanced Auditing feature
- Appendix D. Introducing Veritas Surveillance web client
About Veritas Surveillance
Veritas Surveillance manages monitoring, searching, retrieval, and reporting of emails and messages. It is designed to fulfill diverse regulatory requirements for supervising electronic communications.
Veritas Surveillance serves as a web-based alternative for the Compliance Accelerator desktop application. It lets organizations perform cost-effective supervisory review of their employees' communications to ensure compliance with regulatory bodies. It greatly reduces audit review time, minimizes compliance risk and increases organizational efficiency for today's global enterprises.
This guide outlines the configuration and management of your Veritas Surveillance environment, ensuring compliance with your organization's supervision needs for archived electronic communications.