Enterprise Vault™ Compliance Accelerator Administrator's Guide
- Introducing Compliance Accelerator
- Key features of Compliance Accelerator
- About the Compliance Accelerator components
- The Compliance Accelerator process
- About randomly sampling items with Compliance Accelerator
- About the intelligent review feature in Compliance Accelerator
- About the deduplication feature in Compliance Accelerator
- Product documentation
- Introducing the Compliance Accelerator client
- Setting up employees and employee groups
- Working with departments
- About departments
- Creating departments
- Adding monitored employees and groups to departments
- Editing the monitoring policy for employees and groups
- Moving employees or groups between departments
- Moving departments
- Assigning department reviewers, compliance supervisors, and delegates
- Implementing Chinese Walls security
- Managing exception employees
- Grouping departments into partitions
- Using attributes to classify departments
- Searching for items
- About searching with Compliance Accelerator
- Creating and running Compliance Accelerator searches
- About the search criteria options
- Guidelines on conducting effective searches
- Pausing and resuming Compliance Accelerator searches
- About the Monitor Searches tab
- Searching the items of exception employees
- Selecting the archives in which to search
- Building Compliance Accelerator search schedules
- Defining hotwords to search for
- Configuring how Compliance Accelerator handles email addresses
- Using Compliance Accelerator to search archived Skype for Business content
- Manually reviewing items
- About reviewing with Compliance Accelerator
- About the Review pane
- How the Prevent self-review option limits the reviewing activities of exception employees
- Filtering the items in the Review pane
- Assigning review marks to items
- Adding comments to items
- Viewing the history of items
- Displaying printable versions of items
- Downloading the original versions of items
- Copying the item list to the Clipboard
- Changing how the Review pane looks
- Setting your Review pane preferences
- Escalating items
- Storing reviewing comments for reuse
- Working with research folders
- About research folders
- Creating research folders
- Editing the properties of research folders
- Copying items to research folders
- Reviewing the items in research folders
- Exporting items from research folders
- Giving other users access to your research folders
- Committing research folder items to the department review set
- Removing items from research folders
- Deleting folders
- Exporting items
- Creating and viewing reports
- About the Compliance Accelerator reports
- Creating Compliance Accelerator reports
- Available Compliance Accelerator reports
- Compliance Supervisor Responsibility report
- Department Roles Detail report
- Department Roles Summary report
- Differential Sampling Summary by Department report
- Effective Roles by User report
- Evidence of message type Review by Department/Employee reports
- Item Aging by Department report
- Message Stats Summary report
- Message Summary report
- Monitored IDs by Department report
- Questioned Items by Department report
- Responsibility by Department report
- Responsibility by Reviewer report
- Review Activity Summary by Department report
- Reviewer Activity by Department report
- Reviewer Activity Detail report
- Reviewer Mapping report
- Unreviewed Departments report
- Unsupervised Departments report
- Viewing existing reports
- Deleting reports
- About viewing Compliance Accelerator datasets using the OData web service
- Appendix A. Customizing Compliance Accelerator
- Specifying the Windows domains with which to synchronize employee details
- Customizing the reviewing action statuses
- Setting Compliance Accelerator system configuration options
- Ad Hoc Searches configuration options
- Diagnostics configuration options
- Document Conversion configuration options
- Export/production configuration options
- General configuration options
- Home Page configuration options
- Item Prefetch Cache configuration options
- Item Prefetch Cache (Advanced) configuration options
- Policy Integration configuration options
- Profile Synchronization configuration options
- Random Capture configuration options
- Reviewing configuration options
- Search configuration options
- Security configuration options
- System configuration options
- Vault Directory Synchronization configuration options
- Customizing the columns in the Review pane
- Appendix B. Importing configuration data from an XML file
- Appendix C. Troubleshooting
- A security warning may appear when you preview certain items in the Review pane of the Compliance Accelerator client
- Issues with the random sampling of items
- Display issues when you run the Compliance Accelerator client in Windows 8 or later
- Display issues when you open a Compliance Accelerator website in Internet Explorer 10 or later
- Vault stores not displayed in the Compliance Accelerator client
- Compliance Accelerator searches return unexpected results
- Errors when exporting items from Compliance Accelerator
- TNEF-encoded attachments to Internet Mail (.eml) messages may not be readable after you export the messages from a review set
- Synchronization errors after you rename the SQL Server computer
- Performance counter errors when the Accelerator Manager service starts
- SQL Service Broker warning when restoring a customer database to a different server
- Issues with Compliance Accelerator reports
How to decrypt RMS-protected items
Compliance Accelerator exports RMS-protected SMTP journal items in the encrypted format on the Compliance Accelerator server. You need to use the command-line utility, EmlDecryptor.exe, to decrypt all RMS-protected items.
EmlDecryptor.exe decrypts the contents of the item, creates an unencrypted version of the EML file, and stores it in a separate folder at the same location as the source folder. EmlDecryptor.exe is installed as a part of the Enterprise Vault API Runtime or the Enterprise Vault services installation on the Compliance Accelerator server.
Before you run EmlDecryptor.exe, do the following:
Install the Active Directory Rights Management Services Client 2.1.
Confirm whether Compliance Accelerator has exported any RMS-protected items by generating an export or a production run report.
Ensure that the
EmlDecryptor.exeandEmlDecryptor.inifiles are located in the Enterprise Vault API Runtime installation folder.
To use EmlDecryptor.exe to decrypt RMS-protected items
- Use a text editor to edit the
EmlDecryptor.inifile with the following details:The licensing intranet URL of the rights management services (RMS) server.
The licensing extranet URL of the rights management services (RMS) server.
The unique application ID for the service principal in a tenant, which your service uses for interacting with Azure Rights Management Services.
The globally unique identifier (GUID) of the tenant. The tenant ID is tied to the Active Directory in Azure.
For example,
;This is the configuration file for the EmlDecryptor utility. ;EmlDecryptor.exe is a command-line utility, which decrypts ;all Azure RMS-protected SMTP emails available in the ;export/production location of the Discovery/Compliance ;Accelerator export/production run. ;All parameters in this ini file must be specified and should ;not be empty. ;The licensing intranet URL of the rights management services ;(RMS) server. RMSIntranetUrl=https://<RMSLicensingIntranetUrl> ;The licensing extranet URL of the rights management services ;(RMS) server. RMSExtranetUrl=https://<RMSLicensingExtranetUrl> ;The unique application ID for the service principal in a ;tenant, which your service uses for interacting with ;Azure Rights Management Services. ApplicationPrincipalId=<ApplicationPrincipalId> ;The globally unique identifier (GUID) of the tenant. The ;tenant ID is tied to the Active Directory in Azure. BposTenantId=<BposTenantId>
- Log on to the Compliance Accelerator server as a Compliance Accelerator administrator.
- Run
EmlDecryptor.exefrom the command line. For example,c:\Program Files (x86)\Enterprise Vault>EmlDecryptor.exe
EmlDecryptor.exeprompts you to enter the following details:<Source Directory Path>. Enter the location where the RMS-protected SMTP emails are exported after the export run or the production run.
<Symmetric Key>. Enter the 256-bit AES symmetric key that is used to verify the application.
EmlDecryptor.exevalidates the provided information and starts the conversion process.
When EmlDecryptor.exe executes successfully, it stores the decrypted files along with a CSV report in a separate folder within the source directory path. For example, if the source directory path is C:\Compliance Accelerator Export\customer_name, the decrypted files and the CSV report are stored in the C:\ExportRun\customer_name_decrypted<DateTime> folder.
If you encounter any issues when running the EmlDecryptor.exe utility, enable DTrace on the utility and run it again.