Please enter search query.
Search <book_title>...
Enterprise Vault™ Compliance Accelerator Installation Guide
Last Published:
2020-11-13
Product(s):
Enterprise Vault (14.0)
- Introducing Compliance Accelerator
- Preparing to install Compliance Accelerator
- Configuration options for Compliance Accelerator
- Supported versions of Enterprise Vault in Compliance Accelerator environments
- Prerequisites for Compliance Accelerator
- Configuring Outlook to enable the processing of items with many attachments or many recipients
- Setting the Windows and ASP.NET Temp folder permissions
- Security requirements for temporary folders
- Disabling networking facilities that can disrupt a Compliance Accelerator environment
- Disabling the Windows Search Service on the Compliance Accelerator server
- Ensuring that the Windows Server service is running on the Compliance Accelerator server
- Configuring the SQL Server Agent service
- Assigning SQL Server roles to the Vault Service account
- Installing and configuring the SQL full-text search indexing service
- Verifying that Enterprise Vault expands distribution lists
- Installing Compliance Accelerator
- Installing the Compliance Accelerator server software
- Allowing Enterprise Vault to communicate with Compliance Accelerator through the Windows firewall
- Creating the configuration database and customer databases
- Uploading the Compliance Accelerator report templates
- Configuring Compliance Accelerator for use in a SQL Server Always On environment
- Installing Compliance Accelerator in a clustered environment
- Maximizing security in your Compliance Accelerator databases
- Installing the Compliance Accelerator client software
- Uninstalling Compliance Accelerator
- Installing the Compliance Accelerator server software
- Appendix A. Ports that Compliance Accelerator uses
- Appendix B. Troubleshooting
- Error messages appear in the event log when upgrading to Compliance Accelerator 14.0
- Enterprise Vault Accelerator Manager service not created
- Enterprise Vault Accelerator Manager service does not start
- "Access is denied" message is displayed when you try to create a customer database on a UAC-enabled computer
- Cannot create or upgrade Compliance Accelerator customer databases when Symantec Endpoint Protection is running
- Permissions error when uninstalling the Compliance Accelerator client from a UAC-enabled computer
- Uninstalling the Compliance Accelerator client from a shared location may prevent other users from starting the client
Modifying the configuration file for the Compliance Accelerator client
Before you proceed, it is a good idea to modify the configuration file that accompanies the installation package. One of the settings in this file is the name or address of the computer on which you have installed the Compliance Accelerator server software. By providing this information in the configuration file, you can save your users from having to supply the computer name or address when they first start the Compliance Accelerator client.
To modify the configuration file for the Compliance Accelerator client
- Locate the configuration file
AcceleratorClient.Exe.Configin the installation media for the Compliance Accelerator client software. - Open the configuration file in a plain text editor such as Windows Notepad.
- Find the following configuration setting:
<add key="AcceleratorServer" value="localhost" />
- Replace the value with the name, fully qualified domain name, or IPv4 or IPv6 address of the computer on which you installed the Compliance Accelerator server software. For example:
<add key="AcceleratorServer" value="server2" />
If you have configured Compliance Accelerator for use in a Network Load Balancing cluster, you must specify the virtual name or IP address of the cluster.
- Save and close the file.