Please enter search query.
Search <book_title>...
Enterprise Vault™ Compliance Accelerator Administrator's Guide
Last Published:
2024-09-02
Product(s):
Enterprise Vault (15.1)
- Overview and latest updates
- Understanding Veritas Surveillance
- Configuring Compliance Accelerator Desktop Client
- Importing configuration data from an XML file
- Grouping departments into partitions
- Setting Compliance Accelerator system configuration options
- Creating and viewing reports
- Enhanced reporting
- Accessing reports through the OData web service
- Appendix A. Troubleshooting
About Veritas Surveillance system security
For enhanced system security, Veritas Surveillance implements the following measures:
: Veritas Surveillance encrypts sensitive customer data stored in temporary storage to ensure heightened security.
: Veritas Surveillance adheres to the US Federal Information Processing Standards (FIPS) to maintain data security.