Arctera Enterprise Vault™ eDiscovery Installation Guide
- Introducing eDiscovery
- Preparing to install eDiscovery
- Configuration options for eDiscovery
- Prerequisites for Arctera eDiscovery
- Security requirements for temporary folders
- Installing eDiscovery
- Installing the eDiscovery server software
- Creating the configuration database and customer databases
- Setting up a Insight eDiscovery Custodian Manager website
- Configuring eDiscovery for use in a SQL Server Always On environment
- Installing eDiscovery in a clustered environment
- Installing the eDiscovery server software
- Appendix A. Ports that eDiscovery uses
- Appendix B. Troubleshooting
- Appendix C. Installing and configuring the Enhanced Auditing feature
Security requirements for temporary folders
Note:
The following article on the Arctera Support website provides comprehensive information on the security requirements:
On eDiscovery server and applications, eDiscovery makes occasional use of various folders for temporary storage. To protect against unauthorized access to these folders, which can contain sensitive data, eDiscovery checks access to them on startup and periodically thereafter. If the security check fails on the eDiscovery server, the Enterprise Vault eDiscovery Manager service stops and an error event is recorded in the Arctera Enterprise Vault event log. If the security check fails on a application computer, the user must choose to rerun the check or close the application.
On server computers, eDiscovery checks the security of these folders:
The temporary folder of the user who is running the Enterprise Vault eDiscovery Manager service.
The folder that you specify as the "ECM Temporary Storage Area" through the Reviewing configuration options in the client. By default, this folder is the Windows
%TEMP%
folder.The folder that you specify as the "Temporary storage area" through the API configuration options in the eDiscovery client. By default, this folder is also the Windows
%TEMP%
folder.
On client computers, eDiscovery checks the security of the temporary folder that belongs to the user who is running the client.
In both cases, eDiscovery considers the following to be authorized users:
Members of the Built-in groups Administrators, Backup Operators, Domain Administrators, and System Operators
The user to whom the temporary folder belongs
The Local System account