Please enter search query.
Search <book_title>...
Enterprise Vault™ Compliance Accelerator Installation Guide
Last Published:
2024-09-02
Product(s):
Enterprise Vault (15.1)
- Introducing Compliance Accelerator
- Preparing to install Compliance Accelerator
- Configuration options for Compliance Accelerator
- Prerequisites for Compliance Accelerator
- Security requirements for temporary folders
- Configuring Intelligent Review API Authentication and Authorization
- Installing Compliance Accelerator
- Installing the Compliance Accelerator server software
- Configuring Compliance Accelerator for use in a SQL Server Always On environment
- Installing Compliance Accelerator in a clustered environment
- Installing the Compliance Accelerator server software
- Appendix A. Ports that Compliance Accelerator uses
- Appendix B. Troubleshooting
- Appendix C. Installing and configuring the Enhanced Auditing feature
- Appendix D. Introducing Veritas Surveillance web client
Disabling networking facilities that can disrupt a Compliance Accelerator environment
The Windows networking subsystem provides a number of facilities that can cause issues in a Compliance Accelerator environment. We recommend that you disable these facilities.
To disable networking facilities that can disrupt a Compliance Accelerator environment
- The following article on the Veritas Support website provides instructions on how to disable these features:
Disable the following features on your designated Compliance Accelerator server, Enterprise Vault servers, and all SQL Servers that host an Enterprise Vault database:
Receive-Side Scaling
TCP Chimney
TCP Segmentation Offloading
TCP/IP Offload Engine
- Disable any network interface card (NIC) Teaming that may be present on the Enterprise Vault and Compliance Accelerator servers.
For guidelines on how to disable NIC Teaming, consult the documentation that your hardware vendor provides.