Arctera Enterprise Vault™ Insight Surveillance Installation Guide

Last Published:
Product(s): Enterprise Vault (15.2)
  1. Introducing Insight Surveillance
    1.  
      About Insight Surveillance desktop application
    2.  
      About Insight Surveillance web application
    3.  
      Feature comparison: Arctera Insight Surveillance desktop application Vs Arctera Insight Surveillance web application
    4. Product documentation
      1.  
        White papers on the Arctera Support website
  2. Preparing to install Insight Surveillance
    1. Configuration options for Insight Surveillance
      1.  
        Insight Surveillance configuration for large installations
      2.  
        Insight Surveillance configuration for smaller installations
    2.  
      Supported versions of Enterprise Vault in Insight Surveillance environments
    3. Prerequisites for Arctera Insight Surveillance
      1.  
        Prerequisites for the SQL Server computer
      2.  
        Prerequisites for the Arctera Insight Surveillance server computer
      3.  
        Prerequisites for the Enterprise Vault server computer
      4. Prerequisites for Insight Surveillance
        1.  
          Additional requirements for Arctera Insight Surveillance
        2.  
          Set Kerberos Trusted Delegation
    4.  
      Configuring Outlook to enable the processing of items with many attachments or many recipients
    5.  
      Setting the Windows and ASP.NET Temp folder permissions
    6. Security requirements for temporary folders
      1.  
        Granting additional users and groups access to the temporary folders
    7.  
      Disabling networking facilities that can disrupt a Insight Surveillance environment
    8.  
      Disabling the Windows Search Service on the Insight Surveillance server
    9.  
      Ensuring that the Windows Server service is running on the Insight Surveillance server
    10.  
      Configuring the SQL Server Agent service
    11.  
      Assigning SQL Server roles to the Vault Service account
    12.  
      Installing and configuring the SQL full-text search indexing service
    13.  
      Verifying that Enterprise Vault expands distribution lists
    14. Configuring Intelligent Review API Authentication and Authorization
      1.  
        Setting Kerberos trusted delegation between Surveillance Servers and Surveillance Database Servers
      2.  
        Setting Kerberos trusted delegation between Surveillance Servers and Surveillance Database Servers on IP address
  3. Installing Insight Surveillance
    1. Installing the Insight Surveillance server software
      1.  
        Allowing Enterprise Vault to communicate with Insight Surveillance through the Windows firewall
      2.  
        Creating the configuration database and customer databases
      3.  
        Configuring a dedicated server for Intelligent Review processing (optional deployment configuration)
      4. Configuring Insight Surveillance for use in a SQL Server Always On environment
        1.  
          Using SQL Server Reporting Services in an Always On environment
      5. Installing Insight Surveillance in a clustered environment
        1.  
          Configuring Insight Surveillance for use in a Network Load Balancing cluster
      6.  
        Maximizing security in your Insight Surveillance databases
    2.  
      Uninstalling Insight Surveillance
  4. Appendix A. Ports that Insight Surveillance uses
    1.  
      Default ports for Insight Surveillance
    2.  
      Changing the ports that Insight Surveillance uses
  5. Appendix B. Troubleshooting
    1.  
      Error messages appear in the event log when upgrading to Insight Surveillance 15.2
    2.  
      Enterprise Vault eDiscovery Manager service not created
    3.  
      Enterprise Vault eDiscovery Manager service does not start
    4.  
      "Access is denied" message is displayed when you try to create a customer database on a UAC-enabled computer
    5.  
      Cannot create or upgrade Insight Surveillance customer databases when Symantec Endpoint Protection is running
    6.  
      Error messages when the Intelligent Review (IR) API authentication and authorization fails
  6. Appendix C. Installing and configuring the Enhanced Auditing feature
    1.  
      Overview
    2.  
      Prerequisites for the Enhanced Auditing feature
    3.  
      Installing the Enhanced Auditing feature
    4.  
      Post installation steps
    5.  
      Upgrading the Enhanced Auditing setup
    6.  
      Modifying the Enhanced Auditing setup
    7.  
      Repairing the Enhanced Auditing setup
    8.  
      Uninstalling the Enhanced Auditing setup
    9.  
      Managing access from Arctera Insight Surveillance

Installing the Insight Surveillance server software

Follow the instructions in this section to perform a first-time installation of the Insight Surveillance server software. If you want to upgrade an existing Insight Surveillance installation, see the CAUpgradeInstructions file.

Before you proceed, note the following:

  • You must install this software as the Vault Service account.

  • Installing this software on a computer on which you have also installed the eDiscovery server software is not supported.

  • You can configure Insight Surveillance for use in a Network Load Balancing cluster. However, installing the software on the nodes in other types of clusters is not supported.

    See Installing Insight Surveillance in a clustered environment.

To install the Insight Surveillance server software

  1. Load the release media, and then do one of the following:

    • When the Install Launcher starts, follow the links to install the Insight Surveillance server software.

    • In Windows Explorer, browse to the Arctera Enterprise Vault Insight Surveillance\Server folder, and then run setup.exe.

      The setup.exe program launches the Windows Installer (.msi) package that is in the same folder with elevated privileges. This is necessary to enable the installation to complete all of its processes.

  2. On the Welcome screen, click Next.

    The installer navigates you to the Settings section, where you can configure the values required for the Surveillance and the Arctera Insight Surveillance installation.

  3. On the Prerequisites screen, scroll up and down to view the list of hardware and software required for the Surveillance and the Arctera Insight Surveillance installation.

    If you meet the listed prerequisites, select the I have read and met the above prerequisites check box and then click Next.

  4. On the Prerequisite Status screen, the installer performs a check for all required software. When the prerequisite check is completed, click Next.
  5. On the End-User License Agreement screen, read the Arctera Software License Agreement. If you agree the terms, select the I accept the terms in the License Agreement check box and then click Next.
  6. On the Choose Setup Type screen, choose between the following setup types:

    Typical

    Lets you install all the components. This option is recommended for most users.

    After you click Typical, The default path is displayed. Ensure that the path to the folder where you want to install Surveillance is appropriate. If not, click Browse to select path of the appropriate folder.

    Custom

    Lets you select or remove the components as per your requirement.

    Note:

    It is recommended to install the Surveillance website, as it provides functionality for some of the Surveillance reports.

    Note:

    While configuring Insight Surveillance, specify details, such as Server Alias, Internal Port, and Website Port and ensure that you meet the additional prerequisites as needed.

  7. On the Accelerator Service Account Login screen, provide the accelerator service account details such as Domain, Username, and Password. Click Next.
  8. On the Intelligent Review Configuration screen, specify the following details, and click Next.

    Server Alias

    DNS Alias name or machine name for the Surveillance server.

    Port

    Port for the IRAPIEndPoint Website. By default, its value is 449. If required, user can change it to valid available port number.

    Holding Folder path

    A directory where files of the Intelligent Review features will be stored temporarily.

  9. Click Next.
  10. On the Ready to install screen, click Install to start Surveillance installation.
  11. If you have chosen to install the eDiscovery Manager service then, when the installation program has finished, select the option to display the Enterprise Vault eDiscovery Manager website. Then you can create the configuration database and customer databases.

    The installation program automatically opens the eDiscovery Manager website with administrator privileges if you have installed Insight Surveillance on a server in which User Account Control (UAC) is enabled. (This is a requirement when accessing the website in such environments.) If UAC is not enabled, a Run As dialog box may prompt you for the name and password of the user account under which to access the website. Enter the details of the Vault Service account with which you manage your Enterprise Vault server.

  12. If you have chosen to install the Arctera Insight Surveillance, then after installation, select the option to restart the Enterprise Vault eDiscovery Manager service (EVAMS) and Internet Information Services (IIS). You can use the Services snap-in to Microsoft Management Console to restart the Enterprise Vault eDiscovery Manager service. For IIS, you should first stop EVAMS, run the iisreset command in an Administration Command Prompt, and then start EVAMS.
  13. To ensure that all the endpoints are encrypted, Surveillance generates self-signed certificates for the IRAPIEndPoint web application during configuration. It is recommended to replace such self-signed certificates with certificates signed by well-known authorities. Import these certificates into all Enterprise Vault Storage servers and then add these certificates to the Trusted Root Certification Authorities store. If there are multiple Surveillance servers, import the certificates from all these servers.
  14. To ensure that all the endpoints are encrypted, Surveillance generates self-signed certificates for the default websites during configuration. It is recommended to replace such self-signed certificates with certificates signed by well-known authorities.