Enterprise Vault™ Discovery Accelerator Reviewer's Guide

Last Published:
Product(s): Enterprise Vault (15.0)
  1. Introducing Discovery Accelerator
    1.  
      About the Discovery Accelerator components
    2.  
      Key features of Discovery Accelerator
    3. Product documentation
      1.  
        White papers on the Veritas Support website
      2.  
        "How To" articles on the Veritas Support website
      3.  
        Discovery Accelerator training modules
  2. Introducing Veritas Surveillance
    1.  
      About Veritas Surveillance
    2.  
      Routine operations executed with Veritas Surveillance
    3.  
      About Veritas Surveillance system security
    4.  
      Feature comparison: Discovery Accelerator desktop client Vs Veritas Surveillance web client
  3. Searching for items
    1. Creating and running Discovery Accelerator searches
      1.  
        Limitations on searching certain types of Skype for Business content
    2.  
      About the search criteria options
    3.  
      Guidelines on conducting effective searches
  4. Manually reviewing items
    1. About reviewing with Discovery Accelerator
      1.  
        Limitations on reviewing certain types of Skype for Business content
    2.  
      About the Review pane
    3.  
      Filtering the items in the Review pane
    4. Searching within the review set
      1.  
        Conducting quick searches
      2. Conducting advanced searches
        1.  
          About the search attributes
        2. About the operators
          1.  
            Guidelines on using the NEAR operator condition in Discovery Accelerator rules
        3.  
          About SQL Server stopwords
        4. Manually editing queries in analytics rule definition language (RDL)
          1.  
            Using parentheses to set Boolean precedence in analytics RDL
          2.  
            Using stemming in analytics RDL
          3.  
            Specifying custodian and target values in analytics RDL
    5.  
      Finding all items in the same conversation
    6.  
      Assigning review marks and tags to items
    7.  
      Adding comments to items
    8.  
      Viewing the history of items
    9.  
      Displaying printable versions of items
    10.  
      Downloading the original versions of items
    11.  
      Copying the item list to the Clipboard
    12. Deleting items from Enterprise Vault archives
      1.  
        Limitations on reviewing items after you have deleted them
    13.  
      Changing how the Review pane looks
    14.  
      Setting your Review pane preferences
  5. Working with research folders
    1.  
      About research folders
    2.  
      Creating research folders
    3.  
      Editing the properties of research folders
    4.  
      Copying items to research folders
    5.  
      Reviewing the items in research folders
    6.  
      Exporting items from research folders
    7.  
      Giving other users access to your research folders
    8.  
      Removing items from research folders
    9.  
      Converting research folders into cases
    10.  
      Deleting folders
  6. Exporting and producing items
    1. About exporting and producing items
      1.  
        Limitations on exporting certain types of content
    2.  
      How exporting differs from producing
    3.  
      Performing an export or production run
    4.  
      About the limits on the number of simultaneous export and production runs
    5.  
      Making the export IDs or Bates numbers visible in Microsoft Outlook
  7. Creating and viewing reports
    1.  
      About the Discovery Accelerator reports
    2. Enhanced reporting
      1.  
        Configuring a reporting endpoint
      2.  
        Authentication
      3. Departments API
        1.  
          Departments - List
      4. Roles API
        1.  
          Roles - List
        2.  
          Roles - List by filters
      5. Users API
        1.  
          Users - List
      6. UserRoles API
        1.  
          UserRoles - List by filters
      7. ItemMetrics API
        1.  
          ItemMetrics - List
        2.  
          ItemMetrics - List by filter
      8. Evidence of Review by Department API
        1.  
          EvidenceOfReviewByDept - List by filter
      9. Evidence of Review by User API
        1.  
          EvidenceOfReviewByUser - List by filter
      10.  
        Supported OData query options
      11.  
        Supported reporting endpoint API filters and their values
      12.  
        Responses
    3.  
      Creating Discovery Accelerator reports
    4. Available Discovery Accelerator reports
      1.  
        Archive Source report
      2.  
        Case History report
      3.  
        Export Run Duplicates report
      4.  
        Item Detail report
      5.  
        Legal Holds report
      6.  
        Production Run report
      7.  
        Production Run Duplicates report
      8.  
        Productions report
      9.  
        Searches report
      10.  
        Security report
    5.  
      Viewing existing reports
    6.  
      Deleting reports
    7. Accessing reports through the OData web service
      1.  
        Available Discovery Accelerator datasets
      2.  
        Accessing the Discovery Accelerator datasets
      3.  
        Using the OData service with Microsoft Excel
      4.  
        Using the OData service with Microsoft SQL Server Reporting Services (SSRS)
      5.  
        Troubleshooting OData errors
    8.  
      Configuring a Power BI template for reporting
  8. Appendix A. Enterprise Vault properties for use in Discovery Accelerator searches
    1.  
      About the Enterprise Vault search properties
    2.  
      System properties
    3.  
      Custom Enterprise Vault properties
    4.  
      Custom Enterprise Vault properties for File System Archiving items
    5.  
      Custom Enterprise Vault properties for SharePoint items
    6.  
      Custom Enterprise Vault properties for Compliance Accelerator-processed items
    7.  
      Custom properties for use by policy management software
    8.  
      Custom properties for Enterprise Vault SMTP Archiving

Configuring a reporting endpoint

To configure a reporting endpoint, you must have a Compliance System Administrator role or the Configure Reporting API Endpoint permission to your role. If you do not have this permission, contact your system administrator.

In this release, only one reporting endpoint configuration can be created. After the endpoint is configured, you can change the configuration, regenerate API keys, and activate or suspend the endpoint as needed.

To configure a reporting endpoint

  1. In the left navigation pane, select Configuration > Reporting Endpoint tab.

  2. Click Add.
  3. On the Add New Endpoint Configuration page, specify the following details and click Save.

    Name

    Specify a unique name for the reporting endpoint configuration.

    Description

    Provide a brief description of the reporting endpoint configuration.

    Scope

    Decides which APIs are accessible via current configuration.

    By default, it is set to All API.

    IP Address

    Specify individual IP Addresses that are allowed to access APIs via current configuration.

    Note:

    Only IPv4 addresses are supported in this release.

    IP Address range

    Specify the range of sequential IP Addresses that are allowed to access APIs via current configuration.

    IP addresses outside of that range are not permitted to access the API.

    Note:

    Only IPv4 addresses are supported in this release.

    Primary and Secondary API Key

    After saving the reporting endpoint configuration, the application automatically generates primary and secondary API keys and saves them to the reporting endpoint configuration.

    API callers need to specify any of these API keys to access these APIs.

    Note:

    The primary and secondary API keys are provided so that if you want to replace any of the keys, you can use another one without experiencing any downtime.

    Endpoint Base URL

    After saving the reporting endpoint configuration, the application generates the Endpoint Base URL automatically. API callers must use this URL as the starting point for accessing API.

    Ensure that the configured reporting endpoint is listed on the Reporting Endpoint tab. If required, click the Refresh icon. The application masks primary and secondary keys for security reasons.

  4. Click the kebab icon (three vertical dots) in the same row to perform the following actions:

    • To view or hide the keys, select Show/hide keys.

    • To copy the base URL, primary key, and secondary key, click the Copy icon in the respective column, or click the reporting endpoint name and copy the required information.

    • To edit the reporting endpoint configuration, select Edit. Modify the configuration as needed and click Save.

    • To regenerate the API keys, click Regenerate adjacent to the primary and secondary API key fields.

      Note:

      API keys can be regenerated for the active reporting endpoints only.

    • To suspend the active reporting endpoint, select Suspend to block access to the Reporting APIs. Specify the reason for suspending the reporting endpoint and click Suspend.

    • To activate the suspended reporting endpoint and regenerate primary and secondary keys, select Activate.

      Select the primary and secondary API key generation check boxes as needed. Specify the reason for activating the reporting endpoint and click Activate. The application displays the date of expiry for these API keys.