Arctera Enterprise Vault™ eDiscovery Installation Guide

Last Published:
Product(s): Enterprise Vault (15.2)
  1. Introducing eDiscovery
    1.  
      About eDiscovery desktop application
    2.  
      About eDiscovery web application
    3.  
      Feature comparison: Arctera eDiscovery desktop application Vs Arctera eDiscovery web application
    4.  
      Key features of eDiscovery
    5. Product documentation
      1.  
        White papers on the Arctera Support website
      2.  
        eDiscovery training modules
  2. Preparing to install eDiscovery
    1. Configuration options for eDiscovery
      1.  
        eDiscovery configuration for large installations
      2.  
        eDiscovery configuration for smaller installations
    2.  
      Supported versions of Enterprise Vault in eDiscovery environments
    3. Prerequisites for Arctera eDiscovery
      1.  
        Prerequisites for the SQL Server computer
      2.  
        Prerequisites for the Arctera eDiscovery server computer
      3.  
        Prerequisites for the Enterprise Vault server computer
    4.  
      Configuring Outlook to enable the processing of items with many attachments or many recipients
    5.  
      Setting the Windows and ASP.NET Temp folder permissions
    6. Security requirements for temporary folders
      1.  
        Granting additional users and groups access to the temporary folders
    7.  
      Disabling networking facilities that can disrupt a eDiscovery environment
    8.  
      Disabling the Windows Search Service on the eDiscovery server
    9.  
      Ensuring that the Windows Server service is running on the eDiscovery server
    10.  
      Configuring the SQL Server Agent service
    11.  
      Assigning SQL Server roles to the Vault Service account
    12.  
      Installing and configuring the SQL full-text search indexing service
    13.  
      Verifying that Enterprise Vault expands distribution lists
  3. Installing eDiscovery
    1. Installing the eDiscovery server software
      1.  
        Allowing Enterprise Vault to communicate with eDiscovery through the Windows firewall
      2. Creating the configuration database and customer databases
        1.  
          Configuring analytics database locations
      3. Setting up a Insight eDiscovery Custodian Manager website
        1.  
          Assigning the required Active Directory permissions to the Insight eDiscovery Custodian Manager synchronization account
      4.  
        Uploading the eDiscovery report templates
      5. Configuring eDiscovery for use in a SQL Server Always On environment
        1.  
          Using SQL Server Reporting Services in an Always On environment
      6. Installing eDiscovery in a clustered environment
        1.  
          Configuring eDiscovery for use in a Network Load Balancing cluster
      7.  
        Maximizing security in your eDiscovery databases
  4. Appendix A. Ports that eDiscovery uses
    1.  
      Default ports for eDiscovery
    2.  
      Changing the ports that eDiscovery uses
  5. Appendix B. Troubleshooting
    1.  
      Error messages appear in the event log when upgrading to eDiscovery 15.2
    2.  
      Enterprise Vault eDiscovery Manager service not created
    3.  
      Enterprise Vault eDiscovery Manager service does not start
    4.  
      "Access is denied" message is displayed when you try to create a customer database on a UAC-enabled computer
    5.  
      Cannot create or upgrade eDiscovery customer databases when Symantec Endpoint Protection is running
    6.  
      Permissions error when uninstalling the eDiscovery client from a UAC-enabled computer
    7.  
      Uninstalling the eDiscovery client from a shared location may prevent other users from starting the client
  6. Appendix C. Installing and configuring the Enhanced Auditing feature
    1.  
      Overview
    2.  
      Prerequisites for the Enhanced Auditing feature
    3.  
      Installing the Enhanced Auditing feature
    4.  
      Post installation steps
    5.  
      Upgrading the Enhanced Auditing setup
    6.  
      Modifying the Enhanced Auditing setup
    7.  
      Repairing the Enhanced Auditing setup
    8.  
      Uninstalling the Enhanced Auditing setup
    9.  
      Managing access from eDiscovery

Security requirements for temporary folders

Note:

The following article on the Arctera Support website provides comprehensive information on the security requirements:

https://www.veritas.com/docs/100014060

On eDiscovery server and applications, eDiscovery makes occasional use of various folders for temporary storage. To protect against unauthorized access to these folders, which can contain sensitive data, eDiscovery checks access to them on startup and periodically thereafter. If the security check fails on the eDiscovery server, the Enterprise Vault eDiscovery Manager service stops and an error event is recorded in the Arctera Enterprise Vault event log. If the security check fails on a application computer, the user must choose to rerun the check or close the application.

On server computers, eDiscovery checks the security of these folders:

  • The temporary folder of the user who is running the Enterprise Vault eDiscovery Manager service.

  • The folder that you specify as the "ECM Temporary Storage Area" through the Reviewing configuration options in the client. By default, this folder is the Windows %TEMP% folder.

  • The folder that you specify as the "Temporary storage area" through the API configuration options in the eDiscovery client. By default, this folder is also the Windows %TEMP% folder.

On client computers, eDiscovery checks the security of the temporary folder that belongs to the user who is running the client.

In both cases, eDiscovery considers the following to be authorized users:

  • Members of the Built-in groups Administrators, Backup Operators, Domain Administrators, and System Operators

  • The user to whom the temporary folder belongs

  • The Local System account