Enterprise Vault™ Compliance Accelerator Installation Guide
- Introducing Compliance Accelerator
- Preparing to install Compliance Accelerator
- Configuration options for Compliance Accelerator
- Supported versions of Enterprise Vault in Compliance Accelerator environments
- Prerequisites for Compliance Accelerator
- Configuring Outlook to enable the processing of items with many attachments or many recipients
- Setting the Windows and ASP.NET Temp folder permissions
- Security requirements for temporary folders
- Disabling networking facilities that can disrupt a Compliance Accelerator environment
- Disabling the Windows Search Service on the Compliance Accelerator server
- Ensuring that the Windows Server service is running on the Compliance Accelerator server
- Configuring the SQL Server Agent service
- Assigning SQL Server roles to the Vault Service account
- Installing and configuring the SQL full-text search indexing service
- Verifying that Enterprise Vault expands distribution lists
- Installing Compliance Accelerator
- Installing the Compliance Accelerator server software
- Allowing Enterprise Vault to communicate with Compliance Accelerator through the Windows firewall
- Creating the configuration database and customer databases
- Uploading the Compliance Accelerator report templates
- Configuring Compliance Accelerator for use in a SQL Server Always On environment
- Installing Compliance Accelerator in a clustered environment
- Maximizing security in your Compliance Accelerator databases
- Installing the Compliance Accelerator client software
- Uninstalling Compliance Accelerator
- Installing the Compliance Accelerator server software
- Appendix A. Ports that Compliance Accelerator uses
- Appendix B. Troubleshooting
- Error messages appear in the event log when upgrading to Compliance Accelerator 14.0
- Enterprise Vault Accelerator Manager service not created
- Enterprise Vault Accelerator Manager service does not start
- "Access is denied" message is displayed when you try to create a customer database on a UAC-enabled computer
- Cannot create or upgrade Compliance Accelerator customer databases when Symantec Endpoint Protection is running
- Permissions error when uninstalling the Compliance Accelerator client from a UAC-enabled computer
- Uninstalling the Compliance Accelerator client from a shared location may prevent other users from starting the client
Using the MSI installer package to install the Compliance Accelerator client
Typically, you distribute the Compliance Accelerator client software by directing users to a central location from which they can run the MSI installer package. By default, the installer package for the Compliance Accelerator client software performs a per-user installation of the software. This type of installation does not permit other users of the computer to run the application. However, if you have administration privileges on the computer and want to permit all users to run the application, you can perform a per-machine installation.
To install the Compliance Accelerator client software
- Ensure that the configuration file
AcceleratorClient.Exe.Configfile is in the installation folder for the Compliance Accelerator client software. - Do one of the following:
To perform a per-user installation, start the Compliance Accelerator installer package (
Veritas Enterprise Vault Compliance Accelerator Client.msi).To perform a per-machine installation, open a Command Prompt window and then type the following:
msiexec /I "path_to/Veritas Enterprise Vault Compliance Accelerator Client.msi" TARGETDIR="install_path" ALLUSERS=1
Where:
path_to
Specifies the path to the
.msifile.install_path
Specifies the path to the folder in which to install the client software.
For example, you might type the following:
msiexec /I "D:\Veritas Enterprise Vault Compliance Accelerator Client.msi" TARGETDIR="C:\Program Files (x86)\" ALLUSERS=1
Caution:
If User Account Control (UAC) is enabled on your computer, you must open the Command Prompt window with administrator privileges.
- Follow the on-screen instructions.
- After you have installed the client software, set the access permissions on the installation folder to prevent unauthorized users from tampering with it - for example, by placing malicious files in the folder. Only authorized users should have Modify and Write permissions on this folder.