Veritas Alta™ eDiscovery User Guide
- About Veritas Alta eDiscovery
- Getting started with Alta eDiscovery
- Alta eDiscovery roles
- Managing investigations
- About Investigations
- About Targeted Collections
- Configuring Targeted Collection for Microsoft Teams
- Configuring Targeted Collection for OneDrive for Business
- Configuring Targeted Collection for Exchange Online
- Configuring Targeted Collection for Enterprise Vault
- Configuring Targeted Collection for data import
- Creating collection sets from archived targeted collector
- About Managed Accounts
- About Searches in investigation
- Working with searched emails
- Working with searched collaboration messages
- Working with searched files
- Working with Advanced ECA searches
- Creating an Advanced ECA search
- Updating an Advanced ECA search
- Filtering an Advanced ECA search
- Applying tags to the Advanced ECA search items
- Applying labels to the Advanced ECA search items
- Exporting the Advanced ECA search items
- Exporting an Advanced ECA search summary report
- Reassigning emails from the Advanced ECA search
- Printing the selected Advanced ECA searched items
- Deleting an Advanced ECA search
- About Mail Reassignment
- About labels
- About legal holds
- About Tags
- Managing cases
- Managing case documents
- Managing redaction reasons
- Managing reviews
- About reviewing cases
- Reviewing emails
- Reviewing collaboration messages
- Accessing collaboration messages for review
- Applying tags to collaboration messages
- Applying legal hold to collaboration messages
- Applying and removing review status to collaboration message
- Exporting collaboration messages
- Exporting a search summary report for collaboration messages
- Adding notes to collaborative messages
- Viewing audit history of collaborative messages
- Reviewing files
- Annotating and redacting email and file content in native viewer
- Managing production sets
- Annotating and redacting content in native viewer
- Managing exports
- Collaborative reports
- Alta eDiscovery alerts
- Email Continuity
- Methods for searching cases and accounts
- Performing Advanced Search and Query Search
- Search syntax for Advanced Search
- About stop words and special characters
- Phrase searches
- Boolean operator searches
- Wildcard searches
- Proximity searches
- Double-byte character set searches
- About enhanced searches in Japanese
- Searchable attachment types
- Search examples and tips
- Methods for searching tables and reports
- Alta eDiscovery Frequently Asked Questions
- Best practices, limitations, and known issues
- Alta eDiscovery updates in previous releases
Administrator role
Available Alta eDiscovery tabs: , tabs in the left navigation pane, and the and option on the Profile icon in the top-right corner of the application page.
The role is for company administrators who need to configure and manage Alta eDiscovery, or for HR personnel who need to monitor employee email usage.
roles must be assigned the privilege in the Veritas Alta View Compliance and Governance Management Console if they are to monitor email usage. Unlike the accounts with the role, the accounts with the role cannot be granted access to selected accounts only.
Accounts with the role and with the privilege can be assigned to cases as reviewers, and can act as reviewers in the same way as the accounts with the role.
Administrators can also receive email notifications each time a message is flagged in the Alerts area.
Note:
Accounts with the role can be assigned additional privileges in Archive Administration, including the privileges that can be conferred by built-in group roles. The accounts with the role that are also assigned the built-in role have full access to all the features of Alta eDiscovery.
The eDiscovery Administrators can configure and manage all aspects of Alta eDiscovery, including the following:
Creating, viewing, and editing cases
Managing reviewers
Adding and editing labels
Assigning review status tags to emails
Managing case review status tags
Managing searches under cases
Exporting emails from cases
Viewing logs and saving reports
Given the sensitive nature of the information available to administrators, they should take special care to protect their logon credentials.