Enterprise Vault™ Discovery Accelerator Reviewer's Guide
- Introducing Discovery Accelerator
- Introducing Veritas Surveillance
- Searching for items
- Manually reviewing items
- About reviewing with Discovery Accelerator
- Searching within the review set
- Deleting items from Enterprise Vault archives
- Working with research folders
- Exporting and producing items
- Creating and viewing reports
- Enhanced reporting
- Available Discovery Accelerator reports
- Accessing reports through the OData web service
- Appendix A. Enterprise Vault properties for use in Discovery Accelerator searches
Security report
The Security report provides information on the users who have access to the selected case, and their associated roles and permissions.
This report contains the following fields.
Table: Fields in the Security report
This field | Shows |
---|---|
Security Details | |
Role | The security role in Discovery Accelerator. |
User/Group Names | The users and groups to whom you have assigned the role. |
Allow Permissions | The permissions that you have assigned to Discovery Accelerator users and groups with the specified role. |
Deny Permissions | The permissions that users and groups with the specified role cannot have, even if they occupy other roles that grant the permissions to them. |
User/Group Roles | |
User/Group Name | The name of the Discovery Accelerator user or group. |
Roles for User/Group | The roles to which you have assigned the user or group. |
Effective Permissions | |
User/Group Name | The name of the Discovery Accelerator user or group. |
Effective Permissions for User/Group | The permissions that the Discovery Accelerator user or group has. |