Enterprise Vault™ Discovery Accelerator Administrator's Guide

Last Published:
Product(s): Enterprise Vault (12.3)
  1. Introducing Discovery Accelerator
    1.  
      Key features of Discovery Accelerator
    2.  
      About the Discovery Accelerator components
    3.  
      The Discovery Accelerator process
    4.  
      About the deduplication feature in Discovery Accelerator
    5. Product documentation
      1.  
        White papers on the Veritas Support website
      2.  
        Discovery Accelerator training modules
  2. Introducing the Discovery Accelerator client
    1.  
      About the Discovery Accelerator client
    2.  
      Opening the Discovery Accelerator client
    3.  
      Finding your way around the Discovery Accelerator client
  3. Setting up and assigning roles
    1.  
      About the predefined Discovery Accelerator roles
    2. About the Discovery Accelerator permissions
      1.  
        About the facility to allow or deny permissions
    3.  
      Creating Discovery Accelerator roles
    4.  
      Editing the properties of Discovery Accelerator roles
    5.  
      Assigning Discovery Accelerator roles to users
    6.  
      Deleting Discovery Accelerator roles
  4. Working with cases
    1.  
      About Discovery Accelerator cases
    2.  
      Opening new Discovery Accelerator cases
    3.  
      Checking the progress of Discovery Accelerator cases
    4. Implementing analytics in Discovery Accelerator cases
      1.  
        Enabling a Discovery Accelerator case for analytics
      2.  
        Monitoring the progress of analytics data collection
      3.  
        Pausing and resuming analytics on a Discovery Accelerator case
      4.  
        Speeding up analytics data collection in low-bandwidth environments
      5.  
        Disabling analytics on a Discovery Accelerator case
    5.  
      Deleting Discovery Accelerator cases
  5. Setting up review marks and tags
    1.  
      About review marks
    2.  
      Creating review marks
    3.  
      How retained marks work
    4.  
      Editing review marks
    5.  
      Customizing the review marks that are associated with individual cases
    6.  
      Creating tags
    7. Creating tag groups
      1.  
        Creating a single-choice tag group
      2.  
        Creating a multiple-choice tag group
  6. Using rules to mark and tag items automatically
    1.  
      About analytics rules
    2. Creating analytics rules
      1.  
        About the search attributes
      2. About the operators
        1.  
          Guidelines on using the NEAR operator condition in Discovery Accelerator rules
      3.  
        About SQL Server stopwords
    3.  
      Overriding manual categorization
    4.  
      Editing analytics rules
    5.  
      Changing the priority levels of marking rules
    6.  
      About tagging rules
    7. Manually editing queries in analytics rule definition language (RDL)
      1.  
        Using parentheses to set Boolean precedence in analytics RDL
      2.  
        Using stemming in analytics RDL
      3.  
        Specifying custodian and target values in analytics RDL
    8.  
      Deleting analytics rules
  7. Using Custodian Manager
    1.  
      About Custodian Manager
    2.  
      Guidelines on using Custodian Manager
    3.  
      Setting up custodians
    4.  
      Setting up custodian groups
    5.  
      Setting up custom custodian attributes
    6.  
      Setting the primary custodian attribute
    7.  
      Specifying the user account under which to synchronize custodians
    8.  
      Synchronizing with entire Active Directory domains and Domino servers
    9.  
      Setting the configuration options for Custodian Manager
  8. Searching for items
    1. About searching with Discovery Accelerator
      1.  
        Limitations on searching certain types of Skype for Business content
    2.  
      Creating and running Discovery Accelerator searches
    3.  
      About the search criteria options
    4.  
      Guidelines on conducting effective searches
    5.  
      Pausing and resuming Discovery Accelerator searches
    6.  
      About the Monitor Searches tab
    7.  
      Selecting the archives in which to search
    8.  
      Specifying the details of custom search attributes
    9. Defining email targets with Address Manager
      1.  
        Setting up targets
      2.  
        Adding targets to target groups
    10. Building Discovery Accelerator search schedules
      1.  
        Setting up new search schedules
      2.  
        Examples of recurring search schedules
    11.  
      Using Discovery Accelerator to search archived Skype for Business content
  9. Manually reviewing items
    1. About reviewing with Discovery Accelerator
      1.  
        Limitations on reviewing certain types of Skype for Business content
    2.  
      About the Review pane
    3.  
      Filtering the items in the Review pane
    4. Searching within the review set
      1.  
        Conducting quick searches
      2.  
        Conducting advanced searches
    5.  
      Finding all items in the same conversation
    6.  
      Assigning review marks and tags to items
    7.  
      Adding comments to items
    8.  
      Viewing the history of items
    9.  
      Displaying printable versions of items
    10.  
      Downloading the original versions of items
    11.  
      Copying the item list to the Clipboard
    12. Deleting items from Enterprise Vault archives
      1.  
        Limitations on reviewing items after you have deleted them
    13.  
      Changing how the Review pane looks
    14.  
      Setting your Review pane preferences
  10. Working with research folders
    1.  
      About research folders
    2.  
      Creating research folders
    3.  
      Editing the properties of research folders
    4.  
      Copying items to research folders
    5.  
      Reviewing the items in research folders
    6.  
      Exporting items from research folders
    7.  
      Giving other users access to your research folders
    8.  
      Removing items from research folders
    9.  
      Converting research folders into cases
    10.  
      Deleting folders
  11. Exporting and producing items
    1. About exporting and producing items
      1.  
        Limitations on exporting certain types of content
    2.  
      How exporting differs from producing
    3.  
      Performing an export or production run
    4.  
      About the limits on the number of simultaneous export and production runs
    5.  
      Identifying the archives that contain duplicates of a specific item
    6.  
      How to optimize export and production runs
    7.  
      Making the export IDs or Bates numbers visible in Microsoft Outlook
  12. Creating and viewing reports
    1.  
      About the Discovery Accelerator reports
    2.  
      Creating Discovery Accelerator reports
    3. Available Discovery Accelerator reports
      1.  
        Archive Source report
      2.  
        Case History report
      3.  
        Export Run Duplicates report
      4.  
        Item Detail report
      5.  
        Legal Holds report
      6.  
        Production Run report
      7.  
        Production Run Duplicates report
      8.  
        Productions report
      9.  
        Searches report
      10.  
        Security report
    4.  
      Viewing existing reports
    5.  
      Deleting reports
    6. About viewing Discovery Accelerator datasets using the OData web service
      1.  
        Available Discovery Accelerator datasets
      2.  
        Accessing the Discovery Accelerator datasets
      3.  
        Using the OData service with Microsoft Excel
      4.  
        Using the OData service with Microsoft SQL Server Reporting Services (SSRS)
  13. Appendix A. Customizing Discovery Accelerator
    1. Setting Discovery Accelerator system configuration options
      1.  
        Ad Hoc Searches configuration options
      2.  
        Analytics Conversation Analysis configuration options
      3.  
        Analytics Data Collection configuration options
      4.  
        API configuration options
      5.  
        Auditing configuration options
      6.  
        Diagnostics configuration options
      7.  
        Document Conversion configuration options
      8.  
        Export/production configuration options
      9.  
        General configuration options
      10.  
        Home Page configuration options
      11.  
        Item Prefetch Cache configuration options
      12.  
        Item Prefetch Cache (Advanced) configuration options
      13.  
        Legal Hold configuration options
      14.  
        Policy Integration configuration options
      15.  
        Privileged Delete configuration options
      16.  
        Profile Synchronization configuration options
      17.  
        Reviewing configuration options
      18.  
        Search configuration options
      19.  
        Security configuration options
      20.  
        System configuration options
      21.  
        Vault Directory Synchronization configuration options
    2.  
      Customizing the columns in the Review pane
  14. Appendix B. Importing configuration data from an XML file
    1.  
      About importing configuration data
    2.  
      Sample XML files
    3.  
      Format of the Dataload.xml file
    4.  
      Format of the dataload XML file for Custodian Manager
    5.  
      Importing the configuration data
    6. About the ImportExport command
      1.  
        ImportExport syntax
      2.  
        Examples of ImportExport commands
  15. Appendix C. Enterprise Vault properties for use in Discovery Accelerator searches
    1.  
      About the Enterprise Vault search properties
    2.  
      System properties
    3.  
      Custom Enterprise Vault properties
    4.  
      Custom Enterprise Vault properties for File System Archiving items
    5.  
      Custom Enterprise Vault properties for SharePoint items
    6.  
      Custom Enterprise Vault properties for Compliance Accelerator-processed items
    7.  
      Custom properties for use by policy management software
    8.  
      Custom properties for Enterprise Vault SMTP Archiving
  16. Appendix D. Troubleshooting
    1.  
      A security warning may appear when you preview certain items in the Review pane of the Discovery Accelerator client
    2.  
      Display issues when you run the Discovery Accelerator client in Windows 8 or later
    3.  
      Display issues when you open a Discovery Accelerator website in Internet Explorer 10 or later
    4.  
      Vault stores not displayed in the Discovery Accelerator client
    5.  
      Discovery Accelerator searches return unexpected results
    6.  
      Full-text search indexing is disabled by default in SQL Server
    7.  
      Errors when exporting items from Discovery Accelerator
    8.  
      TNEF-encoded attachments to Internet Mail (.eml) messages may not be readable after you export the messages from a review set
    9.  
      Synchronization errors after you rename the SQL Server computer
    10.  
      Performance counter errors when the Accelerator Manager service starts
    11.  
      SQL Service Broker warning when restoring a customer database to a different server
    12. Issues with Custodian Manager
      1.  
        Custodian Manager lets you synchronize multiple custodians with the same Active Directory account
      2.  
        Custodian Manager does not list the members of a custodian group after you delete the group and then restore it by synchronizing with Active Directory
      3.  
        If a custodian belongs to one Active Directory domain but is a member of a group in a second domain, Custodian Manager may not update the custodian's details when it synchronizes with the second domain
      4.  
        Custodian Manager fails to synchronize with Domino LDAP users and groups whose names contain certain double-byte characters
    13. Issues with Discovery Accelerator reports
      1.  
        You receive the message "An error occurred creating the report" when you try to generate reports
      2.  
        Prompt to install SQL Server when printing a report for the first time
      3.  
        Reports that you export as CSV may not open properly in Microsoft Excel
      4.  
        Garbled Japanese characters when exporting reports in Acrobat format
      5.  
        Troubleshooting OData errors
    14.  
      Troubleshooting Privileged Delete failures

About the search attributes

Table: Search attributes lists all the available attributes. For each attribute, the table shows the operators that you can use with the attribute, and describes its purpose.

Table: Search attributes

Attribute

Type

Accepted operators

Description

AttachmentsCount

Numeric

=

>

>=

<

<=

Use AttachmentsCount to add a condition that is based on the number of email attachments.

Author

String

CONTAINS

ANYOF

NOT CONTAINS

NOT ANYOF

Use Author to add a condition that is based on the email's sender.

Enclose full names in double quotation marks ("). You can also type first names, last names, or middle names individually.

Values that correspond to targets (T:), target groups (TG:), custodians (C:), and custodian groups (CG:) must be on a separate line. Prefixes such as T: and TG: must be in upper case.

Identify custodians by their primary attribute values, and custodian groups, targets, and target groups by their display names.

AuthorOrRecipients

String

CONTAINS

ANYOF

NOT CONTAINS

NOT ANYOF

AuthorOrRecipients is a composite attribute that lets you add a condition that is based on senders and recipients in any of the following attributes:

  • From

  • To

  • CC

  • BCC

Enclose full names in double quotation marks ("). You can also type first names, last names, or middle names individually.

Values that correspond to targets (T:), target groups (TG:), custodians (C:), and custodian groups (CG:) must be on a separate line. Prefixes such as T: and TG: must be in upper case.

Identify custodians by their primary attribute values, and custodian groups, targets, and target groups by their display names.

BCC

String

CONTAINS

ANYOF

ALLOF

NOT CONTAINS

NOT ALLOF

NOT ANYOF

Use BCC to add a condition that is based on the email's BCC recipients.

Enclose full names in double quotation marks ("). You can also type first names, last names, or middle names individually.

Values that correspond to targets (T:), target groups (TG:), custodians (C:), and custodian groups (CG:) must be on a separate line. Prefixes such as T: and TG: must be in upper case.

Identify custodians by their primary attribute values, and custodian groups, targets, and target groups by their display names.

CC

String

CONTAINS

ANYOF

ALLOF

NOT CONTAINS

NOT ALLOF

NOT ANYOF

Use CC to add a condition that is based on the email's CC recipients.

Enclose full names in double quotation marks ("). You can also type first names, last names, or middle names individually.

Values that correspond to targets (T:), target groups (TG:), custodians (C:), and custodian groups (CG:) must be on a separate line. Prefixes such as T: and TG: must be in upper case.

Identify custodians by their primary attribute values, and custodian groups, targets, and target groups by their display names.

Content

String

CONTAINS

ANYOF

ALLOF

NEAR

NOT CONTAINS

NOT ALLOF

NOT ANYOF

Use Content to add a condition that is based on a string in the body of the email, or in the file's content.

Enclose any phrases in double quotation marks ("). For all the accepted operators except NEAR, you can choose to turn search stemming on or off. Discovery Accelerator does not expand distribution lists when you use the NEAR operator, even if you select the option to do so elsewhere in the rule builder.

Values that correspond to targets (T:), target groups (TG:), custodians (C:), and custodian groups (CG:) must be on a separate line. Prefixes such as T: and TG: must be in upper case.

Identify custodians by their primary attribute values, and custodian groups, targets, and target groups by their display names.

Custom

String

=

NOT =

CONTAINS

ANYOF

ALLOF

NOT CONTAINS

NOT ALLOF

NOT ANYOF

Use Custom to add a condition that is based on any custom attributes created during archiving. Enter the name of the custom attribute before you select an operator and enter the search string.

For example:

Custom.Veritas.MyAttribute CONTAINS "Veritas"

Enclose phrases in double quotation marks ("). If you select the ANYOF or NOT ANYOF operator, you can separate multiple values with commas.

Values that correspond to targets (T:), target groups (TG:), custodians (C:), and custodian groups (CG:) must be on a separate line. Prefixes such as T: and TG: must be in upper case.

Identify custodians by their primary attribute values, and custodian groups, targets, and target groups by their display names.

Direction

List

=

ANYOF

NOT =

NOT ANYOF

Use Direction to add a condition that is based on the direction of the email. Acceptable values are:

  • Internal

  • External Inbound

  • External Outbound

  • Not Specified

FileExtension

String

ANYOF

CONTAINS

NOT ANYOF

NOT CONTAINS

Use FileExtension to add a condition that is based on email extension type and file types. Enter multiple file types as a list. For example:

DOC PDF MSG

Enclose phrases in double quotation marks ("). If you select the ANYOF or NOT ANYOF operator, you can separate multiple values with commas.

Importance

List

=

ANYOF

NOT =

NOT ANYOF

Use Importance to add a condition that is based on the email's importance setting. Acceptable values are:

  • Low

  • Normal

  • High

MailDate

Date

=

>

>=

<

<=

BETWEEN

NOT BETWEEN

Use MailDate to add a condition that is based on the date the email was sent, and on the modified date of email's attachments.

When you use the BETWEEN and the NOT BETWEEN operators, you must specify start and end dates.

MessageClass

String

ANYOF

CONTAINS

NOT ANYOF

NOT CONTAINS

Use MessageClass to add a condition that is based on the email's MAPI message class setting. For example:

IPM.Note.

Enclose phrases in double quotation marks ("). If you select the ANYOF or NOT ANYOF operator, you can separate multiple values with commas.

MessageType

List

=

ANYOF

NOT =

NOT ANYOF

Use MessageType to add a condition that is based on the email's type. Acceptable values are:

  • Bloomberg

  • Domino Mail

  • Exchange Mail

  • Fax

  • File

  • Instant Messaging

  • SharePoint

  • SMTP Mail

  • Social

ModifiedDate

Date

=

>

>=

<

<=

BETWEEN

NOT BETWEEN

Use to ModifiedDate to add a condition that is based on the date the email or file was last modified.

When you use the BETWEEN and the NOT BETWEEN operators, you must specify start and end dates.

OriginalLocation

String

ANYOF

CONTAINS

NOT ANYOF

NOT CONTAINS

Use OriginalLocation to add a condition that is based on the original location of the email or file. For example:

  • Inbox

  • Sent items

  • \\server\share\Sales

Enclose phrases in double quotation marks ("). If you select the ANYOF or NOT ANYOF operator, you can separate multiple values with commas.

Recipients

String

CONTAINS

ANYOF

NOT CONTAINS

NOT ANYOF

Recipients is a composite attribute that lets you add a condition that is based on recipients in any of the following attributes:

  • To

  • CC

  • BCC

Values that correspond to targets (T:), target groups (TG:), custodians (C:), and custodian groups (CG:) must be on a separate line. Prefixes such as T: and TG: must be in upper case.

RetentionCategoryDisplayName

String

CONTAINS

NOT CONTAINS

Use RetentionCategoryDisplayName to add a condition that is based on the retention categories under which the item was archived. For example:

General retention category

RetentionExpiryDate

Date

=

>

>=

<

<=

BETWEEN

NOT BETWEEN

Use RetentionExpiryDate to add a condition that is based on the date the email or file is due to expire. The retention category under which the item was archived determines the expiry date.

When you use the BETWEEN and the NOT BETWEEN operators, you must specify start and end dates.

Sensitivity

List

=

ANYOF

NOT =

Use Sensitivity to add a condition that is based on the sensitivity of the email. Acceptable values are:

  • Normal

  • Personal

  • Private

  • Confidential

Size

Numeric

=

>

>=

<

<=

Use Size to add a condition that is based on the size of the email or file.

Subject

String

CONTAINS

ALLOF

ANYOF

NEAR

NOT CONTAINS

NOT ALLOF

NOT ANYOF

Use Subject to add a condition that is based on strings in the email's subject, and in file names.

Enclose any phrases in double quotation marks ("). For all the accepted operators except NEAR, you can choose to turn search stemming on or off. Discovery Accelerator does not expand distribution lists when you use the NEAR operator, even if you select the option to do so elsewhere in the rule builder.

Values that correspond to targets (T:), target groups (TG:), custodians (C:), and custodian groups (CG:) must be on a separate line. Prefixes such as T: and TG: must be in upper case.

Identify custodians by their primary attribute values, and custodian groups, targets, and target groups by their display names.

SubjectOrContent

String

CONTAINS

ALLOF

ANYOF

NEAR

NOT CONTAINS

NOT ALLOF

NOT ANYOF

SubjectOrContent is a composite attribute that lets you add a condition that is based on strings in either of the following attributes:

  • Subject

  • Body

This attribute is also used to match using strings in a file's name or content.

Enclose any phrases in double quotation marks ("). For all the accepted operators except NEAR, you can choose to turn search stemming on or off. Discovery Accelerator does not expand distribution lists when you use the NEAR operator, even if you select the option to do so elsewhere in the rule builder.

Values that correspond to targets (T:), target groups (TG:), custodians (C:), and custodian groups (CG:) must be on a separate line. Prefixes such as T: and TG: must be in upper case.

Identify custodians by their primary attribute values, and custodian groups, targets, and target groups by their display names.

To

String

CONTAINS

ANYOF

ALLOF

NOT CONTAINS

NOT ALLOF

NOT ANYOF

Use To to add a condition that is based on the email's recipients.

Enclose full names in double quotation marks ("). You can also type first names, last names, or middle names individually.

Values that correspond to targets (T:), target groups (TG:), custodians (C:), and custodian groups (CG:) must be on a separate line. Prefixes such as T: and TG: must be in upper case.

Identify custodians by their primary attribute values, and custodian groups, targets, and target groups by their display names.