Enterprise Vault™ Compliance Accelerator Administrator's Guide
- Introducing Compliance Accelerator
- Product documentation
- Introducing the Compliance Accelerator client
- Setting up employees and employee groups
- Working with departments
- Implementing Chinese Walls security
- Managing exception employees
- Grouping departments into partitions
- Using attributes to classify departments
- Searching for items
- About searching with Compliance Accelerator
- Building Compliance Accelerator search schedules
- Using hotwords to search for items
- Manually reviewing items
- About reviewing with Compliance Accelerator
- Escalating items
- Working with research folders
- Exporting items
- Creating and viewing reports
- Available Compliance Accelerator reports
- About viewing Compliance Accelerator datasets using the OData web service
- Appendix A. Customizing Compliance Accelerator
- Setting Compliance Accelerator system configuration options
- Appendix B. Importing configuration data from an XML file
- Appendix C. Troubleshooting
- Issues with Compliance Accelerator reports
How to decrypt RMS-protected items
Compliance Accelerator exports RMS-protected SMTP journal items in the encrypted format on the Compliance Accelerator server. You need to use the command-line utility, EmlDecryptor.exe
, to decrypt all RMS-protected items.
EmlDecryptor.exe
decrypts the contents of the item, creates an unencrypted version of the EML file, and stores it in a separate folder at the same location as the source folder. EmlDecryptor.exe
is installed as a part of the Enterprise Vault API Runtime or the Enterprise Vault services installation on the Compliance Accelerator server.
Before you run EmlDecryptor.exe
, do the following:
Install the Active Directory Rights Management Services Client 2.1.
Confirm whether Compliance Accelerator has exported any RMS-protected items by generating an export or a production run report.
Ensure that the
EmlDecryptor.exe
andEmlDecryptor.ini
files are located in the Enterprise Vault API Runtime installation folder.
To use EmlDecryptor.exe to decrypt RMS-protected items
- Use a text editor to edit the
EmlDecryptor.ini
file with the following details:The licensing intranet URL of the rights management services (RMS) server.
The licensing extranet URL of the rights management services (RMS) server.
The unique application ID for the service principal in a tenant, which your service uses for interacting with Azure Rights Management Services.
The globally unique identifier (GUID) of the tenant. The tenant ID is tied to the Active Directory in Azure.
For example,
;This is the configuration file for the EmlDecryptor utility. ;EmlDecryptor.exe is a command-line utility, which decrypts ;all Azure RMS-protected SMTP emails available in the ;export/production location of the Discovery/Compliance ;Accelerator export/production run. ;All parameters in this ini file must be specified and should ;not be empty. ;The licensing intranet URL of the rights management services ;(RMS) server. RMSIntranetUrl=https://<RMSLicensingIntranetUrl> ;The licensing extranet URL of the rights management services ;(RMS) server. RMSExtranetUrl=https://<RMSLicensingExtranetUrl> ;The unique application ID for the service principal in a ;tenant, which your service uses for interacting with ;Azure Rights Management Services. ApplicationPrincipalId=<ApplicationPrincipalId> ;The globally unique identifier (GUID) of the tenant. The ;tenant ID is tied to the Active Directory in Azure. BposTenantId=<BposTenantId>
- Log on to the Compliance Accelerator server as a Compliance Accelerator administrator.
- Run
EmlDecryptor.exe
from the command line. For example,c:\Program Files (x86)\Enterprise Vault>EmlDecryptor.exe
EmlDecryptor.exe
prompts you to enter the following details:<Source Directory Path>. Enter the location where the RMS-protected SMTP emails are exported after the export run or the production run.
<Symmetric Key>. Enter the 256-bit AES symmetric key that is used to verify the application.
EmlDecryptor.exe
validates the provided information and starts the conversion process.
When EmlDecryptor.exe
executes successfully, it stores the decrypted files along with a CSV report in a separate folder within the source directory path. For example, if the source directory path is C:\Compliance Accelerator Export\customer_name
, the decrypted files and the CSV report are stored in the C:\ExportRun\customer_name_decrypted<DateTime>
folder.
If you encounter any issues when running the EmlDecryptor.exe
utility, enable DTrace on the utility and run it again.