Enterprise Vault™ Compliance Accelerator Administrator's Guide
- Introducing Compliance Accelerator
- Key features of Compliance Accelerator
- About the Compliance Accelerator components
- The Compliance Accelerator process
- About randomly sampling items with Compliance Accelerator
- About the intelligent review feature in Compliance Accelerator
- About the deduplication feature in Compliance Accelerator
- Product documentation
- Introducing the Compliance Accelerator client
- Setting up employees and employee groups
- Working with departments
- About departments
- Creating departments
- Adding monitored employees and groups to departments
- Editing the monitoring policy for employees and groups
- Moving employees or groups between departments
- Moving departments
- Assigning department reviewers, compliance supervisors, and delegates
- Implementing Chinese Walls security
- Managing exception employees
- Grouping departments into partitions
- Using attributes to classify departments
- Searching for items
- About searching with Compliance Accelerator
- Creating and running Compliance Accelerator searches
- About the search criteria options
- Guidelines on conducting effective searches
- Pausing and resuming Compliance Accelerator searches
- About the Monitor Searches tab
- Searching the items of exception employees
- Selecting the archives in which to search
- Building Compliance Accelerator search schedules
- Setting up custom message types
- Using hotwords to search for items
- Configuring how Compliance Accelerator handles email addresses
- Using Compliance Accelerator to search archived Skype for Business content
- Manually reviewing items
- About reviewing with Compliance Accelerator
- About the Review pane
- Viewing the hotword statistics for an item in review
- How the Prevent self-review option limits the reviewing activities of exception employees
- Filtering the items in the Review pane
- Assigning review marks to items
- Adding comments to items
- Viewing the history of items
- Displaying printable versions of items
- Downloading the original versions of items
- Copying the item list to the Clipboard
- Changing how the Review pane looks
- Setting your Review pane preferences
- Escalating items
- Storing reviewing comments for reuse
- Working with research folders
- About research folders
- Creating research folders
- Editing the properties of research folders
- Copying items to research folders
- Reviewing the items in research folders
- Exporting items from research folders
- Giving other users access to your research folders
- Committing research folder items to the department review set
- Removing items from research folders
- Deleting folders
- Exporting items
- Creating and viewing reports
- About the Compliance Accelerator reports
- Creating Compliance Accelerator reports
- Available Compliance Accelerator reports
- Compliance Supervisor Responsibility report
- Department Roles Detail report
- Department Roles Summary report
- Differential Sampling Summary by Department report
- Effective Roles by User report
- Evidence of message type Review by Department/Employee reports
- Item Aging by Department report
- Message Stats Summary report
- Message Summary report
- Monitored IDs by Department report
- Questioned Items by Department report
- Responsibility by Department report
- Responsibility by Reviewer report
- Review Activity Summary by Department report
- Reviewer Activity by Department report
- Reviewer Activity Detail report
- Reviewer Mapping report
- Search Auto Reviewed Irrelevant Items by Department
- Unreviewed Departments report
- Unsupervised Departments report
- Viewing existing reports
- Deleting reports
- About viewing Compliance Accelerator datasets using the OData web service
- Appendix A. Customizing Compliance Accelerator
- Specifying the Windows domains with which to synchronize employee details
- Customizing the reviewing action statuses
- Setting Compliance Accelerator system configuration options
- Ad Hoc Searches configuration options
- Diagnostics configuration options
- Document Conversion configuration options
- Export/production configuration options
- General configuration options
- Home Page configuration options
- Hotword Analysis configuration options
- Item Prefetch Cache configuration options
- Item Prefetch Cache (Advanced) configuration options
- Policy Integration configuration options
- Profile Synchronization configuration options
- Random Capture configuration options
- Reviewing configuration options
- Search configuration options
- Security configuration options
- System configuration options
- Vault Directory Synchronization configuration options
- Customizing the columns in the Review pane
- Appendix B. Importing configuration data from an XML file
- Appendix C. Troubleshooting
- A security warning may appear when you preview certain items in the Review pane of the Compliance Accelerator client
- Issues with the random sampling of items
- Display issues when you run the Compliance Accelerator client in Windows 8 or later
- Display issues when you open a Compliance Accelerator website in Internet Explorer 10 or later
- Vault stores not displayed in the Compliance Accelerator client
- Compliance Accelerator searches return unexpected results
- Errors when exporting items from Compliance Accelerator
- TNEF-encoded attachments to Internet Mail (.eml) messages may not be readable after you export the messages from a review set
- Synchronization errors after you rename the SQL Server computer
- Performance counter errors when the Accelerator Manager service starts
- SQL Service Broker warning when restoring a customer database to a different server
- Issues with Compliance Accelerator reports
- Error messages when the Intelligent Review (IR) API authentication and authorization fails
Error messages when the Intelligent Review (IR) API authentication and authorization fails
This is a Kerberos double hop error. This error appears if the Kerberos constrained trusted delegation is not set correctly between the Compliance Accelerator Server and the Compliance Accelerator Database Server.
To fix this error, perform the following steps:
Verify if the Compliance Accelerator Server is trusted for delegation.
Check if the installation setup/environment has Kerberos constrained trusted delegation is set properly. Verify the SQL Service Service Principal Names (SPNs) for correctness, duplication, and missing SPNs. Use the Kerberos Configuration Manager tool.
Verify if the Compliance Accelerator Server is using Fully Qualified Domain Name (FQDN) and not IP Addresses for connecting to the Compliance Accelerator Configuration and the customer databases. For configuration database, verify if the <install dir \Veritas Intelligent Review\IR.APIEndPoint \appsettings.json-> ConfigDBConnection key is using the FQDN and not IPAddress for connection string. For the customer database, verify if the configuration database->tblCustomer table for the 'Server' field for that customer is using FQDN and not IPAddress.
Verify if the SQL Server service account is a user, then that user is trusted for delegation, and various properties like the user is allowed for the delegation are set correctly.
Refer to the sample screen below.
To fix this issue, perform the following procedure:
- Create the correct SPNs. For example, If the SQL Service is running as a Vault Service account (VSA) user, create or check if proper SPNs exist for VSA.
- Create SPNs for the availability group listener as well as the actual SQL nodes.
- Enable the Compliance Accelerator Server to trust for delegation (only the listener). Refer to the sample image below.
Note:
Choose Add… while trusting for delegation and choose the SQL Service account (VSA) on which the SPNs are configured.
- Restart the Active Directory Domain service on the Domain Controller.
- Restart Internet Information Services (IIS) on the Compliance Accelerator Server.
- Call the Intelligent Review (IR) API directly or via Enterprise Vault. Refer to the sample image below.