Veritas Enterprise Vault™ Installing and Configuring

Last Published:
Product(s): Enterprise Vault (12.1)
  1. About this guide
    1.  
      When to use this guide
    2.  
      Introducing this guide
    3. Where to get more information about Enterprise Vault
      1.  
        Enterprise Vault training modules
  2. Section I. Enterprise Vault requirements
    1. Enterprise Vault hardware requirements
      1. Hardware requirements for Enterprise Vault server
        1.  
          Running Enterprise Vault on a virtual server
        2.  
          Additional processing capacity for initial archiving
      2.  
        Hardware requirements for SQL Server
      3.  
        Network requirements for Enterprise Vault
      4. About the storage requirements for Enterprise Vault
        1. Storage for vault stores
          1.  
            Preparing WORM storage devices
          2.  
            Required amount of storage for vault stores
          3.  
            Migration of archived data to secondary storage
        2.  
          Storage for Enterprise Vault indexes
        3. Storage requirements for SQL databases
          1.  
            Storage required for the Enterprise Vault Directory database
          2.  
            Storage required for the vault store databases
          3.  
            Storage required for the fingerprint databases
          4.  
            Storage required for the Monitoring database
          5.  
            Storage required for the FSA Reporting databases
          6.  
            Storage required for the audit database
        4.  
          Storage requirements for the Enterprise Vault cache folder
        5.  
          Local storage requirements for temporary files
        6.  
          TEMP folder security requirements
        7.  
          Granting additional users and groups access to the TEMP folder
    2. Enterprise Vault required software and settings
      1.  
        About the Enterprise Vault required software and settings
      2.  
        About valid computer names for Enterprise Vault servers
      3.  
        About the Enterprise Vault Deployment Scanner
      4. Basic software requirements for Enterprise Vault
        1. Required operating system components for Enterprise Vault
          1.  
            Installing MSMQ
          2. Internet Information Services (IIS)
            1.  
              Enterprise Vault requirements for IIS
          3.  
            PowerShell
          4.  
            MSXML
          5.  
            Windows IFilter
        2.  
          SQL Server software
        3.  
          SQLXML
        4.  
          Net.Tcp port sharing on Index Servers
      5. Best practice settings for Enterprise Vault servers
        1.  
          Message queue cleanup interval: MessageCleanupInterval
        2.  
          Message queue message storage limit: MachineQuota
        3.  
          Disable opportunistic locking: OplocksDisabled
        4.  
          Disable loopback check: DisableLoopbackCheck
        5.  
          Disable strict name checking: DisableStrictNameChecking
        6.  
          Maximum Outlook attachments and recipients: AttachmentMax and RecipientMax
        7.  
          TCP/IP maximum ports and TCP timed wait delay
      6. Preinstallation tasks for Enterprise Vault server
        1.  
          Creating the Vault Service account
        2.  
          Creating a SQL login account
        3. About assigning permissions and roles in SQL databases
          1.  
            Assigning permissions and roles in SQL Server databases
        4.  
          Locking down Enterprise Vault SQL databases
        5.  
          Creating Enterprise Vault DNS aliases
        6.  
          Turning off or reconfiguring Windows Firewall
        7.  
          Securing data locations
        8.  
          About User Account Control (UAC)
    3. Additional requirements for Operations Manager
      1.  
        About additional requirements for Operations Manager
      2.  
        Where and when to install Operations Manager
      3.  
        Additional required software for Operations Manager
      4.  
        Additional preinstallation tasks for Operations Manager
    4. Additional requirements for classification
      1.  
        Prerequisites for classification
      2.  
        Roles-based administration (RBA) and the classification feature
    5. Additional requirements for Enterprise Vault Reporting
      1.  
        About the requirements for Enterprise Vault Reporting
      2.  
        Where and when to install Enterprise Vault Reporting
      3.  
        Prerequisites for Enterprise Vault Reporting
      4.  
        Enterprise Vault reports that require monitoring or auditing to be enabled
      5.  
        Preparing for the installation of Enterprise Vault Reporting
    6. Additional requirements for Exchange Server archiving
      1.  
        About Exchange Server archiving
      2. Preinstallation tasks for Exchange server archiving
        1.  
          Installing Outlook on the Enterprise Vault server
        2.  
          Creating the Enterprise Vault system mailbox
        3.  
          Removing the restriction on NSPI connections to a Windows Server domain controller
        4.  
          Creating a user profile on the Enterprise Vault server
        5.  
          Creating a mailbox for the Vault Service account
        6.  
          Configuring the Exchange throttling policy on the Vault Service account
        7.  
          Granting the Vault Service account Send As permission on the system mailboxes
        8. Assigning Exchange Server permissions to the Vault Service account
          1.  
            Microsoft Exchange permissions assigned to the Vault Service account
      3. Enterprise Vault client access with Exchange Server archiving
        1.  
          Requirements for the Enterprise Vault Outlook Add-In
        2.  
          Requirements for Enterprise Vault Client for Mac OS X
        3.  
          Requirements for the Enterprise Vault Office Mail App
        4. Requirements for OWA
          1.  
            Requirements for Enterprise Vault OWA Extensions
        5.  
          Customized shortcuts
        6.  
          Browser-based access to archives
      4. Requirements for RPC over HTTP
        1.  
          Requirements for Outlook Anywhere access to Enterprise Vault
    7. Additional requirements for Domino Server archiving
      1.  
        Domino Server archiving requirements for all Enterprise Vault servers
      2. Requirements for Domino mailbox archiving
        1.  
          Required software for Enterprise Vault Domino Gateway
        2.  
          Required software for target Domino mail servers
        3.  
          Requirements for Enterprise Vault extensions for Notes clients
        4.  
          Preinstallation tasks for Domino mailbox archiving
        5. Register the Enterprise Vault Domino Gateway
          1.  
            Configuring the Internet port for HTTP on the Enterprise Vault Domino Gateway
          2.  
            Configuring server security for the Enterprise Vault Domino Gateway
          3.  
            Configuring Single Sign-On on the Enterprise Vault Domino Gateway
          4.  
            Clustering Enterprise Vault Domino Gateway servers
          5.  
            Configuring an alias URL for web connections to the Enterprise Vault Domino Gateway server
        6. About the user ID for Domino mailbox archiving
          1.  
            Creating the Domino archiving user
          2.  
            Granting the Domino archiving user access to all mail files
        7.  
          Configuring the server document for each target Domino mail server
        8.  
          Install and configure Enterprise Vault Domino Gateway
      3. Requirements for Domino journaling archiving
        1. Requirements for Enterprise Vault archiving from Domino Journaling databases
          1.  
            Support for Enterprise Vault archiving from clustered Domino journal databases
        2.  
          Configuring access for Enterprise Vault to Domino domain, server, and Journaling location
        3.  
          Domino mailing list groups
        4.  
          Client access for Domino journal archiving
    8. Additional requirements for File System Archiving (FSA)
      1.  
        About the requirements for FSA
      2.  
        Enterprise Vault server requirements for FSA
      3. About FSA shortcuts
        1.  
          Placeholder shortcut requirements
      4.  
        About the FSA Agent
      5.  
        Preparing file servers for FSA
      6.  
        Client requirements for FSA
    9. Additional requirements for SharePoint Server archiving
      1.  
        About the Enterprise Vault server requirements for SharePoint Server archiving
      2. Requirements for SharePoint Servers
        1.  
          About SharePoint security certificates
    10. Additional requirements for SMTP Archiving
      1.  
        Additional requirements for Enterprise Vault SMTP servers
    11. Additional requirements for Enterprise Vault Search
      1.  
        Server requirements for Enterprise Vault Search
      2. Requirements for installing Enterprise Vault Search Mobile edition on a proxy server
        1.  
          Disabling unsafe cryptographic protocols and cipher suites
    12. Additional requirements for a standalone Enterprise Vault Administration Console
      1.  
        About the requirements for a standalone Enterprise Vault Administration Console
  3. Section II. Installing Enterprise Vault
    1. Licenses and license keys
      1.  
        Overview of Enterprise Vault licensing
      2.  
        Obtaining license keys for Enterprise Vault
      3.  
        Installing Enterprise Vault license key files
      4.  
        Replacing Enterprise Vault licenses and installing additional licenses
    2. Installing Enterprise Vault
      1.  
        About installing Enterprise Vault
      2.  
        Installing Enterprise Vault (wizard)
      3.  
        Installing Enterprise Vault (command line)
    3. Postinstallation tasks
      1.  
        Default security for the Enterprise Vault Web Access components
      2. Customizing security for the Enterprise Vault Web Access components
        1.  
          Customizing the port or protocol for the Enterprise Vault Web Access components
        2. Customizing authentication for the Enterprise Vault Web Access components
          1.  
            Using a default domain with Basic authentication
      3. Customizing security for the Web Access components on client computers
        1.  
          Configuring Internet Explorer to use the proxy bypass list
        2.  
          Configuring a web browser to trust the Enterprise Vault Web Access components
        3.  
          Publishing Enterprise Vault server details to USGCB-compliant computers
        4.  
          Enabling remote access to the Enterprise Vault Web Access computer
    4. Repairing, modifying, or uninstalling Enterprise Vault
      1.  
        About repairing, modifying, or uninstalling Enterprise Vault
      2.  
        Modifying Enterprise Vault
      3.  
        Repairing Enterprise Vault
      4.  
        Uninstalling Enterprise Vault
  4. Section III. Configuring Enterprise Vault
    1. About configuring Enterprise Vault
      1.  
        About configuring Enterprise Vault
    2. Running the Enterprise Vault configuration wizard
      1.  
        When to run the Enterprise Vault configuration wizard
      2.  
        What the Enterprise Vault configuration wizard does
      3.  
        Running the Enterprise Vault configuration wizard
      4.  
        Troubleshooting configuration of the Enterprise Vault Monitoring database
    3. Running the Enterprise Vault Getting Started wizard
      1.  
        What the Enterprise Vault Getting Started wizard does
      2.  
        Preparing to run the Enterprise Vault Getting Started wizard
      3.  
        Running the Enterprise Vault Getting Started wizard
      4. About the express and custom modes of the Enterprise Vault Getting Started wizard
        1. About indexing configuration with the Enterprise Vault Getting Started wizard
          1.  
            Automatic indexing configuration in express mode
        2. About storage configuration with the Enterprise Vault Getting Started wizard
          1.  
            Storage configuration information you must supply in express mode
          2.  
            Automatic storage configuration in express mode
        3.  
          About policy definition with the Enterprise Vault Getting Started wizard
        4.  
          About Exchange target configuration with the Enterprise Vault Getting Started wizard
        5.  
          About Domino target configuration with the Enterprise Vault Getting Started wizard
        6.  
          About file target configuration with the Enterprise Vault Getting Started wizard
      5.  
        Planning for the Enterprise Vault Getting Started wizard
    4. Configuring Enterprise Vault Operations Manager
      1.  
        When to run the Enterprise Vault Operations Manager Configuration utility
      2.  
        Running the Enterprise Vault Operations Manager Configuration utility
      3.  
        Accessing Enterprise Vault Operations Manager
      4.  
        Troubleshooting Enterprise Vault Operations Manager
  5. Section IV. Initial Enterprise Vault setup
    1. Initial Enterprise Vault setup
      1.  
        License keys
      2. Using the Enterprise Vault Administration Console
        1.  
          Starting the Enterprise Vault Administration Console
        2.  
          About administration roles in the Enterprise Vault Administration Console
      3.  
        Adding core Enterprise Vault services with the Administration Console
      4. Creating Enterprise Vault retention categories
        1.  
          About the properties of Enterprise Vault retention categories
        2.  
          About retention plans
        3.  
          Creating a retention plan
      5.  
        Performance issues when Enterprise Vault has limited or no access to the Internet
    2. Setting up storage
      1.  
        About setting up storage for Enterprise Vault archives
      2. About Enterprise Vault single instance storage
        1.  
          About sharing levels and sharing boundaries
        2.  
          How Enterprise Vault single instance storage works
        3.  
          About the fingerprint database
        4.  
          Deletion of SIS parts
        5.  
          Requirements for Enterprise Vault single instance storage
        6.  
          About EMC Centera device-level sharing
        7.  
          About sharing partitions on storage devices that support the Enterprise Vault storage streamer API
      3.  
        Developing a suitable sharing regime for Enterprise Vault single instance storage
      4.  
        Creating vault store groups
      5. About creating vault stores
        1. About Enterprise Vault safety copies
          1.  
            Choosing when to remove Enterprise Vault safety copies
          2.  
            Checking that the partition has been backed up before Enterprise Vault removes safety copies
          3.  
            Using the archive attribute to determine whether a partition has been backed up
          4.  
            Using the trigger file mechanism to determine whether a partition has been backed up
        2.  
          Creating a vault store
      6. Creating vault store partitions
        1. Initial states of vault store partitions
          1.  
            About closed Enterprise Vault partitions
        2. About collections and migration
          1.  
            Collections on EMC Centera devices
        3.  
          Creating a vault store partition
        4.  
          Partition network shares for NTFS partitions with local paths
      7.  
        Configuring sharing for a vault store group
    3. Adding index locations
      1.  
        About Enterprise Vault index locations
      2.  
        Creating an Enterprise Vault index location
    4. Setting up Index Server groups
      1.  
        About Index Server groups
      2. Do I need to create Index Server groups?
        1.  
          Do you have more than one Enterprise Vault server?
        2.  
          Do you use or plan to use journal archiving or File System Archiving?
        3.  
          Do you use or plan to use Compliance Accelerator or Discovery Accelerator?
        4.  
          Is the server loading evenly distributed across existing Enterprise Vault servers?
        5.  
          Are there more than approximately 5,000 mailbox archives per Enterprise Vault server?
      3.  
        Creating an Index Server group
      4.  
        Adding an Index Server to an Index Server group
      5.  
        Removing an Index Server from an Index Server group
      6.  
        Assigning a vault store to an Index Server group
      7.  
        Unassigning a vault store from an Index Server group
      8.  
        Assigning a vault store to a different indexer
    5. Reviewing the default settings for the site
      1. Reviewing the default settings for the Enterprise Vault site
        1.  
          Setting the archiving schedule for the Enterprise Vault site
        2.  
          About the Web Access application settings
    6. Setting up Enterprise Vault Search
      1.  
        About Enterprise Vault Search
      2.  
        Defining search policies for Enterprise Vault Search
      3. Setting up provisioning groups for Enterprise Vault Search
        1.  
          Changing the order in which Enterprise Vault processes the search provisioning groups
      4.  
        Creating and configuring Client Access Provisioning tasks for Enterprise Vault Search
      5.  
        Configuring user browsers for Enterprise Vault Search
      6.  
        Configuring Enterprise Vault Search for use in Forefront TMG and similar environments
      7. Setting up Enterprise Vault Search Mobile edition
        1.  
          Carrying out preinstallation tasks for Enterprise Vault Search Mobile edition
        2.  
          Installing Enterprise Vault Search Mobile edition
        3.  
          Configuring the maximum number of permitted login attempts to Enterprise Vault Search Mobile edition
        4.  
          Verifying the installation of Enterprise Vault Search Mobile edition
    7. Managing metadata stores
      1.  
        About metadata stores
      2.  
        About metadata store PowerShell cmdlets
      3.  
        About fast browsing and metadata store indexes
  6. Section V. Clustering Enterprise Vault with VCS
    1. Introducing clustering with VCS
      1.  
        Supported VCS configurations and software
      2.  
        About Enterprise Vault and the VCS GenericService agent
      3.  
        Typical Enterprise Vault configuration in a VCS cluster
      4.  
        Order in which to install and configure the components in a VCS environment
    2. Installing and configuring Storage Foundation HA for Windows
      1.  
        Installing and configuring Storage Foundation HA for Windows with Enterprise Vault
      2.  
        Managing disk groups and volumes in a Storage Foundation HA environment
    3. Configuring the VCS service group for Enterprise Vault
      1.  
        About configuring the VCS service group for Enterprise Vault
      2.  
        Before you configure the VCS service group for Enterprise Vault
      3.  
        Creating a VCS service group for Enterprise Vault
      4.  
        Modifying an existing VCS service group
      5.  
        Deleting a VCS service group
    4. Running the Enterprise Vault Configuration wizard
      1.  
        Before you run the Enterprise Vault Configuration wizard
      2. Setting up Enterprise Vault in an active/passive VCS configuration
        1. Adding VCS cluster support in a first-time Enterprise Vault installation
          1.  
            Troubleshooting configuration of the Monitoring database
        2. Upgrading an existing Enterprise Vault installation to a VCS cluster
          1.  
            Moving Enterprise Vault data to highly-available locations
        3.  
          Adding SMTP Archiving to an existing clustered Enterprise Vault server
      3. About setting up Enterprise Vault in a VCS N+1 configuration
        1.  
          Configuring two Enterprise Vault server nodes and a spare node in a VCS N+1 cluster
        2.  
          Configuring two Enterprise Vault servers to run on any of the three nodes in a VCS cluster
        3.  
          Disallowing two Enterprise Vault servers on the same node in a VCS cluster
    5. Implementing an SFW HA-VVR disaster recovery solution with Enterprise Vault
      1.  
        About installing and configuring SFW HA-VVR with Enterprise Vault
      2.  
        Overview of the steps for installing and configuring SFW HA-VVR
      3.  
        Setting up the VCS cluster on the primary site
      4.  
        Setting up the VCS cluster on the secondary site
      5.  
        Adding the VVR components for replication
      6.  
        Adding the GCO components for wide-area recovery
    6. Troubleshooting clustering with VCS
      1.  
        VCS logging
      2.  
        Enterprise Vault Cluster Setup wizard error messages
      3.  
        Viewing the clustered message queues for an Enterprise Vault virtual server
  7. Section VI. Clustering Enterprise Vault with Windows Server Failover Clustering
    1. Introducing clustering with Windows Server Failover Clustering
      1.  
        About clustering Enterprise Vault with Windows Server Failover Clustering
      2.  
        Supported Windows Server Failover Clustering configurations
      3.  
        Required software and restrictions on clustering Enterprise Vault with Windows Server Failover Clustering
      4.  
        Typical Enterprise Vault configuration in a Windows Server failover cluster
      5. Control of Enterprise Vault services in a Windows Server failover cluster
        1.  
          About cluster services and Enterprise Vault service resources in a Windows Server failover cluster
        2.  
          What happens at failover in a Windows Server failover cluster
    2. Preparing to cluster with Windows Server Failover Clustering
      1.  
        Preparing to cluster Enterprise Vault with Windows Server Failover Clustering
      2.  
        Setting up the shared disks and volumes for a Windows Server failover cluster
      3.  
        Setting up the Enterprise Vault cluster services for a Windows Server failover cluster
    3. Configuring Enterprise Vault in a Windows Server failover cluster
      1.  
        About configuring Enterprise Vault in a Windows Server failover cluster
      2. Setting up a new Enterprise Vault installation with Windows Server Failover Clustering support
        1.  
          Configuring a new Enterprise Vault server with Windows Server Failover Clustering support
        2.  
          Configuring a failover node in a Windows Server failover cluster
        3.  
          Troubleshooting configuration of the Enterprise Vault Monitoring database
        4. Examples of Enterprise Vault installations in various Windows Server Failover Clustering modes
          1.  
            Clustering Enterprise Vault in an active/passive failover configuration
          2.  
            Clustering Enterprise Vault in a 2+1 configuration without "any-to-any" support
          3.  
            Clustering Enterprise Vault in a 2+1 "any-to-any" configuration
      3. Converting an existing Enterprise Vault installation to a Windows Server failover cluster
        1. Converting an existing Enterprise Vault server to a server with Windows Server Failover Clustering support
          1.  
            Moving Enterprise Vault data to highly available locations
      4. Modifying an existing Enterprise Vault cluster
        1.  
          Adding a node to an existing Windows Server failover cluster
        2.  
          Adding shared storage to an existing Windows Server failover cluster for an Enterprise Vault cluster server
        3.  
          Adding Enterprise Vault SMTP Archiving to an existing clustered Enterprise Vault server
    4. Troubleshooting clustering with Windows Server Failover Clustering
      1.  
        About this chapter
      2.  
        Enterprise Vault event messages and the failover cluster log
      3.  
        Resource ownership and dependencies when configuring Enterprise Vault in a failover clustered environment
      4.  
        Registry replication on failover clustered nodes
      5.  
        Viewing the clustered message queues for an Enterprise Vault cluster server
      6.  
        Starting and stopping Enterprise Vault services in a Windows Server Failover Clustering environment
      7.  
        Potential failover issue in a Windows 2012 or later cluster
  8. Appendix A. Automatically preparing an Enterprise Vault server
    1.  
      About automatically preparing an Enterprise Vault server
    2.  
      Windows features enabled automatically by the 'Prepare my system' option
    3.  
      Running the 'Prepare my system' option

Developing a suitable sharing regime for Enterprise Vault single instance storage

If you use Enterprise Vault single instance storage, you need to create a sharing regime that meets your organization's data sharing requirements and which is appropriate for your network connection speeds.

Consider what sort of sharing regime you require before you start archiving. There are limits to what you can change:

  • You can change a vault store's sharing level, but the change does not act retrospectively. For example, if you change a vault store's sharing level from 'share within group' to 'share within vault store', any items already shared within the vault store group remain so.

  • You cannot move a vault store to another vault store group unless all of the following circumstances apply:

    • You previously upgraded to Enterprise Vault 8.0.

    • The vault store is one that Enterprise Vault upgraded to Enterprise Vault 8.0, or one that you created in the Default Upgrade Group.

    • The vault store's sharing level is "No sharing" and has never been changed.

When deciding how to set up single instance storage, consider the following:

  • You may need to keep parts of your organization separated with information barriers, also known as "Chinese walls". For example, a datacenter may be required by law or by company policy to keep information separate between its investment, retail, and mergers and acquisitions groups, to avoid conflicts of interest.

    You may want to create a separate vault store group for each organizational group in which information must be isolated.

  • Network connectivity between the appropriate computers must be sufficient to provide acceptable storage and retrieval times. As a minimum we recommend that you limit single instance storage to an environment in which the connections support the expected response time of a 100 Mbps switched Ethernet LAN.

    The Enterprise Vault server whose Storage service manages a vault store must have adequate connectivity with the following:

    • The computers that host the vault store partitions for the vault stores that are within the vault store's sharing boundary.

    • The computer that hosts the vault store group's fingerprint database.

    The slower the connection speeds between these computers, the longer it takes Enterprise Vault to archive and retrieve the shared items.

    If your organization spans several widely-dispersed geographical locations it may be appropriate to create separate vault store groups for each location. Remember to locate the fingerprint databases locally.

    Enterprise Vault provides a connectivity test to estimate connection speeds across sample network connections. The relevant wizards prompt you to run the connectivity test when you create a new vault store group or partition, or when you configure sharing. The connectivity test can help you create a sharing regime with an acceptable level of performance. To assess performance, the connectivity test measures the average round-trip time for a number of ping requests. If you have disabled ping in your environment, use your own tools to decide if the performance is acceptable. We recommend a round-trip time of one millisecond or less.

    If the test results indicate poor connectivity, consider modifying the sharing boundaries or changing the location of your computers to improve connection speeds. If you are willing to accept poorer performance, you can choose to accept poor connectivity test results.

  • When you create a vault store group, configure its fingerprint database appropriately for the projected sharing requirements.