Please enter search query.
Search <book_title>...
Veritas Alta™ Surveillance User Guide
Last Published:
2024-07-22
Product(s):
Veritas Alta Surveillance (1.0)
- Introducing Veritas Alta Surveillance
- Getting started
- Working with dashboard widgets
- Managing employee groups
- Managing departments
- Managing department users
- Managing department-level searches
- Managing department-specific hotword sets
- Managing department-specific labels
- Managing department-specific trash rules
- Managing department-specific allowlist rules
- Managing department-specific review comments
- Viewing employees associated with departments
- Managing users, roles, and permissions
- Managing application-level searches
- Managing application-specific hotword sets
- Managing application-specific labels
- Managing application-specific trash rules
- Managing application-specific allowlist rules
- Managing application-specific review comments
- Managing data requests
- Managing search schedules
- Managing export operations
- Managing reviews
- Working with reports
- Enhanced reporting
- Departments API
- Users API
- UserRoles API
- Roles API
- ItemMetrics API
- ReviewerMapping API
- MonitoredEmployees API
- Evidence of Review by Department API
- Managing Power BI templates for reporting APIs
- Managing Audit Settings
- Working with Audit viewer
Launching Veritas Alta Archiving applications
To launch Veritas Alta Archiving applications
- On the Alta Surveillance user interface, in the upper right-hand corner, click the user profile icon.
When you hover over this icon, the account user name is displayed. Based on the access granted to the user, any or all of the following options are displayed:
Veritas Alta eDiscovery
Veritas Alta View Compliance and Governance console
Veritas Alta Personal Archive
- Select the application that you want to launch. The application appears in a new browser window.
- On the new browser window for the selected application, enter your credentials.
Note:
If the user has signed into Alta Surveillance using Single Sign-On and access is allowed using this method, then the sign in for the launched application is automatically authenticated.