Enterprise Vault™ Discovery Accelerator Reviewer's Guide
- Introducing Discovery Accelerator
- Introducing Veritas Surveillance
- Searching for items
- Manually reviewing items
- About reviewing with Discovery Accelerator
- About the Review pane
- Filtering the items in the Review pane
- Searching within the review set
- Finding all items in the same conversation
- Assigning review marks and tags to items
- Adding comments to items
- Viewing the history of items
- Displaying printable versions of items
- Downloading the original versions of items
- Copying the item list to the Clipboard
- Deleting items from Enterprise Vault archives
- Changing how the Review pane looks
- Setting your Review pane preferences
- Working with research folders
- About research folders
- Creating research folders
- Editing the properties of research folders
- Copying items to research folders
- Reviewing the items in research folders
- Exporting items from research folders
- Giving other users access to your research folders
- Removing items from research folders
- Converting research folders into cases
- Deleting folders
- Exporting and producing items
- Creating and viewing reports
- About the Discovery Accelerator reports
- Enhanced reporting
- Creating Discovery Accelerator reports
- Available Discovery Accelerator reports
- Viewing existing reports
- Deleting reports
- Accessing reports through the OData web service
- Configuring a Power BI template for reporting
- Appendix A. Enterprise Vault properties for use in Discovery Accelerator searches
- About the Enterprise Vault search properties
- System properties
- Custom Enterprise Vault properties
- Custom Enterprise Vault properties for File System Archiving items
- Custom Enterprise Vault properties for SharePoint items
- Custom Enterprise Vault properties for Compliance Accelerator-processed items
- Custom properties for use by policy management software
- Custom properties for Enterprise Vault SMTP Archiving
Configuring a reporting endpoint
To configure a reporting endpoint, you must have a Compliance System Administrator role or the Configure Reporting API Endpoint permission to your role. If you do not have this permission, contact your system administrator.
In this release, only one reporting endpoint configuration can be created. After the endpoint is configured, you can change the configuration, regenerate API keys, and activate or suspend the endpoint as needed.
To configure a reporting endpoint
- In the left navigation pane, select Configuration > Reporting Endpoint tab.
- Click Add.
- On the Add New Endpoint Configuration page, specify the following details and click Save.
Name
Specify a unique name for the reporting endpoint configuration.
Description
Provide a brief description of the reporting endpoint configuration.
Scope
Decides which APIs are accessible via current configuration.
By default, it is set to All API.
IP Address
Specify individual IP Addresses that are allowed to access APIs via current configuration.
Note:
Only IPv4 addresses are supported in this release.
IP Address range
Specify the range of sequential IP Addresses that are allowed to access APIs via current configuration.
IP addresses outside of that range are not permitted to access the API.
Note:
Only IPv4 addresses are supported in this release.
Primary and Secondary API Key
After saving the reporting endpoint configuration, the application automatically generates primary and secondary API keys and saves them to the reporting endpoint configuration.
API callers need to specify any of these API keys to access these APIs.
Note:
The primary and secondary API keys are provided so that if you want to replace any of the keys, you can use another one without experiencing any downtime.
Endpoint Base URL
After saving the reporting endpoint configuration, the application generates the Endpoint Base URL automatically. API callers must use this URL as the starting point for accessing API.
Ensure that the configured reporting endpoint is listed on the Reporting Endpoint tab. If required, click the Refresh icon. The application masks primary and secondary keys for security reasons.
- Click the kebab icon (three vertical dots) in the same row to perform the following actions:
To view or hide the keys, select Show/hide keys.
To copy the base URL, primary key, and secondary key, click the Copy icon in the respective column, or click the reporting endpoint name and copy the required information.
To edit the reporting endpoint configuration, select Edit. Modify the configuration as needed and click Save.
To regenerate the API keys, click Regenerate adjacent to the primary and secondary API key fields.
Note:
API keys can be regenerated for the active reporting endpoints only.
To suspend the active reporting endpoint, select Suspend to block access to the Reporting APIs. Specify the reason for suspending the reporting endpoint and click Suspend.
To activate the suspended reporting endpoint and regenerate primary and secondary keys, select Activate.
Select the primary and secondary API key generation check boxes as needed. Specify the reason for activating the reporting endpoint and click Activate. The application displays the date of expiry for these API keys.