Enterprise Vault™ Compliance Accelerator Installation Guide
- Introducing Compliance Accelerator
- Preparing to install Compliance Accelerator
- Configuration options for Compliance Accelerator
- Supported versions of Enterprise Vault in Compliance Accelerator environments
- Prerequisites for Compliance Accelerator
- Configuring Outlook to enable the processing of items with many attachments or many recipients
- Setting the Windows and ASP.NET Temp folder permissions
- Security requirements for temporary folders
- Disabling networking facilities that can disrupt a Compliance Accelerator environment
- Disabling the Windows Search Service on the Compliance Accelerator server
- Ensuring that the Windows Server service is running on the Compliance Accelerator server
- Configuring the SQL Server Agent service
- Assigning SQL Server roles to the Vault Service account
- Installing and configuring the SQL full-text search indexing service
- Verifying that Enterprise Vault expands distribution lists
- Configuring Intelligent Review API Authentication and Authorization
- Installing Compliance Accelerator
- Installing the Compliance Accelerator server software
- Allowing Enterprise Vault to communicate with Compliance Accelerator through the Windows firewall
- Creating the configuration database and customer databases
- Configuring a dedicated server for Intelligent Review processing (optional deployment configuration)
- Configuring Compliance Accelerator for use in a SQL Server Always On environment
- Installing Compliance Accelerator in a clustered environment
- Maximizing security in your Compliance Accelerator databases
- Uninstalling Compliance Accelerator
- Installing the Compliance Accelerator server software
- Appendix A. Ports that Compliance Accelerator uses
- Appendix B. Troubleshooting
- Error messages appear in the event log when upgrading to Compliance Accelerator 15.1
- Enterprise Vault Accelerator Manager service not created
- Enterprise Vault Accelerator Manager service does not start
- "Access is denied" message is displayed when you try to create a customer database on a UAC-enabled computer
- Cannot create or upgrade Compliance Accelerator customer databases when Symantec Endpoint Protection is running
- Error messages when the Intelligent Review (IR) API authentication and authorization fails
- Appendix C. Installing and configuring the Enhanced Auditing feature
- Overview
- Prerequisites for the Enhanced Auditing feature
- Installing the Enhanced Auditing feature
- Post installation steps
- Upgrading the Enhanced Auditing setup
- Modifying the Enhanced Auditing setup
- Repairing the Enhanced Auditing setup
- Uninstalling the Enhanced Auditing setup
- Managing access from Veritas Surveillance
- Appendix D. Introducing Veritas Surveillance web client
Upgrading the Enhanced Auditing setup
To upgrade the Enhanced Auditing setup
- Navigate to the Veritas Enhanced Auditing windows installer setup on your local computer.
- Extract the zipped content to access the Windows installer package file (MSI file).
- Launch the Veritas Enhanced Auditing installer. To launch the installer, do any of the following steps:
Run the MSI file from the Command Prompt.
Right-click on the available MSI file and click Run as administrator.
The installer opens the Welcome wizard.
Note:
Click Cancel if you want to cancel the installation at any stage. After you click Cancel, the application prompts you to confirm the operation. If you interrupt the installation process, the installer prompts you to run the installation again whenever required. Click Yes to complete the operation and click Finish to abort the installation. Click No to continue the installation.
- Click Next to proceed to the Settings wizard.
The application displays the Prerequisites page.
- Verify the prerequisites, and select the I have read and met the above prerequisites check box to confirm you have all the prerequisites.
- Click Next to view the Prerequisite Status page.
If the required prerequisites are not installed on your computer, it shows Error instead of OK for the corresponding prerequisite. The Next button remains disabled. You need to install the corresponding perquisites to enable the Next button.
- Click Next to view the Auditing Service Account Login page, and provide the correct credentials.
Note:
This user must be a domain user that belongs to the local administrator's group.
- Click Next to view the Veritas Enhanced Auditing Configuration page, and provide Elasticsearch superuser credentials.
The installer displays the Elasticsearch URL and the Username that a user is using currently.
- Click Next to navigate to the next page, and click Install.
To review or change the configuration, click Back. To cancel the installation at this stage, click Cancel.
- After the upgrade is complete, click Finish and restart the server to apply the changes.
- To view the upgrade log file, navigate to the folder where you have installed the Veritas Enhanced Auditing setup and access the Logs folder.