Enterprise Vault™ Discovery Accelerator Administrator's Guide
- Introducing Discovery Accelerator
- Setting up and assigning roles
- Working with cases
- Setting up review marks and tags
- Using rules to mark and tag items automatically
- Using Custodian Manager
- About Custodian Manager
- Guidelines on using Custodian Manager
- Setting up custodians
- Setting up custodian groups
- Setting up custom custodian attributes
- Setting the primary custodian attribute
- Specifying the user account under which to synchronize custodians
- Synchronizing with entire Active Directory domains and Domino servers
- Setting the configuration options for Custodian Manager
- Searching for items
- About searching with Discovery Accelerator
- Creating and running Discovery Accelerator searches
- About the search criteria options
- Guidelines on conducting effective searches
- Pausing and resuming Discovery Accelerator searches
- About the Monitor Searches tab
- Selecting the archives in which to search
- Specifying the details of custom search attributes
- Restricting search results to correspond to Compliance Accelerator departments
- Defining email targets with Address Manager
- Building Discovery Accelerator search schedules
- Setting up custom message types
- Using Discovery Accelerator to search archived Skype for Business content
- Manually reviewing items
- About reviewing with Discovery Accelerator
- About the Review pane
- Filtering the items in the Review pane
- Searching within the review set
- Finding all items in the same conversation
- Assigning review marks and tags to items
- Adding comments to items
- Viewing the history of items
- Displaying printable versions of items
- Downloading the original versions of items
- Copying the item list to the Clipboard
- Deleting items from Enterprise Vault archives
- Changing how the Review pane looks
- Setting your Review pane preferences
- Working with research folders
- About research folders
- Creating research folders
- Editing the properties of research folders
- Copying items to research folders
- Reviewing the items in research folders
- Exporting items from research folders
- Giving other users access to your research folders
- Removing items from research folders
- Converting research folders into cases
- Deleting folders
- Exporting and producing items
- About exporting and producing items
- How exporting differs from producing
- Performing an export or production run
- About the limits on the number of simultaneous export and production runs
- Identifying the archives that contain duplicates of a specific item
- How to optimize export and production runs
- Making the export IDs or Bates numbers visible in Microsoft Outlook
- Creating and viewing reports
- About the Discovery Accelerator reports
- Enhanced reporting
- Creating Discovery Accelerator reports
- Available Discovery Accelerator reports
- Viewing existing reports
- Accessing reports through the OData web service
- Configuring a Power BI template for reporting
- Appendix A. Enterprise Vault properties for use in Discovery Accelerator searches
- About the Enterprise Vault search properties
- System properties
- Custom Enterprise Vault properties
- Custom Enterprise Vault properties for File System Archiving items
- Custom Enterprise Vault properties for SharePoint items
- Custom Enterprise Vault properties for Compliance Accelerator-processed items
- Custom properties for use by policy management software
- Custom properties for Enterprise Vault SMTP Archiving
- Appendix B. Troubleshooting
- Display issues when you open a Discovery Accelerator website in Internet Explorer 10 or later
- Vault stores not displayed in the Veritas Surveillance web client
- Full-text search indexing is disabled by default in SQL Server
- TNEF-encoded attachments to Internet Mail (.eml) messages may not be readable after you export the messages from a review set
- Synchronization errors after you rename the SQL Server computer
- Performance counter errors when the Accelerator Manager service starts
- SQL Service Broker warning when restoring a customer database to a different server
- Issues with Custodian Manager
- Custodian Manager lets you synchronize multiple custodians with the same Active Directory account
- Custodian Manager does not list the members of a custodian group after you delete the group and then restore it by synchronizing with Active Directory
- If a custodian belongs to one Active Directory domain but is a member of a group in a second domain, Custodian Manager may not update the custodian's details when it synchronizes with the second domain
- Custodian Manager fails to synchronize with Domino LDAP users and groups whose names contain certain double-byte characters
- Troubleshooting Privileged Delete failures
Configuring a reporting endpoint
To configure a reporting endpoint, you must have a Compliance System Administrator role or the Configure Reporting API Endpoint permission to your role. If you do not have this permission, contact your system administrator.
In this release, only one reporting endpoint configuration can be created. After the endpoint is configured, you can change the configuration, regenerate API keys, and activate or suspend the endpoint as needed.
To configure a reporting endpoint
- In the left navigation pane, select Configuration > Reporting Endpoint tab.
- Click Add.
- On the Add New Endpoint Configuration page, specify the following details and click Save.
Name
Specify a unique name for the reporting endpoint configuration.
Description
Provide a brief description of the reporting endpoint configuration.
Scope
Decides which APIs are accessible via current configuration.
By default, it is set to All API.
IP Address
Specify individual IP Addresses that are allowed to access APIs via current configuration.
Note:
Only IPv4 addresses are supported in this release.
IP Address range
Specify the range of sequential IP Addresses that are allowed to access APIs via current configuration.
IP addresses outside of that range are not permitted to access the API.
Note:
Only IPv4 addresses are supported in this release.
Primary and Secondary API Key
After saving the reporting endpoint configuration, the application automatically generates primary and secondary API keys and saves them to the reporting endpoint configuration.
API callers need to specify any of these API keys to access these APIs.
Note:
The primary and secondary API keys are provided so that if you want to replace any of the keys, you can use another one without experiencing any downtime.
Endpoint Base URL
After saving the reporting endpoint configuration, the application generates the Endpoint Base URL automatically. API callers must use this URL as the starting point for accessing API.
Ensure that the configured reporting endpoint is listed on the Reporting Endpoint tab. If required, click the Refresh icon. The application masks primary and secondary keys for security reasons.
- Click the kebab icon (three vertical dots) in the same row to perform the following actions:
To view or hide the keys, select Show/hide keys.
To copy the base URL, primary key, and secondary key, click the Copy icon in the respective column, or click the reporting endpoint name and copy the required information.
To edit the reporting endpoint configuration, select Edit. Modify the configuration as needed and click Save.
To regenerate the API keys, click Regenerate adjacent to the primary and secondary API key fields.
Note:
API keys can be regenerated for the active reporting endpoints only.
To suspend the active reporting endpoint, select Suspend to block access to the Reporting APIs. Specify the reason for suspending the reporting endpoint and click Suspend.
To activate the suspended reporting endpoint and regenerate primary and secondary keys, select Activate.
Select the primary and secondary API key generation check boxes as needed. Specify the reason for activating the reporting endpoint and click Activate. The application displays the date of expiry for these API keys.