Please enter search query.
Search <book_title>...
Enterprise Vault™ Discovery Accelerator Installation Guide
Last Published:
2023-09-08
Product(s):
Enterprise Vault (14.5)
- Introducing Discovery Accelerator
- Preparing to install Discovery Accelerator
- Configuration options for Discovery Accelerator
- Supported versions of Enterprise Vault in Discovery Accelerator environments
- Prerequisites for Discovery Accelerator
- Configuring Outlook to enable the processing of items with many attachments or many recipients
- Setting the Windows and ASP.NET Temp folder permissions
- Security requirements for temporary folders
- Disabling networking facilities that can disrupt a Discovery Accelerator environment
- Disabling the Windows Search Service on the Discovery Accelerator server
- Ensuring that the Windows Server service is running on the Discovery Accelerator server
- Configuring the SQL Server Agent service
- Assigning SQL Server roles to the Vault Service account
- Installing and configuring the SQL full-text search indexing service
- Verifying that Enterprise Vault expands distribution lists
- Installing Discovery Accelerator
- Installing the Discovery Accelerator server software
- Allowing Enterprise Vault to communicate with Discovery Accelerator through the Windows firewall
- Creating the configuration database and customer databases
- Setting up a Custodian Manager website
- Uploading the Discovery Accelerator report templates
- Configuring Discovery Accelerator for use in a SQL Server Always On environment
- Installing Discovery Accelerator in a clustered environment
- Maximizing security in your Discovery Accelerator databases
- Installing the Discovery Accelerator client software
- Installing the Discovery Accelerator server software
- Appendix A. Ports that Discovery Accelerator uses
- Appendix B. Troubleshooting
- Error messages appear in the event log when upgrading to Discovery Accelerator 14.5
- Enterprise Vault Accelerator Manager service not created
- Enterprise Vault Accelerator Manager service does not start
- "Access is denied" message is displayed when you try to create a customer database on a UAC-enabled computer
- Cannot create or upgrade Discovery Accelerator customer databases when Symantec Endpoint Protection is running
- Permissions error when uninstalling the Discovery Accelerator client from a UAC-enabled computer
- Uninstalling the Discovery Accelerator client from a shared location may prevent other users from starting the client
- Appendix C. Installing and configuring the Enhanced Auditing feature
- Overview
- Prerequisites for the Enhanced Auditing feature
- Installing the Enhanced Auditing feature
- Post installation steps
- Upgrading the Enhanced Auditing setup
- Modifying the Enhanced Auditing setup
- Repairing the Enhanced Auditing setup
- Uninstalling the Enhanced Auditing setup
- Managing access from Discovery Accelerator
Cannot create or upgrade Discovery Accelerator customer databases when Symantec Endpoint Protection is running
If Symantec Endpoint Protection is running on your Discovery Accelerator server, you may be unable to create customer databases or upgrade existing ones. We recommend that you shut down Endpoint Protection while you perform these operations.
When the Discovery Accelerator server is running in a centrally managed Endpoint Protection environment, you need only disable the Intrusion Prevention check that is responsible for the issue. Although this disables the Intrusion Prevention check on all servers that are in the same group as the Discovery Accelerator server, it saves you from having to shut down Endpoint Protection completely.
To disable Endpoint Protection's Intrusion Prevention check
- Log on to the computer where the Endpoint Protection Manager Console is running.
- Open the Endpoint Protection Manager Console.
- Click Policies.
- Under View Policies, click Intrusion Prevention.
- In the right pane, right-click your Intrusion Prevention policy, and then click Edit.
- Click Exceptions.
- Click Add.
- Select the signature ID 20079 in the list, and then click Next.
- Set Action to Allow and Log to either option, and then click OK.
- Click OK.
- Wait a few moments for Endpoint Protection to roll out the policy to the servers in the group.