Enterprise Vault™ Compliance Accelerator Installation Guide
- Introducing Compliance Accelerator
- Preparing to install Compliance Accelerator
- Configuration options for Compliance Accelerator
- Supported versions of Enterprise Vault in Compliance Accelerator environments
- Prerequisites for Compliance Accelerator
- Configuring Outlook to enable the processing of items with many attachments or many recipients
- Setting the Windows and ASP.NET Temp folder permissions
- Security requirements for temporary folders
- Disabling networking facilities that can disrupt a Compliance Accelerator environment
- Disabling the Windows Search Service on the Compliance Accelerator server
- Ensuring that the Windows Server service is running on the Compliance Accelerator server
- Configuring the SQL Server Agent service
- Assigning SQL Server roles to the Vault Service account
- Installing and configuring the SQL full-text search indexing service
- Verifying that Enterprise Vault expands distribution lists
- Installing Compliance Accelerator
- Installing the Compliance Accelerator server software
- Allowing Enterprise Vault to communicate with Compliance Accelerator through the Windows firewall
- Creating the configuration database and customer databases
- Uploading the Compliance Accelerator report templates
- Configuring Compliance Accelerator for use in a SQL Server Always On environment
- Installing Compliance Accelerator in a clustered environment
- Maximizing security in your Compliance Accelerator databases
- Installing the Compliance Accelerator client software
- Uninstalling Compliance Accelerator
- Installing the Compliance Accelerator server software
- Appendix A. Ports that Compliance Accelerator uses
- Appendix B. Troubleshooting
- Error messages appear in the event log when upgrading to Compliance Accelerator 14.1
- Enterprise Vault Accelerator Manager service not created
- Enterprise Vault Accelerator Manager service does not start
- "Access is denied" message is displayed when you try to create a customer database on a UAC-enabled computer
- Cannot create or upgrade Compliance Accelerator customer databases when Symantec Endpoint Protection is running
- Permissions error when uninstalling the Compliance Accelerator client from a UAC-enabled computer
- Uninstalling the Compliance Accelerator client from a shared location may prevent other users from starting the client
Product documentation
Table: The Compliance Accelerator documentation set lists the documentation that accompanies Compliance Accelerator. This documentation is also available in PDF and HTML format in the Veritas Documentation Library.
Table: The Compliance Accelerator documentation set
Document | Comments |
|---|---|
Installation Guide | Outlines how to perform a first-time installation of the Compliance Accelerator server and client software. |
Upgrade Instructions | Explains how to upgrade an existing installation of Compliance Accelerator. |
Administrator's Guide | Provides information for Compliance Accelerator administrators on how to set up and assign roles, search for items to include in the review set, export items for offline review, create reports, and more. |
Reviewer's Guide | Describes the features of the Compliance Accelerator client that are available to reviewers. |
Online Help | Accompanies all the Compliance Accelerator applications and provides extensive information on how to use their facilities. |
Release Notes | Provides late-breaking information that you may need to be aware of before you install and use Compliance Accelerator. |
Veritas Advanced Supervision User Guide | Provides information on how to use all the key features of Advanced Supervision. |
Veritas Advanced Supervision Reviewer's Guide | Describes the features of Veritas Advanced Supervision that are available to reviewers. |