Veritas Data Insight Installation Guide

Last Published:
Product(s): Data Insight (7.0)
Platform: Windows
  1. Understanding the Veritas Data Insight architecture
    1.  
      About Veritas Data Insight
    2.  
      About the Management Server
    3. About the Collector worker node
      1.  
        About the Collector
      2.  
        About the Scanner
    4.  
      About the Indexer worker node
    5.  
      About the Classification worker node
    6.  
      About the Self-Service Portal node
    7.  
      About Communication Service
    8.  
      About the DataInsightWatchdog service
    9.  
      About the DataInsightWorkflow service
    10. About Veritas Data Insight installation tiers
      1.  
        About three-tier installation
      2.  
        About two-tier installation
      3.  
        About single-tier installation
  2. Preinstallation
    1.  
      Pre-installation steps
    2.  
      Minimum system requirements
    3.  
      System requirements for classification components
  3. Installing Veritas Data Insight
    1.  
      About installing Veritas Data Insight
    2.  
      Federal Information Processing Standards (FIPS)
    3.  
      Performing a single-tier installation
    4.  
      Performing a two-tier installation
    5.  
      Performing a three-tier installation
    6.  
      Installing the Management Server
    7.  
      Installing the worker node
    8.  
      Installing the Classification Server
    9.  
      Installing the Self-Service Portal
    10.  
      Installing a Linux Classification Server or Collector worker node
    11.  
      Installing a Linux Indexer worker node
    12.  
      Installing Veritas Data Insight in Azure Cloud Environment
    13.  
      Installing Veritas Data Insight in AWS Cloud Environment
  4. Upgrading Veritas Data Insight
    1.  
      Upgrading Data Insight to 7.0
    2.  
      Upgrading the product data using the Upgrade Data Wizard
    3.  
      Names and locations of cache files
    4.  
      Upgrading the Data Insight web service for SharePoint
  5. Post-installation configuration
    1.  
      Post-installation configuration
    2.  
      Registering the worker node
    3. About post-installation security configuration for Management Server
      1.  
        About SSL client/server certificates
      2.  
        Enabling CA signed certificates for inter-node communication
      3.  
        Generating Management Console certificate
    4.  
      Configuring your corporate firewall
  6. Installing Windows File Server agent
    1.  
      About Windows File Server agent
    2.  
      Installing Windows File Server agent manually
    3.  
      Configuring the Windows File Server using ConfigureWindowsFileServer.exe
  7. Getting started with Data Insight
    1.  
      About the Data Insight Management Console
    2.  
      Logging in to the Data Insight Management Console
    3.  
      Logging out of the Data Insight Management Console
    4.  
      Displaying online help
  8. Uninstalling Veritas Data Insight
    1.  
      Uninstalling Veritas Data Insight
  9. Appendix A. Installing Data Insight using response files
    1.  
      About response files
    2.  
      Installing Data Insight using response files
    3.  
      Sample response files

Federal Information Processing Standards (FIPS)

About FIPS 140-2

The Federal Information Processing Standards (FIPS) define U.S. and Canadian Government security and interoperability requirements for computer systems. The FIPS 140-2 standard specifies the security requirements for cryptographic modules. It describes the approved security functions for symmetric and asymmetric key encryption, message authentication, and hashing. For more information on the FIPS 140-2 standard and its validation program, see the National Institute of Standards and Technology (NIST) and the Communications Security Establishment Canada (CSEC) Cryptographic Module Validation Program website at: https://csrc.nist.gov/projects/cryptographic-module-validation-program

What does "FIPS 140-2 compliant" mean?

Where the Data Insight documentation states that a version of Data Insight is "FIPS 140-2-compliant", it means the following:

  • Data Insight uses FIPS 140-2-validated instances of algorithms and hashing functions in all instances where data is encrypted or hashed.

  • Data Insight manages cryptographic keys and message authentication in a secure manner, as required of FIPS 140-2-validated cryptographic modules.

How Data Insight achieves FIPS 140-2 compliance

To achieve FIPS 140-2 compliance, Data Insight uses a FIPS 140-2-validated cryptographic module to provide the required cryptographic functionality. The Veritas Data Insight Cryptographic Module handles the encryption and decryption of passwords, the hashing of data, and random number generation.

The certificate numbers for the cryptographic modules that are used within the Veritas Data Insight Cryptographic Module are 1012, 1337, and 1894 on the list of validated FIPS 140-2 modules that the NIST publishes. See the following:

  • https://csrc.nist.gov/projects/cryptographic-module-validation-program/validated-modules/search#1012

  • http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/ 1401val2010.htm#1337

  • http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/ 1401val2013.htm#1894

Using Data Insight in a FIPS 140-2-compliant environment

Note the following points if you want to use Data Insight in a FIPS 140-2-compliant environment:

  • FIPS 140-2-compliant versions of Data Insight store data on your storage devices using FIPS-compliant algorithms. However, you may want to check with the storage provider whether your storage devices are FIPS-compliant.

  • If you want to run Windows in FIPS 140 compliance mode, you must enable the Windows group policy setting or local policy setting for FIPS-compliant algorithms. This setting restricts the use of non-compliant algorithms in the Microsoft .NET Framework.

    See the Microsoft knowledge base article at

    http://support.microsoft.com/kb/811833

  • To use File System Archiving with placeholder shortcuts on an EMC Celerra device, you must configure the Celerra DataMover to use the Secure Sockets Layer (SSL) protocol. Check your Celerra documentation for details of FIPS compliance, if required.

Following modules are not FIPS compliant:

  • NetApp Manageability SDK used for supporting NetApp devices

  • Box SDK used for supporting Box cloud sources

  • Amazon S3 SDK used supported Amazon S3 sources