Enterprise Vault™ Upgrade Instructions
- About this guide
- Before you begin
- Points to note when upgrading
- Installing Outlook on the Enterprise Vault server
- Improved consistency when applying a retention period to items
- Additional points to note when upgrading from Enterprise Vault 11.0 or 11.0.1
- Steps to upgrade your system
- Enterprise Vault server preparation
- Single server: upgrading the Enterprise Vault server software
- Multiple servers: upgrading the Enterprise Vault server software
- Veritas Cluster Server: upgrading the Enterprise Vault server software
- Windows Server Failover Clustering: upgrading the Enterprise Vault server software
- Upgrading standalone Administration Consoles
- Upgrading Enterprise Vault Reporting
- Upgrading MOM and SCOM
- Upgrading Exchange Server forms
- Upgrading Domino mailbox archiving
- Upgrading the FSA Agent
- Upgrading Enterprise Vault Office Mail App
- Upgrading OWA Extensions
- Upgrading SharePoint Server components
- Upgrading SMTP archiving
- Checking the SMTP journaling type configuration
- Upgrading your Enterprise Vault sites to use Enterprise Vault Search
- Setting up provisioning groups for Enterprise Vault Search
- Configuring user browsers for Enterprise Vault Search
- Setting up Enterprise Vault Search Mobile edition
- Upgrading Enterprise Vault API applications
Weak protocols and ciphers are blocked
In a new installation of Enterprise Vault 12.3, or an upgrade to Enterprise Vault 12.3, the Enterprise Vault installer now disables weak protocols and ciphers. Enterprise Vault disables the following protocols, if you have not enabled them manually:
SSL 2.0
SSL 3.0
Weak protocols are managed using registry settings under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
. If you have manually enabled the weak protocols listed above, a registry setting will exist under the Protocols
subkey. Enterprise Vault does not disable a protocol that you have enabled in this way.
Note:
You can also manually disable the TLS 1.0 protocol by following the instructions in this article:
https://www.veritas.com/docs/100041638
By disabling TLS 1.0, you may prevent some Enterprise Vault functionality from working properly. The article above describes how to ensure that this functionality continues to work as expected.
Enterprise Vault disables the following ciphers:
TLS_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_RC4_128_MD5
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Ciphers are managed using registry settings under HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Cryptography\Configuration\SSL\00010002
. Enterprise Vault disables all of the weak ciphers listed above, even if you have enabled any of them using a registry setting under the Ciphers
subkey.