Enterprise Vault™ Insight Surveillance Reviewer's Guide

Last Published:
Product(s): Enterprise Vault (15.2)
  1. Introducing Insight Surveillance
    1.  
      About Insight Surveillance web application
    2.  
      Routine operations executed with Arctera Insight Surveillance
    3.  
      About Arctera Insight Surveillance system security
    4.  
      Feature comparison: Arctera Insight Surveillance desktop application Vs Arctera Insight Surveillance web application
    5. Product documentation
      1.  
        White papers on the Arctera Support website
      2.  
        "How To" articles on the Arctera Support website
  2. Searching for items
    1. Creating and running Insight Surveillance searches
      1.  
        Limitations on searching certain types of Skype for Business content
    2.  
      About the search criteria options
    3.  
      Guidelines on conducting effective searches
  3. Manually reviewing items
    1. About reviewing with Insight Surveillance
      1.  
        Limitations on reviewing certain types of Skype for Business content
    2.  
      About the Review pane
    3.  
      Viewing the hotword statistics for an item in review
    4.  
      Filtering the items in the Review pane
    5.  
      Assigning review marks to items
    6.  
      Adding comments to items
    7.  
      Viewing the history of items
    8.  
      Displaying printable versions of items
    9.  
      Downloading the original versions of items
    10.  
      Copying the item list to the Clipboard
    11. Escalating items
      1.  
        Assigning escalated items to other escalation reviewers
      2.  
        Closing escalated items
    12.  
      Changing how the Review pane looks
    13.  
      Setting your Review pane preferences
  4. Working with research folders
    1.  
      About research folders
    2.  
      Creating research folders
    3.  
      Editing the properties of research folders
    4.  
      Copying items to research folders
    5.  
      Reviewing the items in research folders
    6.  
      Exporting items from research folders
    7.  
      Giving other users access to your research folders
    8.  
      Committing research folder items to the department review set
    9.  
      Removing items from research folders
    10.  
      Deleting folders
  5. Exporting items
    1. About exporting items
      1.  
        Limitations on exporting certain types of content
    2.  
      Performing an export run
    3.  
      About the limits on the number of simultaneous export runs
    4.  
      Exporting items from the review set of an exception employee
    5.  
      Making the export IDs visible in Microsoft Outlook
  6. Creating and viewing reports
    1.  
      About the Insight Surveillance reports
    2.  
      Accessing data through the Microsoft SQL Server Reporting Services (SSRS)
    3. Enhanced reporting
      1.  
        Configuring a reporting endpoint
      2.  
        Authentication
      3. Departments API
        1.  
          Departments - List
      4. Roles API
        1.  
          Roles - List
        2.  
          Roles - List by filters
      5. Users API
        1.  
          Users - List
      6. UserRoles API
        1.  
          UserRoles - List by filters
      7. ItemMetrics API
        1.  
          ItemMetrics - List
        2.  
          ItemMetrics - List by filter
      8. Evidence of Review by Department API
        1.  
          EvidenceOfReviewByDept - List by filter
      9. Evidence of Review by User API
        1.  
          EvidenceOfReviewByUser - List by filter
      10.  
        Supported OData query options
      11.  
        Supported reporting endpoint API filters and their values
      12.  
        Responses
    4. Accessing reports through the OData web service
      1.  
        Available Insight Surveillance datasets
      2.  
        Accessing the Insight Surveillance datasets
      3.  
        Using the OData service with Microsoft Excel
      4.  
        Using the OData service with Microsoft SQL Server Reporting Services (SSRS)
      5.  
        Troubleshooting OData errors
    5.  
      Configuring a Power BI template for reporting

Configuring a reporting endpoint

To configure a reporting endpoint, you must have a Compliance System Administrator role or the Configure Reporting API Endpoint permission to your role. If you do not have this permission, contact your system administrator.

In this release, only one reporting endpoint configuration can be created. After the endpoint is configured, you can change the configuration, regenerate API keys, and activate or suspend the endpoint as needed.

To configure a reporting endpoint

  1. In the left navigation pane, select Configuration > Reporting Endpoint tab.

  2. Click Add.
  3. On the Add New Endpoint Configuration page, specify the following details and click Save.

    Name

    Specify a unique name for the reporting endpoint configuration.

    Description

    Provide a brief description of the reporting endpoint configuration.

    Scope

    Decides which APIs are accessible via current configuration.

    By default, it is set to All API.

    IP Address

    Specify individual IP Addresses that are allowed to access APIs via current configuration.

    Note:

    Only IPv4 addresses are supported in this release.

    IP Address range

    Specify the range of sequential IP Addresses that are allowed to access APIs via current configuration.

    IP addresses outside of that range are not permitted to access the API.

    Note:

    Only IPv4 addresses are supported in this release.

    Primary and Secondary API Key

    After saving the reporting endpoint configuration, the application automatically generates primary and secondary API keys and saves them to the reporting endpoint configuration.

    API callers need to specify any of these API keys to access these APIs.

    Note:

    The primary and secondary API keys are provided so that if you want to replace any of the keys, you can use another one without experiencing any downtime.

    Endpoint Base URL

    After saving the reporting endpoint configuration, the application generates the Endpoint Base URL automatically. API callers must use this URL as the starting point for accessing API.

    Ensure that the configured reporting endpoint is listed on the Reporting Endpoint tab. If required, click the Refresh icon. The application masks primary and secondary keys for security reasons.

  4. Click the kebab icon (three vertical dots) in the same row to perform the following actions:

    • To view or hide the keys, select Show/hide keys.

    • To copy the base URL, primary key, and secondary key, click the Copy icon in the respective column, or click the reporting endpoint name and copy the required information.

    • To edit the reporting endpoint configuration, select Edit. Modify the configuration as needed and click Save.

    • To regenerate the API keys, click Regenerate adjacent to the primary and secondary API key fields.

      Note:

      API keys can be regenerated for the active reporting endpoints only.

    • To suspend the active reporting endpoint, select Suspend to block access to the Reporting APIs. Specify the reason for suspending the reporting endpoint and click Suspend.

    • To activate the suspended reporting endpoint and regenerate primary and secondary keys, select Activate.

      Select the primary and secondary API key generation check boxes as needed. Specify the reason for activating the reporting endpoint and click Activate. The application displays the date of expiry for these API keys.