Enterprise Vault™ Compliance Accelerator Installation Guide
- Introducing Compliance Accelerator
- Preparing to install Compliance Accelerator
- Configuration options for Compliance Accelerator
- Supported versions of Enterprise Vault in Compliance Accelerator environments
- Prerequisites for Compliance Accelerator
- Configuring Outlook to enable the processing of items with many attachments or many recipients
- Setting the Windows and ASP.NET Temp folder permissions
- Security requirements for temporary folders
- Disabling networking facilities that can disrupt a Compliance Accelerator environment
- Disabling the Windows Search Service on the Compliance Accelerator server
- Ensuring that the Windows Server service is running on the Compliance Accelerator server
- Configuring the SQL Server Agent service
- Assigning SQL Server roles to the Vault Service account
- Installing and configuring the SQL full-text search indexing service
- Verifying that Enterprise Vault expands distribution lists
- Configuring Intelligent Review API Authentication and Authorization
- Installing Compliance Accelerator
- Installing the Compliance Accelerator server software
- Allowing Enterprise Vault to communicate with Compliance Accelerator through the Windows firewall
- Creating the configuration database and customer databases
- Configuring a dedicated server for Intelligent Review processing (optional deployment configuration)
- Configuring Compliance Accelerator for use in a SQL Server Always On environment
- Installing Compliance Accelerator in a clustered environment
- Maximizing security in your Compliance Accelerator databases
- Uninstalling Compliance Accelerator
- Installing the Compliance Accelerator server software
- Appendix A. Ports that Compliance Accelerator uses
- Appendix B. Troubleshooting
- Error messages appear in the event log when upgrading to Compliance Accelerator 15.1
- Enterprise Vault Accelerator Manager service not created
- Enterprise Vault Accelerator Manager service does not start
- "Access is denied" message is displayed when you try to create a customer database on a UAC-enabled computer
- Cannot create or upgrade Compliance Accelerator customer databases when Symantec Endpoint Protection is running
- Error messages when the Intelligent Review (IR) API authentication and authorization fails
- Appendix C. Installing and configuring the Enhanced Auditing feature
- Overview
- Prerequisites for the Enhanced Auditing feature
- Installing the Enhanced Auditing feature
- Post installation steps
- Upgrading the Enhanced Auditing setup
- Modifying the Enhanced Auditing setup
- Repairing the Enhanced Auditing setup
- Uninstalling the Enhanced Auditing setup
- Managing access from Veritas Surveillance
- Appendix D. Introducing Veritas Surveillance web client
Prerequisites for the Compliance Accelerator server computer
Table: Required software for Compliance Accelerator server installation lists the software items that you must install and configure on the computer that is to run the Compliance Accelerator server software.
Table: Required software for Compliance Accelerator server installation
Item | Notes |
|---|---|
.NET Core | You require the following versions:
See the |
.NET Framework | You require .NET Framework 4.7.2. See the |
Enterprise Vault | If Compliance Accelerator is installed on a separate computer from Enterprise Vault, you must install the Enterprise Vault software on the Compliance Accelerator computer. You require an 15.1 version of one of the following:
See Supported versions of Enterprise Vault in Compliance Accelerator environments. There is no need to configure Enterprise Vault after you have installed it on your Compliance Accelerator server computer; do not run the Enterprise Vault configuration wizard. In addition, if the Enterprise Vault Admin service is running on your Compliance Accelerator server computer, we recommend that you stop it and set its startup type to Disabled. To search on content with Compliance Accelerator, set indexing on the Enterprise Vault archives to full. |
You require IIS 8.0 or later with ASP.NET, IIS 6.0 Management Compatibility, and IP and domain restrictions (for the Auditing Websites). | |
Node.js | You require Node.js (x64) version 14.17.3 or later. See the |
Notes client | You require version 9.0 or later of the Notes client so that client users can export Domino items. Install the client in single-user mode, using the account under which the Accelerator Manager service runs. |
You require Microsoft Outlook 2016, 2019, 2021, and Outlook for M365. Outlook for M365 (32-bit supported on Enterprise Vault/Compliance Accelerator Server) Outlook for M365 (64-bit supported on Windows 10/11 Clients) Add the AttachmentMax and RecipientMax values to the registry on the Compliance Accelerator server to avoid problems when processing items that have many attachments or many recipients. See Configuring Outlook to enable the processing of items with many attachments or many recipients. | |
Visual C++ Redistributable | You require the Microsoft Visual C++ 2015-2019 or later Redistributable (x86). See the |
Web browser | You require any of the following browsers:
For optimum results, do the following:
|
Windows | You require any of the Windows 2016, 2019, and 2022 server. We recommend that you do the following:
|
For the best results, we recommend that you install the Compliance Accelerator server software on a computer that has the following:
At least 16 GB of memory.
Minimum 10 GB space must be available on the hard disk where the Intelligent Review Holding Folder is located.
Sufficient hard drive space to accommodate the searches and export runs that you expect to undertake.
All transaction requests from Veritas Surveillance web application to the Enterprise Vault and Compliance Accelerator servers use the Temp folder of the Vault Service account for temporary storage. Therefore, you must ensure that this folder has sufficient free space to handle large Compliance Accelerator searches and export runs. On both the Compliance Accelerator and Enterprise Vault servers, the Vault Service account's Temp folder must be on a drive that has a minimum of 40 GB of free space. However, 80 GB of free space is preferable.
Exclude the Vault Service account's Temp folders from antivirus scanning.
Multiple hard drives. For example, you might use drive C for the operating system, drive D for the CD or DVD drive, drive E for the Temp folder of the Vault Service account, and drive F for the export output folder. You might split the Windows paging file across drives E and F.
Configure Intelligent Review API Authentication and Authorization. See Configuring Intelligent Review API Authentication and Authorization.