Advanced Supervision User Guide

Last Published:
Product(s): AdvisorMail (1.0)
  1. Introducing Veritas Advanced Supervision
    1.  
      About Advanced Supervision
    2.  
      Veritas Advanced Supervision features
    3.  
      About Advanced Supervision system security
    4.  
      Advanced Supervision multi-tier architecture
    5.  
      System requirements
  2. Getting started
    1.  
      Signing in to Advanced Supervision
    2.  
      Signing out from Advanced Supervision
    3.  
      Launching Enterprise Vault.cloud applications
    4.  
      Resetting a forgotten password
  3. Working with dashboard widgets
    1.  
      Understanding the Dashboard page
    2.  
      Viewing status summary of recently reviewed departments
    3.  
      Viewing the review status summary of escalated items
    4.  
      Viewing a summary of completed searches
    5.  
      Viewing a summary of completed exports
  4. Managing departments
    1.  
      About departments
    2.  
      Understanding the Departments page
    3.  
      Searching departments
    4.  
      Creating departments
    5.  
      Moving existing departments under other departments
    6.  
      Adding monitored employees to departments
    7.  
      Editing department details and monitoring policy
    8.  
      Managing exception employees
    9.  
      Designating employees as exceptions
    10.  
      Assigning further exception reviewers to an exception
    11.  
      Removing exception status
    12.  
      Removing exception reviewers
  5. Managing department users
    1.  
      Assigning department reviewers
    2.  
      Removing department reviewers
    3.  
      Adding new roles for users
    4.  
      Removing roles
  6. Managing department searches
    1.  
      About searches in Advanced Supervision
    2.  
      Guidelines for effective searches
    3.  
      Creating and running Advanced Supervision searches
    4.  
      Disabling scheduled searches
    5.  
      Using proximity searches
    6.  
      Using fuzzy searches
    7.  
      Accepting search results
    8.  
      Rejecting a search result
    9.  
      Resubmitting a search
  7. Managing department-specific hotwords sets
    1.  
      Overview
    2.  
      Creating department-specific hotwords sets
    3.  
      Editing department-specific hotwords and hotwords sets
    4.  
      Deleting department-specific hotwords sets
  8. Managing department-specific trash rules
    1.  
      Overview
    2.  
      Creating department-specific trash rules
    3.  
      Activating department-specific trash rules
    4.  
      Deactivating department-specific trash rules
    5.  
      Propagating department-specific trash rules
    6.  
      Unpropagating department-specific trash rules
  9. Managing department-specific whitelist rules
    1.  
      Overview
    2.  
      Creating department-specific whitelist rules
    3.  
      Editing department-specific whitelist rules
  10. Viewing employees associated with departments
    1.  
      Viewing employee association history
  11. Managing application-level users, roles, and permissions
    1.  
      Overview
    2.  
      Predefined user roles and permissions
    3.  
      Adding new roles for users
    4.  
      Editing user roles
    5.  
      Deleting user roles
    6.  
      Assigning roles to users
    7.  
      Removing a user role
  12. Managing application-specific hotwords sets
    1.  
      Overview
    2.  
      Creating application-specific hotwords sets
    3.  
      Editing application-specific hotwords and hotwords sets
    4.  
      Deleting application-specific hotwords sets
  13. Managing application-specific trash rules
    1.  
      Overview
    2.  
      Creating application-specific trash rules
    3.  
      Activating application-specific trash rules
    4.  
      Deactivating application-specific trash rules
    5.  
      Propagating application-specific trash rules
    6.  
      Unpropagating application-specific trash rules
  14. Managing application-specific whitelist rules
    1.  
      Overview
    2.  
      Creating application-specific whitelist rules
    3.  
      Editing application-specific whitelist rules
  15. Managing search schedules
    1.  
      Overview
    2.  
      Setting up one-time search schedules
    3.  
      Example of a one-time search schedule
    4.  
      Setting up recurring search schedules
    5.  
      Example of a recurring search schedule
    6.  
      Editing search schedules
    7.  
      Deleting search schedules
  16. Managing export operations
    1.  
      About exporting items
    2.  
      Performing export runs
  17. Managing reviews
    1.  
      About reviewing with Advanced Supervision
    2.  
      Limitations on reviewing certain types of Skype for Business content
    3.  
      Understanding the Review page
    4.  
      Changing the Review pane position
    5.  
      Filtering the items in the Review pane
    6.  
      Manually reviewing items
    7.  
      Assigning review status to items
    8.  
      Viewing hotwords highlighting
    9.  
      Viewing the full content in a new window
    10.  
      Adding comments to items
    11.  
      Viewing the history of items
    12.  
      Printing the original versions of items
    13.  
      Downloading the original versions of items
  18. Working with reports
    1.  
      About Advanced Supervision reports
    2.  
      Predefined report types
    3.  
      Generating reports

About Advanced Supervision system security

Advanced Supervision provides multiple security features that help ensure the integrity of your archived items. These features include:

  • 128-bit SSL encryption - When you log in to Advanced Supervision, SSL is used to encrypt the communication between your browser and our servers.

  • Role-based permissions to users - As every role has limited permissions, functions like configuration, review, access control, escalation, and export are always performed by an authorized user.

  • Strong passwords - For security reasons, passwords must be created using suitably complex criteria. The password policy can be configured based on customer needs.