Enterprise Vault 12.0.3

  • Article ID:100032699
  • Last Published:
  • Product(s):Enterprise Vault


Enterprise Vault 12.0.3 addresses a number of issues identified with Enterprise Vault 12 or earlier releases.

Enterprise Vault 12.0.3 includes an updated version of the Oracle Outside In Technology content converters. This version contains a number of critical patches that fix security vulnerabilities in the converters. For more information, see the following article on the Veritas Support website: http://www.veritas.com/docs/000115603.

This release update is supplied with an installer for the Enterprise Vault, Compliance Accelerator, and Discovery Accelerator components. You must install all the Enterprise Vault and Accelerator components that are applicable to your Enterprise Vault environment to ensure that they are deployed correctly.

You must install this release update on all of the following:

  • Enterprise Vault servers
  • Servers on which the Enterprise Vault SharePoint components are installed
  • Servers on which the Enterprise Vault Reporting components are installed
  • Enterprise Vault Domino Gateway servers
  • Remote computers on which the Enterprise Vault Administration Console is installed

Note the following:

  • Do not upgrade to Enterprise Vault 12 and then immediately install this release update. You must first run the Database Upgrader to upgrade the Directory and Storage databases to 12, and then install this release update.
  • You must reinstall this release update if you install additional Enterprise Vault features or repair the Enterprise Vault installation.
  • You cannot uninstall this release update from the Enterprise Vault server.

Please review the attached ReadMeFirst file for details of the issues that have been addressed in this release update.

File description: Veritas Enterprise Vault 12.0.3 kit

File name: Veritas_Enterprise_Vault_12_0_3.zip

Size: 443693949 bytes

MD5 hashcode: 4b8f71ebdeb6925d6aba79793c3476a7


Related Articles

Enterprise Vault and Oracle Outside In Technology Vulnerabilities

Was this content helpful?

Get Support