Enterprise Vault™ Compliance Accelerator Installation Guide

Last Published:
Product(s): Enterprise Vault (15.1)
  1. Introducing Compliance Accelerator
    1.  
      About Compliance Accelerator desktop application-specific updates
    2. Product documentation
      1.  
        White papers on the Veritas Support website
  2. Preparing to install Compliance Accelerator
    1. Configuration options for Compliance Accelerator
      1.  
        Compliance Accelerator configuration for large installations
      2.  
        Compliance Accelerator configuration for smaller installations
    2.  
      Supported versions of Enterprise Vault in Compliance Accelerator environments
    3. Prerequisites for Compliance Accelerator
      1.  
        Prerequisites for the SQL Server computer
      2.  
        Prerequisites for the Compliance Accelerator server computer
      3.  
        Prerequisites for the Enterprise Vault server computer
      4. Prerequisites for Veritas Surveillance
        1.  
          Additional requirements for Veritas Surveillance
        2.  
          Set Kerberos Trusted Delegation
    4.  
      Configuring Outlook to enable the processing of items with many attachments or many recipients
    5.  
      Setting the Windows and ASP.NET Temp folder permissions
    6. Security requirements for temporary folders
      1.  
        Granting additional users and groups access to the temporary folders
    7.  
      Disabling networking facilities that can disrupt a Compliance Accelerator environment
    8.  
      Disabling the Windows Search Service on the Compliance Accelerator server
    9.  
      Ensuring that the Windows Server service is running on the Compliance Accelerator server
    10.  
      Configuring the SQL Server Agent service
    11.  
      Assigning SQL Server roles to the Vault Service account
    12.  
      Installing and configuring the SQL full-text search indexing service
    13.  
      Verifying that Enterprise Vault expands distribution lists
    14. Configuring Intelligent Review API Authentication and Authorization
      1.  
        Setting Kerberos trusted delegation between Compliance Accelerator Servers and Compliance Accelerator Database Servers
      2.  
        Setting Kerberos trusted delegation between Compliance Accelerator Servers and Compliance Accelerator Database Servers on IP address
  3. Installing Compliance Accelerator
    1. Installing the Compliance Accelerator server software
      1.  
        Allowing Enterprise Vault to communicate with Compliance Accelerator through the Windows firewall
      2.  
        Creating the configuration database and customer databases
      3.  
        Configuring a dedicated server for Intelligent Review processing (optional deployment configuration)
      4. Configuring Compliance Accelerator for use in a SQL Server Always On environment
        1.  
          Using SQL Server Reporting Services in an Always On environment
      5. Installing Compliance Accelerator in a clustered environment
        1.  
          Configuring Compliance Accelerator for use in a Network Load Balancing cluster
      6.  
        Maximizing security in your Compliance Accelerator databases
    2.  
      Uninstalling Compliance Accelerator
  4. Appendix A. Ports that Compliance Accelerator uses
    1.  
      Default ports for Compliance Accelerator
    2.  
      Changing the ports that Compliance Accelerator uses
  5. Appendix B. Troubleshooting
    1.  
      Error messages appear in the event log when upgrading to Compliance Accelerator 15.1
    2.  
      Enterprise Vault Accelerator Manager service not created
    3.  
      Enterprise Vault Accelerator Manager service does not start
    4.  
      "Access is denied" message is displayed when you try to create a customer database on a UAC-enabled computer
    5.  
      Cannot create or upgrade Compliance Accelerator customer databases when Symantec Endpoint Protection is running
    6.  
      Error messages when the Intelligent Review (IR) API authentication and authorization fails
  6. Appendix C. Installing and configuring the Enhanced Auditing feature
    1.  
      Overview
    2.  
      Prerequisites for the Enhanced Auditing feature
    3.  
      Installing the Enhanced Auditing feature
    4.  
      Post installation steps
    5.  
      Upgrading the Enhanced Auditing setup
    6.  
      Modifying the Enhanced Auditing setup
    7.  
      Repairing the Enhanced Auditing setup
    8.  
      Uninstalling the Enhanced Auditing setup
    9.  
      Managing access from Veritas Surveillance
  7. Appendix D. Introducing Veritas Surveillance web client
    1.  
      About Veritas Surveillance
    2.  
      Feature comparison: Compliance Accelerator desktop application Vs Veritas Surveillance web application

Prerequisites for the Compliance Accelerator server computer

Table: Required software for Compliance Accelerator server installation lists the software items that you must install and configure on the computer that is to run the Compliance Accelerator server software.

Table: Required software for Compliance Accelerator server installation

Item

Notes

.NET Core

You require the following versions:

See the Links To Related Software folder in the distribution media.

.NET Framework

You require .NET Framework 4.7.2.

See the Links To Related Software folder in the distribution media.

Enterprise Vault

If Compliance Accelerator is installed on a separate computer from Enterprise Vault, you must install the Enterprise Vault software on the Compliance Accelerator computer.

You require an 15.1 version of one of the following:

  • Enterprise Vault Services.

  • Enterprise Vault API Runtime.

See Supported versions of Enterprise Vault in Compliance Accelerator environments.

There is no need to configure Enterprise Vault after you have installed it on your Compliance Accelerator server computer; do not run the Enterprise Vault configuration wizard. In addition, if the Enterprise Vault Admin service is running on your Compliance Accelerator server computer, we recommend that you stop it and set its startup type to Disabled.

To search on content with Compliance Accelerator, set indexing on the Enterprise Vault archives to full.

Internet Information Services (IIS)

You require IIS 8.0 or later with ASP.NET, IIS 6.0 Management Compatibility, and IP and domain restrictions (for the Auditing Websites).

Node.js

You require Node.js (x64) version 14.17.3 or later.

See the Links To Related Software folder in the distribution media.

Notes client

You require version 9.0 or later of the Notes client so that client users can export Domino items.

Install the client in single-user mode, using the account under which the Accelerator Manager service runs.

Outlook

You require Microsoft Outlook 2016, 2019, 2021, and Outlook for M365.

Outlook for M365 (32-bit supported on Enterprise Vault/Compliance Accelerator Server)

Outlook for M365 (64-bit supported on Windows 10/11 Clients)

Add the AttachmentMax and RecipientMax values to the registry on the Compliance Accelerator server to avoid problems when processing items that have many attachments or many recipients.

See Configuring Outlook to enable the processing of items with many attachments or many recipients.

Visual C++ Redistributable

You require the Microsoft Visual C++ 2015-2019 or later Redistributable (x86).

See the Links To Related Software folder in the distribution media.

Web browser

You require any of the following browsers:

  • Mozilla Firefox

  • Microsoft Edge

  • Google Chrome

For optimum results, do the following:

  • Configure the privacy settings in the browser to allow cookies.

  • Turn off any pop-up blockers.

  • Ensure that the advanced option Play animations in webpages is selected.

    In Internet Explorer, click Internet Options on the Tools menu. Then, on the Advanced tab, locate the required option in the Multimedia category.

Windows

You require any of the Windows 2016, 2019, and 2022 server.

We recommend that you do the following:

For the best results, we recommend that you install the Compliance Accelerator server software on a computer that has the following:

  • At least 16 GB of memory.

  • Minimum 10 GB space must be available on the hard disk where the Intelligent Review Holding Folder is located.

  • Sufficient hard drive space to accommodate the searches and export runs that you expect to undertake.

    All transaction requests from Veritas Surveillance web application to the Enterprise Vault and Compliance Accelerator servers use the Temp folder of the Vault Service account for temporary storage. Therefore, you must ensure that this folder has sufficient free space to handle large Compliance Accelerator searches and export runs. On both the Compliance Accelerator and Enterprise Vault servers, the Vault Service account's Temp folder must be on a drive that has a minimum of 40 GB of free space. However, 80 GB of free space is preferable.

    Exclude the Vault Service account's Temp folders from antivirus scanning.

  • Multiple hard drives. For example, you might use drive C for the operating system, drive D for the CD or DVD drive, drive E for the Temp folder of the Vault Service account, and drive F for the export output folder. You might split the Windows paging file across drives E and F.

  • Configure Intelligent Review API Authentication and Authorization. See Configuring Intelligent Review API Authentication and Authorization.