Enterprise Vault™ Compliance Accelerator Installation Guide
- Introducing Compliance Accelerator
- Preparing to install Compliance Accelerator
- Configuration options for Compliance Accelerator
- Supported versions of Enterprise Vault in Compliance Accelerator environments
- Prerequisites for Compliance Accelerator
- Configuring Outlook to enable the processing of items with many attachments or many recipients
- Setting the Windows and ASP.NET Temp folder permissions
- Security requirements for temporary folders
- Disabling networking facilities that can disrupt a Compliance Accelerator environment
- Disabling the Windows Search Service on the Compliance Accelerator server
- Ensuring that the Windows Server service is running on the Compliance Accelerator server
- Configuring the SQL Server Agent service
- Assigning SQL Server roles to the Vault Service account
- Installing and configuring the SQL full-text search indexing service
- Verifying that Enterprise Vault expands distribution lists
- Configuring Intelligent Review API Authentication and Authorization
- Installing Compliance Accelerator
- Installing the Compliance Accelerator server software
- Allowing Enterprise Vault to communicate with Compliance Accelerator through the Windows firewall
- Creating the configuration database and customer databases
- Configuring a dedicated server for Intelligent Review processing (optional deployment configuration)
- Configuring Compliance Accelerator for use in a SQL Server Always On environment
- Installing Compliance Accelerator in a clustered environment
- Maximizing security in your Compliance Accelerator databases
- Uninstalling Compliance Accelerator
- Installing the Compliance Accelerator server software
- Appendix A. Ports that Compliance Accelerator uses
- Appendix B. Troubleshooting
- Error messages appear in the event log when upgrading to Compliance Accelerator 15.1
- Enterprise Vault Accelerator Manager service not created
- Enterprise Vault Accelerator Manager service does not start
- "Access is denied" message is displayed when you try to create a customer database on a UAC-enabled computer
- Cannot create or upgrade Compliance Accelerator customer databases when Symantec Endpoint Protection is running
- Error messages when the Intelligent Review (IR) API authentication and authorization fails
- Appendix C. Installing and configuring the Enhanced Auditing feature
- Overview
- Prerequisites for the Enhanced Auditing feature
- Installing the Enhanced Auditing feature
- Post installation steps
- Upgrading the Enhanced Auditing setup
- Modifying the Enhanced Auditing setup
- Repairing the Enhanced Auditing setup
- Uninstalling the Enhanced Auditing setup
- Managing access from Veritas Surveillance
- Appendix D. Introducing Veritas Surveillance web client
Feature comparison: Compliance Accelerator desktop application Vs Veritas Surveillance web application
If you previously used the Compliance Accelerator desktop application and would like to examine the features of both the Compliance Accelerator desktop application and the Veritas Surveillance web application, refer to the table provided below.
Feature | Compliance Accelerator | Veritas Surveillance | Details |
|---|---|---|---|
Only server installation required | No | Yes | Accessing Veritas Surveillance does not require application installation; server installation alone is sufficient. |
Windows-based Authentication and Authorization | Yes | Yes | |
Dashboard: Summary | Yes | Yes | |
Dashboard: Summary: Pin/Unpin Departments | No | Yes | |
Dashboard: Task | Yes | No | Links are provided to perform some tasks. |
Department: User Summary | Yes | Yes | |
Department: User Action | Yes | Yes | |
Department: Department Attributes | Yes | No | |
Department: Role assignment | Yes | Yes | |
Department: Searches | Yes | Yes | |
Department: Searches: Custom Attributes | No | Yes | |
Department: Monitoring Employees | Yes | Yes | |
Department: Archives | Yes | Yes | |
Department: Export | Yes | Yes | |
Department: Hotwords | Yes | Yes | |
Department: Labels | No | Yes | |
Department: Review Comments | No | Yes | |
Research Folders | Yes | No | |
Employees | Yes | Yes | Profile creation and management |
Reports | Yes | Partially yes | |
Monitor | Yes | Yes | |
Application: Roles | Yes | Yes | |
Application: Roles Assignments | Yes | Yes | |
Application: Hotwords | Yes | Yes | |
Application: Label | No | Yes | |
Application: Reviewing Comments | Yes | Yes | |
Application: Searches | Yes | Yes | |
Application: Archives | Yes | Yes | |
Review: Review Pane Actions | Yes | Yes | Copy action is not available in Veritas Surveillance. |
Review: Advanced Filter | No | Yes | Filter on Author/Domain and Subject is provided. |
Review: Filters | Yes | Yes | |
Review: Filters: Sentiment Score | No | Yes | |
Review: Delegate review (on behalf of mode) | Yes | No | |
Review: Printable View | Yes | No | |
Review: Bulk Review | Yes | Yes | |
Review: Review Status | Yes | Yes | |
Review: Research folder review | Yes | Yes | Some actions, such as Escalate, Commit, and Copy are not available in Veritas Surveillance. |
Review: Hit highlight navigation for Hotwords | Yes | Yes | |
Review: Labels | No | Yes | |
Review: Review Comments | No | Yes | |
Review: Hit highlight navigation for Tags | No | Yes | |
Configuration: Search Schedules | Yes | Yes | |
Configuration: Reviewing status | Yes | No | |
Configuration: Import configuration | Yes | No | |
Configuration: Account Information | Yes | No | |
Configuration: Directory Mappings | Yes | No | |
Configuration: Department partitions, Attributes | Yes | No | |
Configuration: Message Types | Yes | No | |
Configuration: Settings | Yes | No | |
Configuration: Audit settings | No | Yes | Modules can be enabled or disabled for auditing purposes. |
Enhanced Auditing | Yes | Yes | |
Audit Viewer | No | Yes | The operations and modifications made to any modules are shown in the . |
Hotword analysis and statistics | Yes | Yes | Hotword analysis is done, and filters and counts are updated to view the statistics. |
Tag (Policy) analysis and statistics | No | Yes | Tag (Policy) analysis is done, and counts are updated to view the statistics. |
Custom attributes | Yes | Yes | |
Intelligent Review | Yes | Yes | |
Advanced Intelligent Review | No | Yes | The relevance score and the reasoning behind classifying the item as Unreviewed Relevant or Unreviewed Irrelevant are provided. Content snippets are added to train the learning model. |
Microsoft Teams Chat and Channel support | No | Yes | |
Audio-Video Transcript support | No | Yes | |
Chinese Wall security | Yes | No | |
Localization of UI and Documentation | Yes | No | Compliance Accelerator user interface and user documentation are translated into Japanese, Chinese Simplified, and Chinese Traditional languages for localization purposes. |