Enterprise Vault™ Compliance Accelerator Administrator's Guide
- Overview and latest updates
- Understanding Veritas Surveillance
- Configuring Compliance Accelerator Desktop Client
- Customizing the reviewing action statuses
- Importing configuration data from an XML file
- Specifying the Windows domains with which to synchronize employee details
- Mapping employee properties to Active Directory or Domino directory attributes
- Grouping departments into partitions
- Setting up department attributes
- Setting up custom message types
- Setting Compliance Accelerator system configuration options
- Ad Hoc Searches configuration options
- Diagnostics configuration options
- Document Conversion configuration options
- Export/production configuration options
- General configuration options
- Home Page configuration options
- Hotword Analysis configuration options
- Item Prefetch Cache configuration options
- Item Prefetch Cache (Advanced) configuration options
- Policy Integration configuration options
- Profile Synchronization configuration options
- Random Capture configuration options
- Reviewing configuration options
- Search configuration options
- Security configuration options
- System configuration options
- Vault Directory Synchronization configuration options
- Creating and viewing reports
- About the Compliance Accelerator reports
- Accessing data through the Microsoft SQL Server Reporting Services (SSRS)
- Enhanced reporting
- Accessing reports through the OData web service
- Configuring a Power BI template for reporting
- Appendix A. Troubleshooting
- Veritas Surveillance user interface user interface is not displayed properly in non-English environment
- Issues with the random sampling of items
- Display issues when you open a Compliance Accelerator website in Internet Explorer 10 or later
- Vault stores not displayed in the Veritas Surveillance web client
- TNEF-encoded attachments to Internet Mail (.eml) messages may not be readable after you export the messages from a review set
- Synchronization errors after you rename the SQL Server computer
- Performance counter errors when the Accelerator Manager service starts
- SQL Service Broker warning when restoring a customer database to a different server
- Error messages when the Intelligent Review (IR) API authentication and authorization fails
- Known issues after enabling FIPS
Security configuration options
Use these settings to implement Chinese walls security restrictions on what users can access in Compliance Accelerator.
A Chinese wall is a metaphor used to refer to the practice of ensuring that different parts of an organization are kept apart so that information does not circulate freely and to prevent conflicts of interest. By implementing Chinese walls, you can stop users in one part of your organization from giving access to departments and folders to users in another part of the organization.
|
Bypass Department Users Permissions check when removing all roles |
Lets users who do not have the Manage Department User permission remove Department Users from departments. |
|
Enable Chinese Wall Department Users |
Prevents users from being assigned to roles in a department unless they have first been assigned to the Department User role in that department. |
Use SQL Server SysAdmin Server Role for Schedules | When selected, makes the SQL Server sysadmin logon the creator and owner of Compliance Accelerator search schedules. If you want to lock down your SQL Server instance, clear this setting and consult the following article on the Veritas Support website for further instructions: |