Enterprise Vault™ Compliance Accelerator Administrator's Guide
- Overview and latest updates
- Understanding Veritas Surveillance
- Configuring Compliance Accelerator Desktop Client
- Importing configuration data from an XML file
- Grouping departments into partitions
- Setting Compliance Accelerator system configuration options
- Creating and viewing reports
- Enhanced reporting
- Accessing reports through the OData web service
- Appendix A. Troubleshooting
Security configuration options
Use these settings to implement Chinese walls security restrictions on what users can access in Compliance Accelerator.
A Chinese wall is a metaphor used to refer to the practice of ensuring that different parts of an organization are kept apart so that information does not circulate freely and to prevent conflicts of interest. By implementing Chinese walls, you can stop users in one part of your organization from giving access to departments and folders to users in another part of the organization.
Bypass Department Users Permissions check when removing all roles |
Lets users who do not have the Manage Department User permission remove Department Users from departments. |
Enable Chinese Wall Department Users |
Prevents users from being assigned to roles in a department unless they have first been assigned to the Department User role in that department. |
Use SQL Server SysAdmin Server Role for Schedules | When selected, makes the SQL Server sysadmin logon the creator and owner of Compliance Accelerator search schedules. If you want to lock down your SQL Server instance, clear this setting and consult the following article on the Veritas Support website for further instructions: |