209
Symantec Discovery Accelerator™ Installing and Configuring 8.0 Symantec Information Foundation™

Symantec Discovery Acceleratorâ„¢

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Symantec Discovery Acceleratorâ„¢

Symantec DiscoveryAccelerator™

Installing and Configuring

8.0

Symantec Information Foundation™

Page 2: Symantec Discovery Acceleratorâ„¢

Symantec Discovery Accelerator: Installing andConfiguring

The software described in this book is furnished under a license agreement and may be usedonly in accordance with the terms of the agreement.

Last updated: February 27, 2009.

Legal NoticeCopyright © 2009 Symantec Corporation. All rights reserved.

Symantec, the Symantec Logo, VERITAS, and Discovery Accelerator are trademarks orregistered trademarks of Symantec Corporation or its affiliates in the U.S. and othercountries. Other names may be trademarks of their respective owners.

The product described in this document is distributed under licenses restricting its use,copying, distribution, and decompilation/reverse engineering. No part of this documentmay be reproduced in any form by any means without prior written authorization ofSymantec Corporation and its licensors, if any.

THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TOBE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTALOR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINEDIN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

The Licensed Software and Documentation are deemed to be commercial computer softwareas defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights inCommercial Computer Software or Commercial Computer Software Documentation", asapplicable, and any successor regulations. Any use, modification, reproduction release,performance, display or disclosure of the Licensed Software and Documentation by the U.S.Government shall be solely in accordance with the terms of this Agreement.

Symantec Corporation20330 Stevens Creek Blvd.Cupertino, CA 95014

http://www.symantec.com

Page 3: Symantec Discovery Acceleratorâ„¢

Chapter 1 About this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Introducing this guide .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Getting help .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Accessing the Support Web site ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Subscribing to Email Notifications .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Accessing telephone and fax support ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Product documentation .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Comment on the documentation .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Chapter 2 Introducing Discovery Accelerator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Key features of Discovery Accelerator ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13About the Discovery Accelerator components ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13The Discovery Accelerator process ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

Chapter 3 Preparing to install Discovery Accelerator . . . . . . . . . . . . . . . . . . . . 17

Configuration options for Discovery Accelerator ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17Discovery Accelerator configuration for large installations .... . . . . . . . . 17Discovery Accelerator configuration for smaller

installations ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18Prerequisite software for Discovery Accelerator ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Prerequisite software for the Discovery Accelerator servercomputer ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Prerequisite software for Discovery Accelerator clientcomputers ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Turning on distribution list expansion .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21Enabling Active Server Pages and ASP.NET on Windows Server

2003 .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22Setting the Temp folder permissions .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24Assigning permissions and roles in SQL databases ... . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Assigning SQL server roles to the Vault Service account ... . . . . . . . . . . . . . 25Assigning the permissions and roles required to create search

schedules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27Assigning the permissions required to enable cases for analytics

... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

Contents

Page 4: Symantec Discovery Acceleratorâ„¢

SQL database access on distributed systems .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

Chapter 4 Installing Discovery Accelerator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Installing the Discovery Accelerator server software .... . . . . . . . . . . . . . . . . . . . . . . 29Allowing Discovery Accelerator to communicate through the

firewall in Windows 2008 .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30Creating the configuration database and customer

databases ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31Setting up a Custodian Manager Web site ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34Uploading the Discovery Accelerator report templates ... . . . . . . . . . . . . . . . 35Configuring Discovery Accelerator for use in a Network Load

Balancing cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35Installing the Discovery Accelerator client software .... . . . . . . . . . . . . . . . . . . . . . . . 36

Modifying the configuration file for the Discovery Acceleratorclient ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Using the MSI installer package to install the DiscoveryAccelerator client ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Using ClickOnce to deploy the Discovery Accelerator client ... . . . . . . . . 38

Chapter 5 Introducing the Discovery Accelerator client . . . . . . . . . . . . . . . . 45

About the Discovery Accelerator client ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45Opening the Discovery Accelerator client ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45Finding your way around the Discovery Accelerator client ... . . . . . . . . . . . . . . . . 47Closing the Discovery Accelerator client ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

Chapter 6 Working with cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

About cases ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49Opening cases ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50Working with analytics rules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Overriding manual categorization .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52Building analytics rules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53Adding conditions to rules and advanced searches ... . . . . . . . . . . . . . . . . . . . . 53Rule actions .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55Copying, editing, and deleting analytics rules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . 56Prioritizing marking rules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57Tagging rules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58Manually editing analytics rule queries ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58Rule operators and search attributes ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

Implementing analytics in cases and folders ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68Enabling, pausing, and disabling analytics ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69Monitoring the progress of analytics data collection .... . . . . . . . . . . . . . . . . . 70

Contents4

Page 5: Symantec Discovery Acceleratorâ„¢

Speeding up analytics data collection in low bandwidthenvironments ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

Checking the progress of cases ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73Deleting cases ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

Chapter 7 Setting up and assigning roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

About the predefined Discovery Accelerator roles ... . . . . . . . . . . . . . . . . . . . . . . . . . . . 75About the Discovery Accelerator permissions .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77Creating Discovery Accelerator roles ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80Assigning Discovery Accelerator roles to users ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

Chapter 8 Setting up review marks and tags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

About review marks and tags ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83Creating review marks .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84How retained marks work .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85Customizing the review marks that are associated with individual

cases ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86Creating tags ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87Creating tag groups .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88

Chapter 9 Searching for items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

About searching with Discovery Accelerator ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91Creating and running Discovery Accelerator searches ... . . . . . . . . . . . . . . . . . . . . . . 92About the search criteria options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93Pausing and resuming Discovery Accelerator searches ... . . . . . . . . . . . . . . . . . . . . . 99Selecting the archives in which to search .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99Specifying the details of custom search attributes ... . . . . . . . . . . . . . . . . . . . . . . . . . 100Defining email targets with Address Manager ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

Setting up targets ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103Adding targets to target groups .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

Building Discovery Accelerator search schedules ... . . . . . . . . . . . . . . . . . . . . . . . . . . 104Setting up new search schedules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104Examples of recurring search schedules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105Configuring the SQL Server Agent service ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

Chapter 10 Using Custodian Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

About Custodian Manager ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109Setting up custodians .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110Setting up custodian groups .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111Setting up custom custodian attributes ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111

5Contents

Page 6: Symantec Discovery Acceleratorâ„¢

Specifying the user account under which to synchronizecustodians .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

Synchronizing with entire Active Directory domains and Dominoservers ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

Setting the system configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

Chapter 11 Reviewing items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117

About reviewing with Discovery Accelerator ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117About the Review pane .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118Reviewing analytics data ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121Filtering the items in the Review pane .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122Using quick and advanced search .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125Changing how the Review pane looks .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127Setting your Review pane preferences ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128Finding all items in the same conversation .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130Viewing the history of items .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131Displaying printable versions of items .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131Assigning review marks and tags to items .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132Adding comments to items .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133Downloading the original versions of items .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133Copying the item list to the Clipboard .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

Chapter 12 Working with research folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

About research folders ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135Creating research folders ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136Giving other users access to your research folders ... . . . . . . . . . . . . . . . . . . . . . . . . . 136Reviewing the items in research folders ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137Exporting items from research folders ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138Deleting items from research folders ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138Deleting folders ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139

Chapter 13 Creating and viewing reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141

About the Discovery Accelerator reports ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141Available Discovery Accelerator reports ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141

Archive Source .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142Case History .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143Item Detail .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145Legal Holds ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145Productions .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147Searches ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148Security ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149

Contents6

Page 7: Symantec Discovery Acceleratorâ„¢

Creating reports ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150Viewing existing reports ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150Deleting reports ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

Chapter 14 Importing and exporting data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153

About importing and exporting data ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153Sample XML files ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154Format of the Dataload.xml file ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154Importing the configuration data ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155ImportExport command .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156

ImportExport syntax .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156Examples of ImportExport commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158

How exporting differs from producing .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159Creating an export or production run .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160Making the export ID visible in Microsoft Outlook .... . . . . . . . . . . . . . . . . . . . . . . . . 162

Chapter 15 Customizing Discovery Accelerator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163

Setting system configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163Ad Hoc Searches configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165API configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166Diagnostics configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167Document Conversion configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . 168Export/production configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168General configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171Home Page configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172Item Prefetch Cache configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173Item Prefetch Cache (Advanced) configuration options .... . . . . . . . . . . . . 175Legal Hold configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177Message Counts configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178Policy Integration configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179Profile Synchronization configuration options .... . . . . . . . . . . . . . . . . . . . . . . . 180Reporting configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182Reviewing configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182Search configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184Security configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190System configuration options .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190Vault Directory Synchronization configuration options .... . . . . . . . . . . . 191

Customizing the columns in the Review pane .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

7Contents

Page 8: Symantec Discovery Acceleratorâ„¢

Appendix A Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195

Installation problems .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195Enterprise Vault Accelerator Manager service not created .... . . . . . . . 195Home page of a Discovery Accelerator Web site not found .... . . . . . . . 196Other applications using TCP/IP port 8085 .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197Uninstalling the Discovery Accelerator client from a shared

location may prevent other users from starting theclient ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198

Problems when running Discovery Accelerator ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198Enterprise Vault Accelerator Manager service does not

start ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198Vault stores not displayed .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198Unable to select message type .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199Search returns unexpected results ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199Unable to view HTML items in the Review pane .... . . . . . . . . . . . . . . . . . . . . . 200Errors when exporting items .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200Synchronization errors after you rename the SQL Server

computer ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201Performance counter errors when the Accelerator Manager

service starts ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202SQL Service Broker warning when restoring a customer database

to a different server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202Issues with reports ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

Contents8

Page 9: Symantec Discovery Acceleratorâ„¢

About this guide

This chapter includes the following topics:

■ Introducing this guide

■ Getting help

■ Product documentation

■ Comment on the documentation

Introducing this guideThis guide provides detailed information on how to install and configure DiscoveryAccelerator. The guide also describes how to perform common administrativetasks, and how to set up Discovery Accelerator for use in a server farm.

To install and configure Discovery Accelerator, you need to know how to administerthe following products:

■ Microsoft Windows Server 2003/2008

■ Microsoft SQL Server

■ Microsoft Internet Information Services (IIS)

■ Symantec Enterprise Vault

■ Your messaging product (Microsoft Exchange Server or IBM Domino Server)

Getting helpSymantec offers a variety of support options:

■ Accessing the Support Web site

■ Subscribing to Email Notifications

1Chapter

Page 10: Symantec Discovery Acceleratorâ„¢

■ Accessing telephone and fax support

Accessing the Support Web siteThe Symantec Enterprise Support site(http://www.symantec.com/business/support) lets you do the following:

■ Contact the Support staff and post questions to them.

■ Download the latest patches, upgrades, and utilities.

■ Search the Knowledge Base for answers to technical support questions.

■ Subscribe to automatic email notification of product updates.

■ Find out about training courses.

■ Read current white papers, technical notes, and selected documentation.

Subscribing to Email NotificationsSubscribe to Email Notifications to be informed of software alerts, newly publisheddocumentation, Beta programs, and other services.

To subscribe to Email Notifications

1 Browse to the Symantec Enterprise Support site(http://www.symantec.com/business/support).

2 Click Sign up for News Bulletins.

3 On the Email Bulletin Service page, under Sign up for the Email BulletinServicebyselectingyourproductgroupbelow, click AvailabilityProducts.

Accessing telephone and fax supportTelephone support for Discovery Accelerator is available with a valid supportcontract only.

To contact us for technical support, dial the appropriate telephone number shownat the Symantec Enterprise Support site. Have your product license informationready for quick navigation to the appropriate support group.

Product documentationTable 1-1 lists the documentation that is available for Discovery Accelerator.

About this guideProduct documentation

10

Page 11: Symantec Discovery Acceleratorâ„¢

Table 1-1 The Discovery Accelerator documentation set

CommentsDocument

Provides an overview of Discovery Acceleratorand describes how to install, configure, andcustomize it. The manual also containstroubleshooting information.

Installing and Configuring DiscoveryAccelerator

Describes how to search for and review items,work with research folders, and export items foroffline review.

Reviewer's Guide

Accompanies all the Discovery Acceleratorapplications and provides extensive informationon how to use their facilities.

Online Help

Provides late-breaking information that you mayneed to be aware of before you install and useDiscovery Accelerator.

Release Notes

Comment on the documentationLet us know what you like and dislike about the documentation. Were you able tofind the information you needed quickly? Was the information clearly presented?Report errors and omissions, or tell us what you would find useful in futureversions of our guides and online help.

Please include the following information with your comment:

■ The title and product version of the guide on which you want to comment.

■ The topic (if relevant) on which you want to comment.

■ Your name.

Email your comment to [email protected]. Please only use this address tocomment on product documentation.

We appreciate your feedback.

11About this guideComment on the documentation

Page 12: Symantec Discovery Acceleratorâ„¢

About this guideComment on the documentation

12

Page 13: Symantec Discovery Acceleratorâ„¢

Introducing DiscoveryAccelerator

This chapter includes the following topics:

■ Key features of Discovery Accelerator

■ About the Discovery Accelerator components

■ The Discovery Accelerator process

Key features of Discovery AcceleratorDiscovery Accelerator is an electronic discovery and review system that integrateswith Enterprise Vault services and archives. Discovery Accelerator lets authorizedusers search for, retrieve and preserve, analyze, review, mark, and export orproduce emails, documents, and other electronic items for lead counselexamination or court-ready production—rapidly and in a cost-effective manner.

Using attorneys and external counsel to review large numbers of items is costly.With Discovery Accelerator, you can create a hierarchy of reviewers for a discoveryaction or case, with different levels of reviewers able to assign certain reviewmarks. In this way, paralegal staff and non-legal staff can perform an initial reviewof search and collection results and leave only the privileged, relevant, orquestionable items for counsel. Optionally, you can then produce the relevantitems with an appropriate "Bates" number or else simply export them fromDiscovery Accelerator in various native formats and load file formats.

About the Discovery Accelerator componentsTable 2-1 lists the primary Discovery Accelerator components.

2Chapter

Page 14: Symantec Discovery Acceleratorâ„¢

Table 2-1 The Discovery Accelerator components

NotesComponent

The client is used by Discovery Accelerator administratorsto set up and manage the system and by reviewers to accessthe items that they are to mark.

See “ About the Discovery Accelerator client” on page 45.

Discovery Accelerator client

This Web site lets you set up and manage multiple DiscoveryAccelerator databases in which to store your data. Forexample, this facility lets you split your data by date rangeor organizational unit.

Accelerator Manager Website

This service handles the requests from the DiscoveryAccelerator client and works with the Enterprise Vaultcomponents to access archives, perform searches, and soon.

Enterprise Vault AcceleratorManager service

The customer database is a SQL database in which DiscoveryAccelerator stores details of cases, user roles, search results,review marks and tags, and more.

You can set up multiple customer databases.

Customer database

The configuration database is a SQL database that specifiesthe location of the customer databases and stores details ofthe SQL Server, database files, and log files to use.

Configuration database

This Web site lets you store the details of the "custodians"(individual employees) and custodian groups for which youwant to search with Discovery Accelerator. A custodiangroup is any collection of employees, such as Windows orDomino groups and distribution lists, Active Directory orDomino LDAP searches, and Active Directory containers.

See “About Custodian Manager” on page 109.

Custodian Manager Web site(optional)

This Web site lets you use the Discovery Accelerator API tointegrate third-party tools with the software, and therebyretrieve data from or export it to a Discovery Acceleratorcustomer database.

For more information on the Discovery Accelerator API,contact Symantec Support.

Discovery Accelerator APIWeb site (optional)

In small installations, these components can all reside on the same computer asEnterprise Vault. We recommend a more distributed setup for larger installations,with the Discovery Accelerator components on a different computer from theEnterprise Vault server.

Introducing Discovery AcceleratorAbout the Discovery Accelerator components

14

Page 15: Symantec Discovery Acceleratorâ„¢

The Discovery Accelerator processFigure 2-1 provides an overview of the steps in the discovery process.

Figure 2-1 Steps in the Discovery Accelerator process

Search archives tofind items

Search results

Unreviewed items

Accept results for review

Export orproduce items

Audit ofreviewactivity

Review Analytics

EnterpriseVaultarchives

Reviewed items

The steps in this process are typically performed in the following order:

■ The Discovery Accelerator system administrator sets up a case.

■ All the messages and files that relate to the case are already stored in EnterpriseVault archives. Typically, mailbox archives are journal mailbox archives, butyou can include individual user mailboxes in searches. You can also searchpublic folder, file system, and SharePoint archives.

■ A user with search permissions, such as a case administrator, creates a searchof journal mailboxes and file system archives.

15Introducing Discovery AcceleratorThe Discovery Accelerator process

Page 16: Symantec Discovery Acceleratorâ„¢

The searches that you create with Discovery Accelerator are highlyconfigurable. The criteria that you specify can include words and phrases tosearch for, date ranges, message size and type, author and recipient details,attachment details, and more.

■ When the search finishes, the user who ran the search can check that theresults are as expected. If the user chooses to accept the results, DiscoveryAccelerator adds them to the case review set.

■ The administrator assigns the items in the case review set to reviewers so thatthey can view and mark them.Optionally, the administrator can choose to enable "analytics" on the case.This facility provides additional analyses of the metadata and content of itemsthat are collected in the case. Among the extra benefits that analytics providesare the options to do the following:

■ Set up rules by which Discovery Accelerator automatically marks orcategorizes the items that it adds to the case.

■ Examine and review entire conversation threads in one view.

■ Conduct searches within specific items in a case.

These facilities deliver a new review experience that is known as "GuidedReview".

■ The marked items are published in a suitable form. The available formatsinclude PST, Domino NSF database, HTML, and MSG.You can choose to produce or export the items. The production processgenerates a Bates number for each item. This process also locks the item tostop reviewers from changing the mark that is assigned to it. The export processdoes not generate a Bates number for an item or lock the item, so reviewerscan continue to work on it.

Introducing Discovery AcceleratorThe Discovery Accelerator process

16

Page 17: Symantec Discovery Acceleratorâ„¢

Preparing to installDiscovery Accelerator

This chapter includes the following topics:

■ Configuration options for Discovery Accelerator

■ Prerequisite software for Discovery Accelerator

■ Turning on distribution list expansion

■ Enabling Active Server Pages and ASP.NET on Windows Server 2003

■ Setting the Temp folder permissions

■ Assigning permissions and roles in SQL databases

Configuration options for Discovery AcceleratorAlthough you can install Discovery Accelerator on the same computer as yournormal Enterprise Vault installation, you may prefer to install it on a separatecomputer. You can choose from several configuration options. If your plannedconfiguration is different and you are unsure of what to configure on the DiscoveryAccelerator computer, contact Symantec for advice.

You should not run Compliance Accelerator and Discovery Acceleratorconcurrently on the same computer.

Discovery Accelerator configuration for large installationsA self-contained installation of Discovery Accelerator with a separate SQL Servercomputer minimizes the effect that intensive Discovery Accelerator searches

3Chapter

Page 18: Symantec Discovery Acceleratorâ„¢

have on the Enterprise Vault installation. This configuration is likely to suit largerinstallations.

The Discovery Accelerator computer must be in the same domain as the EnterpriseVault server or in a trusted domain. The SQL Server computer must be runningSQL Server 2005 SP2.

Figure 3-1 Configuration for large installations

Enterprise Vault

Discovery Acceleratorclients

Discovery Acceleratorserver

SQL Server

Discovery Accelerator configuration for smaller installationsThe only difference between the configuration for smaller installations and theconfiguration for large installations is that, in smaller installations, EnterpriseVault and SQL Server are on the same computer.

Preparing to install Discovery AcceleratorConfiguration options for Discovery Accelerator

18

Page 19: Symantec Discovery Acceleratorâ„¢

Figure 3-2 Configuration for smaller installations

Discovery Acceleratorclients

Discovery Acceleratorserver

Enterprise Vault server with SQLServer

For test purposes, you can run Discovery Accelerator, SQL Server, and EnterpriseVault on the same computer.

Prerequisite software for Discovery AcceleratorThe computers on which you install the Discovery Accelerator server softwareand client software each have different requirements.

Prerequisite software for the Discovery Accelerator server computerTable 3-1 lists the software items that you must install and configure on thecomputer that is to run the Discovery Accelerator server software.

Table 3-1 Prerequisite software for Discovery Accelerator server installation

NotesItem

If the computer is already running Enterprise Vault, youmay have already installed this version of Windows.

Windows Server 2003 SP2 orlater, or Windows 2008 orlater

19Preparing to install Discovery AcceleratorPrerequisite software for Discovery Accelerator

Page 20: Symantec Discovery Acceleratorâ„¢

Table 3-1 Prerequisite software for Discovery Accelerator server installation(continued)

NotesItem

Required for running the Accelerator Manager Web site.

If you install IIS 7.0, you also require IIS 6.0 ManagementCompatibility, IIS Hotfix 949516, and IIS WindowsAuthentication.

IIS 6.0 or 7.0

Required for running the Accelerator Manager Web site andCustodian Manager Web site.

You must enable cookies in Internet Explorer and disableany pop-up blockers.

Microsoft Internet Explorer6.0 or later

If Discovery Accelerator is installed on a separate computerfrom Enterprise Vault, you must install the Enterprise Vaultsoftware on the Discovery Accelerator computer. Yourequire one of the following:

■ Enterprise Vault 2007 SP4 (or later) Services with Hotfix313275.

■ Enterprise Vault 8.0 (or later) Services

■ Enterprise Vault 8.0 (or later) API Runtime

To search on content in Discovery Accelerator, set indexingon the accessed vault archives to full.

All Enterprise Vault servers in the site must be running thesame version of Enterprise Vault.

Enterprise Vault 2007 SP4 orlater

Required for exporting items in PST format or downloadingthe original versions of the items.

Outlook 2003 SP1 or later, orOutlook 2007

Released with Windows XP SP2 and as a redistributable.Windows Installer 3.1 orlater

Available as a separate download (see the Links to

related software folder in the kit).

We recommend that you do not configure the DiscoveryAccelerator server to download and install .NET Frameworkupdates automatically from the Windows Update site.Contact Symantec Support before installing such updates.

Microsoft .NET Framework3.0 SP1

Required for exporting Lotus Domino items.Lotus Notes 7.0.3 or later

Preparing to install Discovery AcceleratorPrerequisite software for Discovery Accelerator

20

Page 21: Symantec Discovery Acceleratorâ„¢

Prerequisite software for Discovery Accelerator client computersYou can install the Discovery Accelerator client software on any computer thatis running the following:

■ Microsoft Windows XP SP2, or Windows Vista SP1 or later

■ Microsoft .NET Framework 3.0 SP1

■ Microsoft Visual C++ Redistributable Package, if you want to view Lotus Dominoitems in their original form from the Discovery Accelerator client. To obtainthis package, go to the following page of the Microsoft Web site:http://www.microsoft.com/downloads/details.aspx?familyid=32bc1bee-a3f9-4c13-9c99-220b62a191ee

Turning on distribution list expansionIn Microsoft Exchange environments, configure Enterprise Vault's ExchangeJournaling Task to expand distribution lists in the To, Cc, and Bcc fields of items.By default, the Journaling Task does not expand such lists.

To turn on distribution list expansion

1 Open the Enterprise Vault Administration Console.

2 Expand the contents of the left pane until the journaling policies are visible.

21Preparing to install Discovery AcceleratorTurning on distribution list expansion

Page 22: Symantec Discovery Acceleratorâ„¢

3 Right-click the required policy, and then click Properties. For example:

4 Click the Advanced tab, and then click the Expanddistribution lists setting.

5 Click Modify, and then change the value to On.

6 Click OK in each dialog box to save the changes that you have made.

7 Restart the Journaling task to put the change into effect.

Enabling Active Server Pages and ASP.NET onWindows Server 2003

If you plan to install the Discovery Accelerator server software on a WindowsServer 2003 computer, you must ensure that IIS and the .NET Framework areenabled.

To enable Active Server Pages and ASP.NET on Windows Server 2003

1 Open Control Panel.

2 Click the Add or Remove Programs applet.

3 Click Add/Remove Windows Components.

Preparing to install Discovery AcceleratorEnabling Active Server Pages and ASP.NET on Windows Server 2003

22

Page 23: Symantec Discovery Acceleratorâ„¢

4 In the Windows Components wizard, check Application Server.

5 Click Details.

6 In the Application Server dialog box, check ASP.NET.

7 Click Internet Information Services (IIS).

8 Click Details.

9 In the Internet Information Services dialog box, click World Wide WebService.

10 Click Details.

23Preparing to install Discovery AcceleratorEnabling Active Server Pages and ASP.NET on Windows Server 2003

Page 24: Symantec Discovery Acceleratorâ„¢

11 In the World Wide Web Service dialog box, check Active Server Pages.

12 Click OK to close the dialog boxes and return to the Windows Componentswizard.

13 Click Next to install the additional components.

14 Click Finish.

To check that Active Server Page scripts can run

1 Open IIS Manager.

2 In the left pane, click Web Service Extensions.

3 In the right pane, check that Active Server Pages are Allowed.

Setting the Temp folder permissionsTo ensure that reviewers can view HTML versions of items, give them Full Controlaccess to the Windows Temp folder on the Discovery Accelerator server. Thisfolder is typically C:\WINDOWS\Temp.

These users also require access to the ASP.NET Temp folder on the IIS computer.This folder is typically:

C:\WINDOWS\Microsoft.NET\Framework\v2.0...\Temporary ASP.NET Files

Preparing to install Discovery AcceleratorSetting the Temp folder permissions

24

Page 25: Symantec Discovery Acceleratorâ„¢

To set the Temp folder permissions

1 In Windows Explorer, open the properties dialog box for the folder whosepermissions you want to change.

2 Click the Security tab.

3 Add Authenticated Users and give them Full Control.

4 Click Advanced.

5 Ensure that Allowinheritablepermissionsfromparenttopropagatetothisobject is checked.

Assigning permissions and roles in SQL databasesYou must assign a number of SQL server roles and permissions to the Vault Serviceaccount to perform various activities with Discovery Accelerator.

Assigning SQL server roles to the Vault Service accountThe facility to create configuration and customer databases with DiscoveryAccelerator is dependent on the Vault Service account having the SQL server roleof database creator (dbcreator).

You may also want to assign the system administrator (sysadmin) role to the VaultService account.

To assign SQL server roles to the Vault Service account

1 On the SQL Server computer, start SQL Server Management Studio.

2 Expand the tree to display first the required SQL Server and then the Securityfolder.

25Preparing to install Discovery AcceleratorAssigning permissions and roles in SQL databases

Page 26: Symantec Discovery Acceleratorâ„¢

3 Click Logins to display the users in the right pane.

4 Right-click the Vault Service account, and then click Properties.

5 In the login properties dialog box, select the Server Roles page.

6 Ensure that dbcreator is checked.

Preparing to install Discovery AcceleratorAssigning permissions and roles in SQL databases

26

Page 27: Symantec Discovery Acceleratorâ„¢

Discovery Accelerator provides the facility to create schedules with whichyou can conduct searches repeatedly or at some future time. These schedulesare SQL Server Agent jobs and, by default, Discovery Accelerator assumesthat you want to make a user with the SQL system administrator (sysadmin)role the creator and owner of them. Therefore, you can either grant thesysadmin role to the Vault Service account or take the following additionalsteps to assign the minimum permissions needed to the Vault Service account:

■ Follow the instructions in the next section to grant permissions and rolesto the Vault Service account in the msdb system database.

■ After you have installed Discovery Accelerator, change the value of thesecurity configuration option "Use SQL Server 2005 SystemAdmin ServerRole for Schedules".See “Security configuration options” on page 190.

Assigning the permissions and roles required to create searchschedules

If you do not assign the SQL sysadmin role to the Vault Service account, you mustgrant sufficient permissions and roles to this account to make it the creator andowner of Discovery Accelerator search schedules. Briefly, you must do thefollowing:

■ Add the Vault Service account to the msdb system database.

■ Grant the Vault Service account Select permissions on the msdb tables sysjobs,sysjobschedules, sysjobsteps, and sysschedules.You must also grant the Vault Service account Execute permissions on themsdb stored procedure sp_add_category.

■ Assign the database role SQLAgentUserRole to the Vault Service account.

The following sections describe these activities in more detail.

To add the Vault Service account to the msdb system database

1 On the SQL Server computer, start SQL Server Management Studio.

2 Select the required SQL Server.

3 Browse to Databases > System Databases > msdb > Security > Users.

4 Right-click Users, and then click New User.

5 In the User name box, enter a new user name.

6 In the Login name box, enter the domain and the user name of the VaultService account in the form domain\user_name.

7 Click OK.

27Preparing to install Discovery AcceleratorAssigning permissions and roles in SQL databases

Page 28: Symantec Discovery Acceleratorâ„¢

To grant permissions to the Vault Service account

1 Right-click the new user that you have just created, and then click Properties.

2 Select the Securables page.

3 Add the following msdb tables to the list of securables, and then grant theSelect permission for them to the Vault Service account.

■ sysjobs

■ sysjobschedules

■ sysjobsteps

■ sysschedules

4 Add the stored procedure sp_add_category to the list of securables, and thengrant the Execute permission for it to the Vault Service account.

To assign the database role SQLAgentUserRole to the Vault Service account

1 Browse to Databases > System Databases > msdb > Security > Roles >Database Roles.

2 Right-click SQLAgentUserRole, and then click Properties.

3 On the General page, click Add, and then select the Vault Service accountthat you have just created.

Assigning the permissions required to enable cases for analyticsBefore you can enable any Discovery Accelerator cases for analytics, you must dothe following:

■ Add the Vault Service account to the msdb system database.

■ Grant the Vault Service account Select permissions on the msdb tablessysjobservers and sysjobhistory.Without these permissions, errors occur when you try to enable a case foranalytics.

See the previous section for instructions on how to perform these activities.

SQL database access on distributed systemsIf you plan to create the Discovery Accelerator and Enterprise Vault databaseson different servers, you must create a SQL logon for the Enterprise Vault Serviceaccount that is identical to the one on the Enterprise Vault database server.

Preparing to install Discovery AcceleratorAssigning permissions and roles in SQL databases

28

Page 29: Symantec Discovery Acceleratorâ„¢

Installing DiscoveryAccelerator

This chapter includes the following topics:

■ Installing the Discovery Accelerator server software

■ Installing the Discovery Accelerator client software

Installing the Discovery Accelerator server softwareFollow the instructions in this section to perform a first-time installation ofDiscovery Accelerator. If you want to upgrade an existing Discovery Acceleratorinstallation, see the DAUpgradeInstructions file.

To install the Discovery Accelerator server software

1 Start the Discovery Accelerator installation program (Symantec Enterprise

Vault Discovery Accelerator Server_language.msi).

2 Follow the on-screen instructions, which prompt you to submit informationat several points.

■ Choose between the following setup types:

Install all the components. This option is recommended for mostusers.

Typical

Lets you select the components to install. For example, you canchoose to install the Enterprise Vault Accelerator Manager servicebut not the Custodian Manager Web site or Discovery AcceleratorAPI Web site.

Custom

4Chapter

Page 30: Symantec Discovery Acceleratorâ„¢

■ If you are prompted for details of the account under which to run theEnterprise Vault Accelerator Manager service, enter the details of theVault Service account with which you manage your Enterprise Vaultserver.

3 If you have chosen to install the Accelerator Manager service then, when theinstallation program has finished, check the option to display the EnterpriseVault Accelerator Manager Web site. Then you can create the configurationdatabase and customer databases.

4 If you want to use the Legal Hold facility to stop users from deleting itemsfrom their archives, you must install a Discovery Accelerator license on eachstorage server in your Enterprise Vault site. To install the license, find theEnterprise Vault license key file on each server, and open it in a text editor.Then paste into the file the Discovery Accelerator license key with which youhave been provided.

The following is a typical example of a key:

<key>

<name>EVDA</name>

<version>1.0</version>

<start_date>2006-07-12</start_date>

<end_date>2007-09-10</end_date>

<warn_policy>1,120</warn_policy>

<grace_policy>1,60</grace_policy>

</key>

Contact Symantec Corporation to obtain your license key, if you do not alreadyhave it.

Allowing Discovery Accelerator to communicate through the firewallin Windows 2008

If you have installed the Discovery Accelerator server software on a Windows2008 computer, you must configure the Windows firewall to permit DiscoveryAccelerator to communicate through it. Certain activities that users perform inthe Discovery Accelerator client, such as fetching items for review and displayingHTML previews of those items, require unrestricted communication with theDiscovery Accelerator server. You can allow Discovery Accelerator to communicatethrough the Windows firewall by adding the Accelerator Manager service to theexceptions list for the firewall.

You must be logged on to the Windows 2008 computer as an administrator tocomplete this procedure.

Installing Discovery AcceleratorInstalling the Discovery Accelerator server software

30

Page 31: Symantec Discovery Acceleratorâ„¢

To allow Discovery Accelerator to communicate through the firewall in Windows2008

1 Click the Windows Start menu, and then click Control Panel.

2 Click Security, and then click Windows Firewall.

3 Click Changesettings and then, in the Windows Firewall Settings dialog box,click the Exceptions tab.

4 Click Add program.

5 Click Browse, and then browse to the Discovery Accelerator program folder(typically, C:\Program Files\Enterprise Vault Business Accelerator).

6 Click AcceleratorService.exe, and then click Open.

7 Click OK.

Creating the configuration database and customer databasesAfter you have installed the Discovery Accelerator server software, you must setup the required configuration and customer databases with the AcceleratorManager Web site.

The configuration database specifies the locations of the customer databases, andit stores details of the SQL Server, database files, and log files to use. Each customerdatabase stores details of cases, user roles, search results, review marks and tags,and more. You can set up multiple customer databases, but you can set up oneconfiguration database only.

To create the configuration database and customer databases

1 If you have yet to display the Accelerator Manager Web site, start InternetExplorer and browse to the following location:

http://server_name/EVBAAdmin

where server_name is the name of the server on which you installed theDiscovery Accelerator server software.

2 In the Configuration Database Details page, enter your preferred details ofthe configuration database, and then click OK. Use the online Help to assistyou, if necessary.

Note:The name of the configuration database and customer databases cannotcontain any of the following characters:

\ : * ? " < > |

31Installing Discovery AcceleratorInstalling the Discovery Accelerator server software

Page 32: Symantec Discovery Acceleratorâ„¢

3 When Discovery Accelerator prompts you to do so, restart the EnterpriseVault Accelerator Manager service using the Services snap-in to MicrosoftManagement Console.

4 Right-click the server node in the left pane of the Accelerator Manager Website, and then click New Customer.

5 Complete the details in the Create Customer page, and then click OK.

You must specify at least one database location for analytics. If you do notintend to use the analytics feature with this customer, use the default databaselocation.

See “Configuring analytics database locations” on page 32.

6 Wait for Discovery Accelerator to create the customer database. This processcan take several minutes to complete.

7 Repeat steps 4 through 6 for each customer database that you want to create.

8 Click Upload License to import your license key file into DiscoveryAccelerator.

Configuring analytics database locationsWhen you enable a case for analytics, all the items in the case must be fetchedfrom Enterprise Vault into the customer database, and indexed. This requires alarge amount of disk space. Discovery Accelerator lets you define locations to hostthe analytics table file groups and indexes. You can add more locations when youneed more disk space.

The Customer page of the Accelerator Manager Web site lists existing analyticsdatabase locations, and lets you add more. Next to each location, check marks inthe Table File Group and Full Text Indexes columns show whether the location isused for table files, search indexes, or both.

When you plan and configure analytics database locations, consider the following:

■ The volume of data. The collection and indexing of analytics data can generatevery large databases and index files. As a rough guide, collecting one millionitems that are all 20 kilobytes in size can produce a database that is 40 gigabytesor more in size. However, this can vary from one environment to another.

■ Performance. Host each database location on a physically separate disk. If youhave more than one analytics database location, Discovery Accelerator usesthem in rotation to spread the data and the disk access requirements.Each Discovery Accelerator case uses only one location for the search indexand one location for the database.

Installing Discovery AcceleratorInstalling the Discovery Accelerator server software

32

Page 33: Symantec Discovery Acceleratorâ„¢

The following examples show two valid configurations for analytics databaselocations.

Table 4-1 Analytics database locations: example 1

Full Text IndexesTable File GroupLocation

CheckedCheckedC:\SQL\Data

CheckedCheckedD:\SQL\Data

CheckedCheckedE:\SQL\Data

CheckedCheckedF:\SQL\Data

Table 4-2 Analytics database locations: example 2

Full Text IndexesTable File GroupLocation

CheckedUncheckedC:\SQL\Data

CheckedUncheckedD:\SQL\Data

UncheckedCheckedE:\SQL\Data

UncheckedCheckedF:\SQL\Data

To add a database location for analytics

1 Browse to the Accelerator Manager Web site.

2 Right-click the appropriate customer, and then click Properties.

3 Under Database Locations For Analytics, click New Location.

4 Enter the path to the new database location. Note the following:

■ The database locations must reside on the SQL server, and you must uselocal paths to refer to them. For example, do not use UNC paths to referto database locations.

■ The Accelerator Manager Web site does not verify that the specifiedlocations exist. You must ensure that the paths are valid.

5 Check Table File Group, Full Text Indexes, or both.

6 Click OK next to the new location.

7 Repeat steps 3 through 6 if you want to add more database locations.

33Installing Discovery AcceleratorInstalling the Discovery Accelerator server software

Page 34: Symantec Discovery Acceleratorâ„¢

Setting up a Custodian Manager Web siteCustodian Manager is a browser-based application with which you can store thedetails of the "custodians" (individual employees) and custodian groups for whichyou want to search with Discovery Accelerator. A custodian group is any collectionof employees, such as Windows or Domino groups and distribution lists, ActiveDirectory or Domino LDAP searches, and Active Directory containers. After youhave added the custodians and custodian groups to Custodian Manager, you canpick from them when you define the criteria for a Discovery Accelerator search.

See “About Custodian Manager” on page 109.

Note: You can set up one Custodian Manager Web site only.

To set up a Custodian Manager Web site

1 Open the Accelerator Manager Web site.

2 Right-click the server node in the left pane, and then click New Customer.

3 In the Create Customer page, set the customer type to Custodian Manager.

4 Enter your preferred IIS and SQL database details, and then click OK.

Use the online Help to assist you, if necessary.

5 Browse to the Custodian Manager Web site that you have just created. Theaddress of this Web site takes the following form:

http://server_name/virtual_directory

For example:

http://server2/EVBACustodianManager

6 Use the facilities in Custodian Manager to create and manage the custodiansand custodian groups. Note the following:

■ After you have submitted a few details of a custodian or group withCustodian Manager, you can synchronize them with an external sourcelike Active Directory or a Domino LDAP directory. This keeps the data inCustodian Manager up-to-date and lets you retrieve additional informationabout the custodian or group from the external source.

■ Custodian Manager also lets you assign additional, custom attributes tocustodians and custodian groups. Use these attributes to filter the list ofcustodians and groups for which to search in Discovery Accelerator. Forexample, you can create a custom attribute called "Cost Center 1", assignit to the custodians who belong to the cost center, and then pick theattribute when you define your search targets with Discovery Accelerator.

Installing Discovery AcceleratorInstalling the Discovery Accelerator server software

34

Page 35: Symantec Discovery Acceleratorâ„¢

Uploading the Discovery Accelerator report templatesUsing Microsoft SQL Server Reporting Services as the reporting mechanism,Discovery Accelerator provides extensive facilities for reporting on the roles andresponsibilities of your Discovery Accelerator users and on the progress thatreviewers and supervisors have made.

To make these reports available to users of the Discovery Accelerator client, youmust upload the supplied templates to your SQL reporting server.

Note: Any reports that you used with Discovery Accelerator 2007 or earlier arenot suitable for use with Discovery Accelerator 8.0.

To upload the Discovery Accelerator report templates

1 Assign the following roles to the Vault Service account:

■ The System Administrator role on the SQL reporting server.

■ The Content Manager role on the home folder of the SQL reporting server.

See the Microsoft Reporting Services documentation for instructions on howto assign these roles.

2 Open the Accelerator Manager Web site.

3 Click Reporting Server at the bottom of the page.

The Uploading Reporting Server Templates page appears.

4 In the Reporting Server URL field, type the URL of the virtual directory ofthe SQL reporting server.

5 In the UserName field and Password field, type the credentials for the VaultServices account. By doing so, you identify the Vault Services account as theowner of all exchanges between the Discovery Accelerator server and SQLreporting server.

6 Click Upload Reports.

Note that it can take several minutes to upload the report templates to theserver.

Configuring Discovery Accelerator for use in a Network Load Balancingcluster

Network Load Balancing (NLB) is a clustering technology that Microsoft offers aspart of Windows Server 2003/2008. NLB balances the network traffic across allthe nodes in a cluster, which work together to run a common set of applications

35Installing Discovery AcceleratorInstalling the Discovery Accelerator server software

Page 36: Symantec Discovery Acceleratorâ„¢

and provide the image of a single system to client users. NLB helps to enhancethe scalability and performance of Discovery Accelerator by distributing clientrequests across the nodes in the cluster; background Discovery Accelerator tasksare unaffected. It also provides high availability by detecting node failures andautomatically redistributing traffic to operational nodes.

The process of setting up an NLB cluster requires you to specify a virtual nameor IP address for the cluster. When they start the Discovery Accelerator client,your users must specify this virtual name or address as the server to which theywant to connect.

To configure Discovery Accelerator for use in an NLB cluster

1 Ensure that each node that you want to include in the NLB cluster has a fixedIP address.

If you do not have these fixed addresses, you can obtain them from yournetwork administrator.

2 Use the Network Load Balancing Manager that comes with Windows to setup and manage the cluster.

Consult the documentation that accompanies Network Load BalancingManager for guidelines on how to do this.

3 Install the Discovery Accelerator server software on each node in the cluster.

As a minimum, you must install the Enterprise Vault Accelerator Managerservice on each node.

Installing the Discovery Accelerator client softwareThe Discovery Accelerator release media include two packages with which youcan install the client software on your users' computers:

■ An MSI installer package

■ A ClickOnce installation package

One advantage of using the MSI installer package is that it lets you install theclient software on a per-user or per-machine basis. On the other hand, ClickOnceprovides the ease of deployment of Web applications and makes it simple todistribute updates to the Discovery Accelerator client.

Note:You cannot use both packages to install or upgrade the Discovery Acceleratorclient on the same computer.

Installing Discovery AcceleratorInstalling the Discovery Accelerator client software

36

Page 37: Symantec Discovery Acceleratorâ„¢

Modifying the configuration file for the Discovery Accelerator clientBefore you proceed, it is a good idea to modify the configuration file thataccompanies your chosen installation package. One of the settings in this file isthe name or address of the computer on which you have installed the DiscoveryAccelerator server software. By providing this information in the configurationfile, you can save your users from having to supply the computer name or addresswhen they first start the Discovery Accelerator client.

To modify the configuration file for the Discovery Accelerator client

1 Locate the configuration file AcceleratorClient.Exe.Config in theinstallation folder for the Discovery Accelerator client software.

2 Open the configuration file in a plain text editor such as Windows Notepad.

3 Find the following configuration setting:

<add key="AcceleratorServer" value="localhost" />

4 Replace the value with the name, fully qualified domain name, or IP addressof the computer on which you installed the Discovery Accelerator serversoftware. For example:

<add key="AcceleratorServer" value="server2" />

If you have configured Discovery Accelerator for use in a Network LoadBalancing cluster, you must specify the virtual name or IP address of thecluster.

5 Save and close the file.

Using the MSI installer package to install the Discovery Acceleratorclient

Typically, you distribute the Discovery Accelerator client software by directingusers to a central location from which they can run the MSI installer package. Bydefault, the installer package for the Discovery Accelerator client softwareperforms a per-user installation of the software. This type of installation doesnot permit other users of the computer to run the application. However, if youhave administration privileges on the computer and want to permit all users torun the application, you can perform a per-machine installation.

To install the Discovery Accelerator client software

1 Ensure that the configuration file AcceleratorClient.Exe.Config file is inthe installation folder for the Discovery Accelerator client software.

2 Do one of the following:

37Installing Discovery AcceleratorInstalling the Discovery Accelerator client software

Page 38: Symantec Discovery Acceleratorâ„¢

■ To perform a per-user installation, start the Discovery Accelerator installerpackage (Symantec Enterprise Vault Discovery Accelerator

Client.msi).

■ To perform a per-machine installation, open a Command Prompt windowand then type the following:msiexec /I "path_to/Symantec Enterprise Vault Discovery

Accelerator Client.msi" ALLUSERS=1

Caution: If you are a Windows Vista user and have User Account Control(UAC) enabled, you must open the Command Prompt window withadministrator privileges. Right-click the Command Prompt shortcut onthe Windows Start menu and then click Run as Administrator.

3 Follow the on-screen instructions.

Using ClickOnce to deploy the Discovery Accelerator clientClickOnce is a deployment technology that Microsoft has developed for the .NETFramework. It is designed to deploy applications from the Web, keep them up todate, and minimize the effect that those applications have on your users'computers.

In outline, the procedure for using ClickOnce to deploy the Discovery Acceleratorclient is as follows:

■ Obtain a code-signing certificate with which to sign the ClickOnce package.

■ Obtain the SHA-1 thumbprint of the code-signing certificate.

■ Edit the supplied MSBuild file to suit your environment, and then build thefinal deployment package.

■ Copy the deployment package to your IIS Server computer.

■ Set up a Web site from which users can run the installation.

The following sections describe these steps in more detail.

Note: The Discovery Accelerator release media include a ready-made ClickOncepackage with which you can review the contents of a deployment package withoutneeding to obtain a certificate, edit the MSBuild file, or build the final package.However, this sample package is not intended for use in production environments.

Installing Discovery AcceleratorInstalling the Discovery Accelerator client software

38

Page 39: Symantec Discovery Acceleratorâ„¢

Obtaining a code-signing certificateOne of the fundamentals of the ClickOnce design is that deployment packagesmust be secure and trusted. So, it is a requirement that all ClickOnce packagesare signed using a suitable code-signing certificate. If you do not have one, youcan make a self-signed certificate by running Microsoft's Certificate Creation Tool(Makecert.exe). This tool is available as part of Visual Studio 2005 and theWindows 2003 SDK.

To make a self-signed certificate

1 Open a Command Prompt window.

2 Change to the folder in which you have installed Makecert.exe.

3 Type the following command:

makecert -a sha1 -b mm/dd/yyyy -e mm/dd/yyyy -eku oid

"CN=certificate_name" -pe -r -ss store

where the parameters are as follows:

Specifies that you want to use SHA-1 as the signature algorithm.-a

Specifies the date from which the certificate is valid.-b

Specifies the date on which the certificate expires.-e

Inserts one or more key usage object identifiers (OIDs) into the certificateto denote that the certificate is intended for code signing.

-eku

Specifies the certificate name. This name must conform to the X.500standard. The simplest method is to enclose the name in double quotationmarks and precede it with CN=; for example, "CN=myName".

-n

Marks the generated private key as exportable so that you can include itin the certificate.

-pe

Creates a self-signed certificate.-r

Identifies the certificate store in which to store the output certificate. EnterMy to store the certificate in your personal store.

-ss

For more information on these options, see the following article on theMicrosoft Web site:

http://msdn.microsoft.com/en-us/library/bfsktky3(VS.80).aspx

For example, the following command creates a self-signed certificate that"YourCompany Inc" has issued and that is valid until January 2036. Thecommand imports the certificate directly into your personal certificate store:

39Installing Discovery AcceleratorInstalling the Discovery Accelerator client software

Page 40: Symantec Discovery Acceleratorâ„¢

makecert -a sha1 -b 01/01/2000 -e 01/01/2036 -eku

1.3.6.1.5.5.7.3.3 -n "CN=YourCompany Inc" -pe -r -ss My

Obtaining theSHA-1 thumbprint of the code-signing certificateAs part of the procedure for customizing the ClickOnce deployment package, youmust supply the SHA-1 thumbprint of your code-signing certificate.

To obtain the SHA-1 thumbprint of the code-signing certificate

1 On the Windows Start menu, click Run.

2 Type MMC, and then click OK to open the Microsoft Management Console.

3 On the File menu, click Add/Remove Snap-in.

4 In the Add/Remove Snap-in dialog box, click Add.

5 In the Add Standalone Snap-in dialog box, click Certificates, and then clickAdd.

6 In the Certificates snap-in dialog box, click My user account, and then clickFinish.

7 Click Close to close the Add Standalone Snap-in dialog box.

8 Click OK to close the Add/Remove Snap-in dialog box.

9 In the console tree at the left, under Certificates -CurrentUser, double-clickPersonal and then click Certificates.

10 Double-click the certificate that you want to use for code signing.

11 On the Details tab of the Certificate dialog box, click the Thumbprint field.

12 Select the value of the Thumbprint field, and then press Ctrl+C to copy it tothe Clipboard.

Customizing and building the ClickOnce deployment packageThe Discovery Accelerator ClickOnce package comes with a file calledGenerateClickOnce.msbuild, which you can customize to suit your environment.For example, this file lets you specify the IIS Server address from which users canrun the installation. You can also choose whether an installed DiscoveryAccelerator client should perform an update check at start-up.

After you have set your preferred configuration options in the file, use the MSBuildengine to build the final deployment package. This engine is included in .NETFramework 2.0 and later.

Installing Discovery AcceleratorInstalling the Discovery Accelerator client software

40

Page 41: Symantec Discovery Acceleratorâ„¢

To customize and build the ClickOnce deployment package

1 Copy the files from the following folder in the release media to a new folderon your local drive:

..\Symantec Enterprise Vault Discovery Accelerator

8.0\Client\ClickOnce\ApplicationFiles

2 Browse to the new folder in Windows Explorer.

3 Open the GenerateClickOnce.msbuild file in a plain text editor such asWindows Notepad.

4 Modify the following properties at the start of the file:

Specifies the SHA-1 thumbprint of the code-signingcertificate. Remove the spaces from the string. Thiscertificate must exist in your personal store.

See “Obtaining the SHA-1 thumbprint of the code-signingcertificate” on page 40.

Thumbprint

Specifies the folder in which to output your ClickOncedeployment package.

OutputPath

Specifies the IIS Server address from which users can obtainthe ClickOnce deployment package.

See “Making the ClickOnce deployment package availablefor download” on page 42.

DeploymentPath

Specifies whether an installed Discovery Accelerator clientshould automatically check your nominated deployment pathfor updates. Valid settings are "true" or "false".

EnableAutoUpdates

For example, you can set the properties as follows:

<Thumbprint>df9634cc5e654f07521d11de8bc03d6ed789ef8e</Thumbprint>

<OutputPath>\\Server1\WebServer</OutputPath>

<DeploymentPath>http://server2/discovery</DeploymentPath>

<EnableAutoUpdates>true</EnableAutoUpdates>

5 Save and close the file.

6 In Windows Explorer, search the folders under your .NET Frameworkinstallation for the file MSBuild.exe.

7 Open a Command Prompt window.

41Installing Discovery AcceleratorInstalling the Discovery Accelerator client software

Page 42: Symantec Discovery Acceleratorâ„¢

8 Change to the folder that contains the most recent version of MSBuild.exe.For example, you can type the following:

cd C:\WINDOWS\Microsoft.NET\Framework\v3.5

9 Type the following command:

MSBuild path_to\GenerateClickOnce.msbuild

wherepath_to specifies the absolute path to the GenerateClickOnce.msbuildfile. For example, you can type the following:

MSBuild c:\ClickOnce\GenerateClickOnce.msbuild

MSBuild creates the final deployment package in the folder that you specifiedwith the OutputPath property.

10 Copy the contents of the output folder to the required location on your IISServer computer.

Making the ClickOnce deployment package available fordownloadAfter you have built the ClickOnce deployment package and copied it your IISServer computer, you must set up a Web site in IIS that points to this folder.

To make the ClickOnce deployment package available for download

1 Open IIS Manager on the server that is to host the Web site.

2 Right-click the container for your default Web site and then click New>Virtual Directory.

Installing Discovery AcceleratorInstalling the Discovery Accelerator client software

42

Page 43: Symantec Discovery Acceleratorâ„¢

3 When the Virtual Directory Creation Wizard appears, click Next.

4 Set the virtual directory alias to match the value of the DeploymentPathproperty in your GenerateClickOnce.msbuild file.

For example, you would set the alias to Discovery if you set theDeploymentPath property to http://server2/discovery.

5 For the Web site home directory, enter the path to the folder that containsthe ClickOnce deployment package, and then click Next.

6 When the wizard prompts you to set the access permissions for the virtualdirectory, click Next without changing the default permissions.

7 Click Finish to close the wizard and create the virtual directory.

To configure the settings for the virtual directory

1 Open IIS Manager on the server that is to host the Web site.

2 Right-click the new virtual directory, and then click Properties.

3 On the Directory Security tab, click Edit under Authentication and accesscontrol.

4 Ensure that Enable anonymous access is checked, and then click OK.

43Installing Discovery AcceleratorInstalling the Discovery Accelerator client software

Page 44: Symantec Discovery Acceleratorâ„¢

Installing Discovery Accelerator from the IIS Server computerUsers can install the ClickOnce package after you have deployed it to your IISServer computer.

To install Discovery Accelerator from the IIS Server computer

1 Open Internet Explorer.

2 Browse to the Web site from which you can obtain the ClickOnce deploymentpackage.

For example, you can specify the Web site address ashttp://server2/discovery.

3 Click Install.

Updating a ClickOnce installationClickOnce packages are designed to be easily updated. When a new version of theDiscovery Accelerator client is available, you must rebuild the deployment packageand copy it to your IIS Server computer. The update option that you have set inthe GenerateClickOnce.msbuild file determines whether users download thelatest updates when they next start the client.

Installing Discovery AcceleratorInstalling the Discovery Accelerator client software

44

Page 45: Symantec Discovery Acceleratorâ„¢

Introducing the DiscoveryAccelerator client

This chapter includes the following topics:

■ About the Discovery Accelerator client

■ Opening the Discovery Accelerator client

■ Finding your way around the Discovery Accelerator client

■ Closing the Discovery Accelerator client

About the Discovery Accelerator clientThe client is a feature-rich Windows application with which Discovery Acceleratoradministrators can administer and customize the application. Equally importantly,the client lets Discovery Accelerator users add marks and comments to the itemsthat they review. The roles to which a Discovery Accelerator user has been assigneddetermine the features of the client that the user can access.

You perform most of the activities that are described in this guide with theDiscovery Accelerator client.

Opening the Discovery Accelerator clientIf you add a shortcut to the Discovery Accelerator client to the Windows desktop,you can open the client by double-clicking the shortcut. Alternatively, you canopen the program by clicking the program name in the Windows Start menu.

5Chapter

Page 46: Symantec Discovery Acceleratorâ„¢

To open the Discovery Accelerator client

1 On the Windows Start menu, click Programs > Symantec Enterprise VaultDiscovery Accelerator Client.

2 Click Discovery Accelerator Client.

After a few moments, the "Select a Discovery Accelerator instance to connectto" dialog box appears.

3 In the Server box, type the name of the computer on which the DiscoveryAccelerator server software is running.

4 In the Instance box, select the Discovery Accelerator instance (customerdatabase) that you want to access. Click the down arrow at the right of thebox to list the available instances.

Each instance stores the details of a set of cases that you want to review. Italso stores the associated user roles, search results, research folders, andmore. Therefore, you may have multiple instances from which to choose.

5 Uncheck Ask every time the application is opened if you always want toconnect to the same instance without first displaying the "Select a DiscoveryAccelerator instance to connect to" dialog box.

6 Click Connect.

After a few moments, the Discovery Accelerator client appears.

Introducing the Discovery Accelerator clientOpening the Discovery Accelerator client

46

Page 47: Symantec Discovery Acceleratorâ„¢

Finding your way around the Discovery Acceleratorclient

In the Discovery Accelerator client, the roles to which you have been assigneddetermine the features that you can access. Table 5-1 describes the features thatusers with the most permissive roles can access. Discovery Acceleratoradministrators can assign multiple different roles to users and change thepermissions that are associated with the roles.

Table 5-1 Primary tabs in the Discovery Accelerator client

DescriptionTabIcon

This tab provides a headline view of the status of theactivities that you perform in Discovery Accelerator. Italso gives you quick access to the activities that you arelikely to perform frequently with Discovery Accelerator.

Home

This tab lets you view the items in the review set andassign marks and comments to them.

Review

This tab lets you set up research folders where you canwork privately on the items that interest you withoutgenerating additional work for other DiscoveryAccelerator reviewers.

Research

This tab lets you open and manage cases. You can alsoenable "analytics" on your cases so that you can performadditional analyses of the metadata and content of theitems that you have collected in them.

Cases

This tab lets you set up email targets, which you caninclude in the criteria of a Discovery Accelerator search.A target is a shorthand way of specifying all the emailaddresses of an employee so that you do not need toenter them all when you set up a search .

The tab also provides a link to the Custodian ManagerWeb site, where you can specify the details of custodiansand custodian groups for which you want to search withDiscovery Accelerator.

See “About Custodian Manager” on page 109.

Custodians

47Introducing the Discovery Accelerator clientFinding your way around the Discovery Accelerator client

Page 48: Symantec Discovery Acceleratorâ„¢

Table 5-1 Primary tabs in the Discovery Accelerator client (continued)

DescriptionTabIcon

This tab lets you generate reports on various aspects ofDiscovery Accelerator, including the progress ofreviewers and their roles and responsibilities.

Reports

This tab lets you monitor the status of all DiscoveryAccelerator searches and pause or resubmit them asnecessary.

Monitor

This tab provides access to a range of commonly usedadministrative facilities. You can do the following:

■ Set up Discovery Accelerator roles and assign themto users.

■ Set up and edit the marks and tags that reviewerscan apply to items.

■ Customize the list of Enterprise Vault archives inwhich Discovery Accelerator searches for items.

Application

This tab provide access to a range of configurationfacilities that you are likely to use infrequently. You cando the following:

■ Set up schedules with which you can run DiscoveryAccelerator searches repeatedly, at scheduled times.

■ Specify the details of custom attributes that you caninclude in your search criteria.

■ Import configuration data into Discovery Acceleratorfrom an XML file.

■ Set hundreds of configuration options with whichyou can customize the appearance and performanceof Discovery Accelerator.

Configuration

Closing the Discovery Accelerator clientWhen you have finished with the Discovery Accelerator client, you can close itby following the instruction below.

To close the Discovery Accelerator client

◆ Click the close button in the upper-right corner of the window.

Introducing the Discovery Accelerator clientClosing the Discovery Accelerator client

48

Page 49: Symantec Discovery Acceleratorâ„¢

Working with cases

This chapter includes the following topics:

■ About cases

■ Opening cases

■ Working with analytics rules

■ Implementing analytics in cases and folders

■ Checking the progress of cases

■ Deleting cases

About casesEverything that is related to a discovery action, including user permissions, itemreviewers, the marking scheme, the tagging scheme, searches, analyses, and theset of items to be reviewed, is grouped in a "case". Within a single DiscoveryAccelerator system, reviewers can work on multiple cases at the same time.

Discovery Accelerator 8.0 provides a new option with which you can enable"analytics" on a case or a research folder. This option provides additional analysesof the metadata and content of items that are collected in the case. Analytics alsolets users search within specific items in a case, examine and review entireconversation threads in one view, and automatically pre-mark or categorize theitems in the case. These functions deliver a new review experience that is knownas "Guided Review".

Note: You perform all the activities that are described in this chapter in theDiscovery Accelerator client.

6Chapter

Page 50: Symantec Discovery Acceleratorâ„¢

Opening casesYou must have the Create and Configure Cases permission to open cases. Bydefault, only users with the role of Discovery System Admin have this permission.

See “About the Discovery Accelerator permissions” on page 77.

To open a case

1 Click the Cases tab in the Discovery Accelerator client.

2 In the left pane, click All Cases.

3 Click Create at the top of the window.

4 In the Name box, type a name that indicates the nature of the case or theclient.

5 In the Case Status box, ensure that Open is selected.

If you set the status to Closed, Discovery Accelerator disables the case so thatcase administrators and reviewers cannot access it.

6 In the Owner box, select the Windows account of the user who is to havespecial privileges to manage the case. A case cannot have multiple owners,but you can nominate a Windows group as the owner.

If your preferred case owner does not appear in the drop-down list, clickSelect Owner and then select the required user.

7 In the Legal Holds area, check Put items on hold if you want to stop usersfrom deleting the items in the case from the source Enterprise Vault archives.

The Reason box provides a space for you to describe why you have placedthe items on hold.

Working with casesOpening cases

50

Page 51: Symantec Discovery Acceleratorâ„¢

8 In the Productiondetails area, specify the naming convention and preferredoutput folder for the items that you export or produce from the case. You canamend these details later when you undertake the export run or productionrun.

The options are as follows:

Specifies the number of digits to use in the exportnumber for each item. The default is 6.

Size of the export ID

Specifies the next number to append to the productionset. This number increases with each export run orproduction run that you undertake.

Next export number

Specifies the text to use as a prefix for the exportnumber for each item. You may want to use letters toidentify the export in accordance with legal or companynaming convention.

Prefix

Displays a preview of the production ID.Show Example

Specifies the folder in which to store the items thatyou export from the case. By default, this folder is C:\on the server that is running the Enterprise VaultAccelerator Manager service. To export the items toanother computer, specify the path to a shared networkdrive, as in \\my_computer\exports.

Output folder

9 In the Search details area, select the vault stores in which to search for theitems that are relevant to the case. Check or uncheck the box next to eachvault store to include it in or exclude it from searches.

10 Click Save.

Working with analytics rulesWithin each case you can create analytics rules to identify items that match yoursearch criteria. You can also configure these rules to apply marks and tagsautomatically to the matched items.

See “About review marks and tags” on page 83.

All the indexed mail attributes and the content of each message are searchablein the analytics rules you create. Each case can have many rules, and each rulecan have multiple conditions. This lets you to categorize items that match yourcriteria automatically, before you review them on the Review tab.

51Working with casesWorking with analytics rules

Page 52: Symantec Discovery Acceleratorâ„¢

If you know the search criteria you want to use, you can define rules for a casebefore you enable it for analytics. When the case is enabled for analytics, datacollection and indexing begins and rule actions are applied in parallel to markand tag the matching items. You can also create and edit rules after the case hasbeen enabled for analytics. When you create or edit a rule in a case that is alreadyenabled for analytics, the new rules start marking and tagging matching itemsimmediately. Similarly, when you delete or disable a rule, new processing beginsand removes marks and tags from items that were previously categorized by therules.

When you have built your rules and enabled the case for analytics, use theAnalytics tab to monitor the collection of data, and automatic categorization. Theautomatic categorization summary shows the actions that the rules applied. Ifthe rules you created match too many or too few items, you can change the rulesto produce better results.

Overriding manual categorizationBy default, rules do not categorize the items that the rule conditions match if theyhave already been marked or tagged manually in the Review tab. You can use theoverride manual categorization feature to change this behavior and allow the ruleengine to categorize all items that match the conditions.

Note: Use the override manual categorization feature with caution. You shoulduse it only to override incorrect marks and tags applied manually by reviewers.With this option enabled, you must also wait until automatic categorization iscomplete before you manually mark or tag any items on the case.

You must have the Manage Automatic Categorization permission to build andmanage analytics rules. In upgraded systems, no predefined Discovery Acceleratorrole has this permission by default. However, in new installations, the CaseAdministrator role has this permission by default.

To allow the rule engine to categorize the items that have been manually markedor tagged

1 Click the Cases tab in the Discovery Accelerator client, and then click theRule Builder tab.

2 Click Override Manual Categorization near the top of the tab.

This feature remains in operation until the rule engine has completed its run thatare based on all the current rules. When it has completed its processing, theoverride manual categorization feature is automatically turned off again.

Working with casesWorking with analytics rules

52

Page 53: Symantec Discovery Acceleratorâ„¢

Building analytics rulesThe following procedures describe how to build analytics rules, using the areason the Rule Builder tab.

Use the Rule details area to enter the rule’s basic details.

To create a rule and enter rule details

1 Click New at the top of the tab.

2 In the Rule name box, enter a name for the rule.

3 In the Rule description box, enter the rule’s description.

4 Ensure that the Rule enabled option is selected.

You can clear the Rule enabled option if you want to create a rule that is notyet enabled. The rule then has no effect until it is enabled subsequently.

Adding conditions to rules and advanced searchesUse the Rule conditions, Rule query, and Rule condition settings areas to specifythe search conditions for your rule or advanced search. These areas function thesame in both the Rule Builder tab and the Advanced Search page.

You must have the Manage Automatic Categorization permission to build andmanage analytics rules. In upgraded systems, no predefined Discovery Acceleratorrole has this permission by default. However, in new installations, the CaseAdministrator role has this permission by default.

If you are adding rule conditions to an advanced search fromwithin the Review tab

1 In the Filtername box, enter a name for the search. The name must be uniquewithin the case or folder.

2 In the Filter description box, enter a description for the rule.

The following example procedure describes how to add a rule condition to searchfor messages with "Symantec" in the subject.

To add the first rule condition

1 In the Select attribute list, select Subject.

2 In the next list, select the operator Contains.

53Working with casesWorking with analytics rules

Page 54: Symantec Discovery Acceleratorâ„¢

3 In the text box, type the search string Symantec.

As you type, Discovery Accelerator displays an on-screen hint to help youenter the string successfully.

4 Ensure that the next list is set to Stemmingoff so that the condition does notsearch for variations of "Symantec".

Stemming is provided only for the attributes Subject, Content, and Subjector content. It lets you match words that derive from the word you specify inyour rule. For example, when you add “run” to your rule, it matches not only“run” but “running” and “ran”.

You cannot use wildcard characters in rule conditions that use stemming.

As you add rule conditions, you can see the query build up in the Rule query area.

If this condition is the only one that you want to add, you can continue to buildthe rest of the rule. However, you can add further conditions if appropriate.

To add an additional rule condition

1 Next to the first condition, click the + icon.

2 In the first list, select And or Or to specify an additional or alternative searchcondition.

3 In the Select Attribute list, select the attribute that you want to search withthis condition.

4 In the next list, select an operator.

5 In the text box, enter your search string. Note the browse icon (...) next to thetext box. You can use this icon to select targets and target groups for whomyou want to search.

6 Repeat the previous steps for each additional condition that you want to add.

To remove a rule condition

◆ Click the – icon next to the condition.

Note: Discovery Accelerator does not request confirmation when you deletea condition. It is deleted immediately.

If Custodian Manager is enabled, the Rule condition settings area is displayed.Use this area to control how analytics uses the rule to search custodians anddistribution lists. Both custodians and distribution lists can be searched usingemail addresses, display names, or both. You can also expand distribution lists toinclude their members in your searches, rather than just the list’s name and emailaddress.

Working with casesWorking with analytics rules

54

Page 55: Symantec Discovery Acceleratorâ„¢

The conditions that you enter in the Rule conditions settings area use the custodianinformation that as it is at the time the rule is created or saved. It is not updatedunless the rule is edited again. For example, when you create a rule and select theoption Expand distribution list to include members, the list’s members at thattime are saved with the rule. If the membership of the list changes subsequently,these changes are not applied to the rule until you edit and save it again.

To specify rule condition settings

1 In the Search custodians by list, select from the following options to determinewhether custodians are searched by email address, display name, or both:

■ Email addresses

■ Display names

■ Email addresses & display names

2 In the Search group distribution lists by list, select from the following optionsto determine whether distribution lists are searched by email address, displayname, or both:

■ Email addresses

■ Display names

■ Email addresses & display names

3 If you want to expand distribution lists so that their members are also includedin searches, check Expand distribution list to include members.

Note:Distribution lists are not expanded when you use the Near and Not Nearoperators with Subject, Content, Subject or content, Author, To, CC, BCC, andAuthor or recipients.

Rule actionsUse the Rule actions area to set automatic categorization actions for the itemsthe rule matches, and to set each rule’s priority.

If you create your rule before you enable a case for analytics, automaticcategorization is applied in parallel with the collection of data from EnterpriseVault. If you create or edit rules for a case that is already enabled, the rule enginemust restart automatic categorization using the new rules.

You must have the Manage Automatic Categorization permission to build andmanage analytics rules. In upgraded systems, no predefined Discovery Accelerator

55Working with casesWorking with analytics rules

Page 56: Symantec Discovery Acceleratorâ„¢

role has this permission by default. However, in new installations, the CaseAdministrator role has this permission by default.

To specify rule actions

1 If you want to mark found items automatically, select the Markitemas option,and select a mark from the list.

2 If you want to tag found items automatically, select the Tag items as option,and select appropriate tags from the list.

If necessary, expand the tag groups to see individual tags.

3 From the Rule priority as list, select a priority for this rule. Note that lowernumbers take priority over higher numbers; a rule with its priority set to 1has the highest priority.

By default, new rules have lower priority than existing rules. You can changethe value to give the rule a higher priority, and existing rules’ priorities arechanged accordingly.

Copying, editing, and deleting analytics rulesTo create a new rule that has similarities to an existing rule, you can copy theexisting rule and save it under a new name. You can also edit an existing rule tochange its search criteria or disable it temporarily. If you want permanently toremove a rule from processing, you can delete the rule.

You must have the Manage Automatic Categorization permission to build andmanage analytics rules. In upgraded systems, no predefined Discovery Acceleratorrole has this permission by default. However, in new installations, the CaseAdministrator role has this permission by default.

To copy an analytics rule

1 In the Rule Builder page, click the rule that you want to copy.

2 Click Copy.

3 In the Rule Details area, enter a new, unique rule name.

4 Make any other necessary changes to the search criteria from the rule thatyou copied.

For example, if you want to change the priority level of the new rule, changethe Rule priority as value in the Rule Actions area.

5 Click Apply.

Working with casesWorking with analytics rules

56

Page 57: Symantec Discovery Acceleratorâ„¢

To edit an analytics rule

1 In the Rule Builder page, click the rule that you want to edit.

2 Make the required changes to the rule.

For example, if you want to disable the rule temporarily, uncheck Ruleenabledin the Rule Details area.

3 Click Apply.

To delete an analytics rule

1 In the Rule Builder page, click the rule that you want to delete.

2 Click Delete.

3 Click OK to confirm that you want to delete the rule.

Prioritizing marking rulesEach marking rule has a priority value, which you assign when you create it. Whenthe rule with the highest priority marks an item, no rule with a lower priority canmark the same item. Even if the conditions on the rule with the lower priorityvalue would match the item, it is excluded from automatic categorization underthis rule.

Rules that are configured to apply both marks and tags to items also have a priorityvalue. Once a rule that applies both marks and tags has automatically categorizeditems, these items cannot be categorized by lower priority rules.

You must have the Manage Automatic Categorization permission to build andmanage analytics rules. In upgraded systems, no predefined Discovery Acceleratorrole has this permission by default. However, in new installations, the CaseAdministrator role has this permission by default.

To change a marking rule’s priority value

1 Click the Cases tab in the Discovery Accelerator client, then click Rulebuilder.

2 In the Markingrules area, select the rule whose priority you want to change.

3 Click the up or down arrow next to the rule until it has the correct priority.

4 Click Apply.

You can also change a rule’s priority by editing the rule to enter a new value inthe Rule priority as box in the Rule actions area.

57Working with casesWorking with analytics rules

Page 58: Symantec Discovery Acceleratorâ„¢

Tagging rulesTagging rules behave differently from marking rules. Tagging rules do not havea priority value, and any number of tagging rules can match one item. However,when a tagging rule applies a tag from a single-choice tag group, no other rulecan then apply a tag from the same group.

See “Creating tag groups” on page 88.

When you disable a tagging rule that has applied tags from single-choice taggroups, the rule engine removes the tags, and may apply tags from single-choicegroups configured in other rules. If you re-enable the first tagging rule, it ispossible for the rule engine to produce different results from those that existedbefore you disabled the rule.

For example:

■ Single-choice group called SS1 contains tags called TagA and TagB

■ Single-choice group called SS2 contains tags called TagY and TagZ

Two tagging rules are configured to apply tags from these single-choice groups:

■ Rule1 applies TagA and TagY

■ Rule2 applies TagB and TagZ

There 100 items that match the criteria of both rules. In this case, the rule engineprocesses Rule1 and applies TagA and TagY to the 100 items. Although the itemsalso match the criteria in Rule2, the rule engine does not apply TagB and TagZ tothe 100 items because they are already tagged by other tags from the both thesingle-choice tag groups.

If you disable Rule1, the rule engine first removes TagA and TagY from the items,and then applies TagB and TagZ under Rule2. If you re-enable Rule1, TagB andTagZ remain on the 100 items. The rule engine cannot now apply TagA and TagYbecause the 100 items are already tagged by other tags from the both thesingle-choice tag groups.

Manually editing analytics rule queriesThe rules you build in the Rule conditions area of the Rule Builder tab are displayedin the analytics rule definition language (RDL), in the Rule query area. When youbecome familiar with the syntax of rule definition language, you can directly editthe queries.

Note: When you have manually edited a query and save it, you can no longer usethe visual query builder to edit the same rule.

Working with casesWorking with analytics rules

58

Page 59: Symantec Discovery Acceleratorâ„¢

RDL lets you create rules that are not possible in the visual rule builder. Forexample, you can use parentheses to set Boolean precedence in your rules. Considera case in which you want to mark or tag the items that match these conditions:

■ The sender is John Doe or the recipient is Jane Smith.

■ The email subject must contain the word Symantec.

To match these items, one user might use the visual rule builder and constructthe following rule:

Author CONTAINS '"John Doe"'

OR

To CONTAINS '"Jane Smith"'

AND

Subject CONTAINS 'Symantec'

However, another user might construct the rule differently, and produce thisresult:

To CONTAINS '"Jane Smith"'

AND

Subject CONTAINS 'Symantec'

OR

Author CONTAINS '"John Doe"'

In both cases, it is unclear what results are produced when the rule engineprocesses the rules. To ensure that your rules produce the results that you want,write them directly in RDL and use parentheses to group the conditions thatbelong together. The parentheses ensure that related conditions are evaluated asyou intend, and it is clear what your intentions are. For example:

(

Author CONTAINS '"John Doe"'

OR

To CONTAINS '"Jane Smith"'

)

AND

Subject CONTAINS 'Symantec'

You can use stemming when you search the Subject, Content or SubjectOrContentattributes. Use the following syntax:

attribute {STEM} operator value

59Working with casesWorking with analytics rules

Page 60: Symantec Discovery Acceleratorâ„¢

Note: You may not use wildcard characters in rule conditions that use stemming.

Any phrase values that you add to your searches should be enclosed in doublequotation marks. For example:

subject contains "the purchase order"

In RDL, complex search values must be enclosed in double quotation marks. Forexample:

SubjectOrContent AllOf

'

"the purchase order"

Stock Investment

'

In this case, the query matches the items that contain "the purchase order", "stock",and "investment" in the subject or body.

You must have the Manage Automatic Categorization permission to build andmanage analytics rules. In upgraded systems, no predefined Discovery Acceleratorrole has this permission by default. However, in new installations, the CaseAdministrator role has this permission by default.

To manually edit the query in an existing rule

1 Click the Cases tab in the Discovery Accelerator client, and then click RuleBuilder.

2 In the Rule Query area, click Edit Query.

3 Edit the query.

4 Click Apply.

Rule operators and search attributesTable 6-1 lists all the single value rule operators available in the visual rule builderand in the rule definition language. These operators accept only one search value.

Table 6-1 Single value rule operators

DescriptionOperator

Use for numbers, dates, and lists. For example:

AttachmentsCount=2

=, NOT =

Use for numbers and dates.<, <=, >, >=

Working with casesWorking with analytics rules

60

Page 61: Symantec Discovery Acceleratorâ„¢

Table 6-1 Single value rule operators (continued)

DescriptionOperator

Use for strings. Wildcards are allowed in the search values.

Example 1:

subject contains james

This search matches all the items that contain the exact word james in thesubject.

Example 2:

subject contains james*

This search matches both “A quick hello from James” and “A quick hellofrom Jamestown”.

You cannot use a wildcard character at the start of a search string.

Contains

Table 6-2 lists all the multiple value rule operators available in the visual rulebuilder and in the rule definition language. These operators accept multiple searchvalues. The syntax for searches that contain multiple value operators is:

attribute operator 'value1

"John Doe"

value3

T:Jane Smith'

Each custodian value, such as targets and target groups, must be on a separateline.

Table 6-2 Multiple value rule operators

DescriptionOperator

Use for strings.

Searches match items that contain all the values you supply. For example:

CC ALLOF [email protected] [email protected]

This search matches only items that contain both addresses in the CC field.

Wildcards are supported.

ALLOF

61Working with casesWorking with analytics rules

Page 62: Symantec Discovery Acceleratorâ„¢

Table 6-2 Multiple value rule operators (continued)

DescriptionOperator

Use for strings.

Searches match items that contain any of the values you supply. For example:

CC ALLOF [email protected] [email protected]

This search matches items that contain one of the addresses, or bothaddresses in the CC field.

Wildcards are supported.

ANYOF

Use for strings.

Searches matches items that contain the words you specify, close together.For example:

Body NEAR contract money

This search matches items whose body contains the words “contract” and“money ” close together.

NEAR

Use for dates. For example:

MailDate BETWEEN date1, date2

You must place the earlier date before the later date.

BETWEEN

Table 6-3 lists all the attributes available in the visual rule builder and in the ruledefinition language. For each attribute, the table shows the operators that youcan use with the attribute, and describes its purpose.

Table 6-3 Search attributes

DescriptionAcceptedoperators

TypeAttribute

Use AttachmentsCount to add acondition that is based on the numberof email attachments.

=

>

>=

<

<=

NumericAttachmentsCount

Working with casesWorking with analytics rules

62

Page 63: Symantec Discovery Acceleratorâ„¢

Table 6-3 Search attributes (continued)

DescriptionAcceptedoperators

TypeAttribute

Use Author to add a condition that isbased on the email’s sender.

Values that correspond to targets (T:),target groups (TG:), custodians (C:), andcustodian groups (CG:) must be on aseparate line. Prefixes such as T: andTG: must be in upper case.

CONTAINS

ANYOF

NOT CONTAINS

NOT ANYOF

StringAuthor

AuthorOrRecipients is a compositeattribute that lets you add a conditionthat is based on senders and recipientsin any of the following attributes:

■ From

■ To

■ CC

■ BCC

Values that correspond to targets (T:),target groups (TG:), custodians (C:), andcustodian groups (CG:) must be on aseparate line. Prefixes such as T: andTG: must be in upper case.

CONTAINS

ANYOF

NOT CONTAINS

NOT ANYOF

StringAuthorOrRecipients

Use BCC to add a condition that is basedon the email’s BCC recipients.

Values that correspond to targets (T:),target groups (TG:), custodians (C:), andcustodian groups (CG:) must be on aseparate line. Prefixes such as T: andTG: must be in upper case.

CONTAINS

ANYOF

ALLOF

NOT CONTAINS

NOT ALLOF

NOT ANYOF

StringBCC

Use CC to add a condition that is basedon the email’s CC recipients.

Values that correspond to targets (T:),target groups (TG:), custodians (C:), andcustodian groups (CG:) must be on aseparate line. Prefixes such as T: andTG: must be in upper case.

CONTAINS

ANYOF

ALLOF

NOT CONTAINS

NOT ALLOF

NOT ANYOF

StringCC

63Working with casesWorking with analytics rules

Page 64: Symantec Discovery Acceleratorâ„¢

Table 6-3 Search attributes (continued)

DescriptionAcceptedoperators

TypeAttribute

Use Content to add a condition that isbased on a string in the body of theemail, or in the file’s content.

Values that correspond to targets (T:),target groups (TG:), custodians (C:), andcustodian groups (CG:) must be on aseparate line. Prefixes such as T: andTG: must be in upper case.

CONTAINS

ANYOF

ALLOF

NEAR

NOT CONTAINS

NOT ALLOF

NOT ANYOF

NOT NEAR

StringContent

Use Custom to add a condition that isbased on any custom attributes createdduring archiving. Enter the name of thecustom attribute before you select anoperator and enter the search string.

For example:

Custom.Symantec.MyAttributeCONTAINS "Symantec"

Values that correspond to targets (T:),target groups (TG:), custodians (C:), andcustodian groups (CG:) must be on aseparate line. Prefixes such as T: andTG: must be in upper case.

=

NOT =

CONTAINS

ANYOF

ALLOF

NOT CONTAINS

NOT ALLOF

NOT ANYOF

StringCustom

Use Direction to add a condition that isbased on the direction of the email.Acceptable values are:

■ Internal

■ External Inbound

■ External Outbound

■ Not Specified

=

ANYOF

NOT =

NOT ANYOF

ListDirection

Use FileExtension to add a conditionthat is based on email extension typeand file types. Enter multiple file typesas a list. For example:

DOC PDF MSG

ANYOF

CONTAINS

NOT ANYOF

NOT CONTAINS

StringFileExtension

Working with casesWorking with analytics rules

64

Page 65: Symantec Discovery Acceleratorâ„¢

Table 6-3 Search attributes (continued)

DescriptionAcceptedoperators

TypeAttribute

Use Importance to add a condition thatis based on the email’s importancesetting. Acceptable values are:

■ Low

■ Normal

■ High

=

ANYOF

NOT =

NOT ANYOF

ListImportance

Use MailDate to add a condition that isbased on the date the email was sent,and on the modified date of email’sattachments.

When you use the BETWEEN and theNOT BETWEEN operators, you mustspecify and start and an end date.

=

>

>=

<

<=

BETWEEN

NOT BETWEEN

DateMailDate

Use MessageClass to add a conditionthat is based on the email’s MAPImessage class setting. For example:

IPM.Note.

ANYOF

CONTAINS

NOT ANYOF

NOT CONTAINS

StringMessageClass

Use MessageType to add a conditionthat is based on the email’s type.Acceptable values are:

■ Exchange Mail

■ Domino Mail

■ SMTP Mail

■ File

■ Instant Messaging

■ Bloomberg

■ Fax

=

ANYOF

NOT =

NOT ANYOF

ListMessageType

65Working with casesWorking with analytics rules

Page 66: Symantec Discovery Acceleratorâ„¢

Table 6-3 Search attributes (continued)

DescriptionAcceptedoperators

TypeAttribute

Use to ModifiedDate to add a conditionthat is based on the date the email orfile was last modified.

When you use the BETWEEN and theNOT BETWEEN operators, you mustspecify and start and an end date.

=

>

>=

<

<=

BETWEEN

NOT BETWEEN

DateModifiedDate

Use OriginalLocation to add a conditionthat is based on the original location ofthe email or file. For example:

■ Inbox

■ Sent items

■ \\server\share\Sales

ANYOF

CONTAINS

NOT ANYOF

NOT CONTAINS

StringOriginalLocation

Use RetentionCategoryDisplayName toadd a condition that is based on theretention categories under which theitem was archived. For example:

General retention category

CONTAINS

NOT CONTAINS

StringRetentionCategoryDisplayName

Use RetentionExpiryDate to add acondition that is based on the date theemail or file is due to expire. Theretention category under which theitem was archived determines theexpiry date.

When you use the BETWEEN and theNOT BETWEEN operators, you mustspecify a start and an end date.

=

>

>=

<

<=

BETWEEN

NOT BETWEEN

DateRetentionExpiryDate

Working with casesWorking with analytics rules

66

Page 67: Symantec Discovery Acceleratorâ„¢

Table 6-3 Search attributes (continued)

DescriptionAcceptedoperators

TypeAttribute

Use Sensitivity to add a condition thatis based on the sensitivity of the email.Acceptable values are:

■ Normal

■ Personal

■ Private

■ Confidential

=

ANYOF

NOT =

ListSensitivity

Use Size to add a condition that is basedon the size of the email or file.

=

>

>=

<

<=

NumericSize

Use Subject to add a condition that isbased on strings in the email’s subject,and in file names.

Values that correspond to targets (T:),target groups (TG:), custodians (C:), andcustodian groups (CG:) must be on aseparate line. Prefixes such as T: andTG: must be in upper case.

CONTAINS

ALLOF

ANYOF

NEAR

NOT CONTAINS

NOT ALLOF

NOT ANYOF

NOT NEAR

StringSubject

67Working with casesWorking with analytics rules

Page 68: Symantec Discovery Acceleratorâ„¢

Table 6-3 Search attributes (continued)

DescriptionAcceptedoperators

TypeAttribute

SubjectOrContent is a compositeattribute that lets you add a conditionthat is based on strings in either of thefollowing attributes:

■ Subject

■ Body

This attribute is also used to matchusing strings in a file’s name or content.

Values that correspond to targets (T:),target groups (TG:), custodians (C:), andcustodian groups (CG:) must be on aseparate line. Prefixes such as T: andTG: must be in upper case.

CONTAINS

ALLOF

ANYOF

NEAR

NOT CONTAINS

NOT ALLOF

NOT ANYOF

NOT NEAR

StringSubjectOrContent

Use To to add a condition that is basedon the email’s recipients.

Values that correspond to targets (T:),target groups (TG:), custodians (C:), andcustodian groups (CG:) must be on aseparate line. Prefixes such as T: andTG: must be in upper case.

CONTAINS

ANYOF

ALLOF

NOT CONTAINS

NOT ALLOF

NOT ANYOF

StringTo

Implementing analytics in cases and foldersUse the Analytics tab to enable analytics for a case or folder, and to monitor theprogress of data collection when it has been enabled. You can also disable, pause,and resume analytics on a case or folder.

The area at the top of the tab shows the current analytics status of the case orfolder. Each case can have one of the following statuses:

■ Analytics disabled

■ Disabling analytics

■ Analytics enabled

■ Enabling analytics

■ Analytics paused

Working with casesImplementing analytics in cases and folders

68

Page 69: Symantec Discovery Acceleratorâ„¢

■ Pausing analytics

The top area of the screen is refreshed every 30 seconds so that it always showsthe latest analytics status for the case. The Data collection area and the Automaticcategorization area show data collection progress, and the status of the automaticcategorization.

The Marks and tags area shows a summary of the marks and tags that are definedfor this case.

Enabling, pausing, and disabling analyticsWhen you enable a case for analytics, case items including content, attachments,and item metadata such as subject, recipients and other attributes, are fetchedinto the customer database. If you have already built analytics rules for a casebefore you enable it, the automatic categorization of items begins soon aftercollection starts.

The Enterprise Vault service account requires certain permissions on the msdb

database. Ensure that this account has been granted the necessary permissionsbefore you enable a case for analytics.

See “Assigning the permissions required to enable cases for analytics ” on page 28.

You must have the Manage Analytics permission to enable, pause and disableanalytics. In upgraded systems, no predefined Discovery Accelerator role has thispermission by default. However, in new installations, the Case Administrator rolehas this permission by default.

To enable a case for analytics

1 Click the Cases tab in the Discovery Accelerator client.

2 In the Cases pane at the left, select the case that you want to enable foranalytics.

3 Click the Analytics tab.

4 Click Enable at the top of the tab.

You can also enable a case or folder for analytics on its Properties page.

Initially, the case’s status changes to Enabling analytics while the collection ofdata is prepared. Subsequently, the status changes to Analytics enabled and thecollection and indexing of data, and the automatic categorization of items begins.The Data collection area and the Automatic categorization area of the tab displaycollection and categorization progress.

At any time, more than one case can be enabled for analytics. Due to the largeamount of data collection and analysis required for multiple cases, it can take a

69Working with casesImplementing analytics in cases and folders

Page 70: Symantec Discovery Acceleratorâ„¢

very long time to process all the enabled cases. You can pause analytics on acase-by-case basis if you want to speed up the collection of data on higher prioritycases. Subsequently, you can resume analytics later on these cases.

To pause analytics on a case

1 Click the Cases tab in the Discovery Accelerator client.

2 In the Cases pane at the left, select the case that you want to pause.

3 Click the Analytics tab.

4 Click Pause at the top of the tab.

All data collection and analysis on the case is paused until you resume itagain.

To resume analytics on a case

1 Click the Cases tab in the Discovery Accelerator client.

2 In the Cases pane at the left, select the case that you want to resume.

3 Click the Analytics tab.

4 Click Resume at the top of the tab.

All data collection and analysis on the case is resumed.

To disable analytics on a case

1 Click the Cases tab in the Discovery Accelerator client.

2 In the Cases pane at the left, select the case on which you want to disableanalytics.

3 Click the Analytics tab.

4 Click Disable.

All analytics data is removed.

You can also disable analytics on a case or folder on its properties page.

Monitoring the progress of analytics data collectionAfter you have enabled a case or folder for analytics, you can monitor the progressthat Discovery Accelerator makes while it collects and analyses items. You cando this by viewing the Analytics tab. Table 6-4 describes the information that eacharea of this tab provides.

Working with casesImplementing analytics in cases and folders

70

Page 71: Symantec Discovery Acceleratorâ„¢

Table 6-4 Areas in the Analytics tab

DescriptionArea

The Data collection area shows the progress of analytics datacollection. The fields are as follows:

■ Started at and Completed at. Shows the dates and times betweenwhich Discovery Accelerator undertook data collection.

■ Successfully collected items. Shows the number of items thatDiscovery Accelerator has collected from the Enterprise Vaultarchives, and the total number of items to be collected.

■ Permanent failed items. Shows the number of items that DiscoveryAccelerator has failed permanently to collect.

■ Temporary failures. Shows the number of items that DiscoveryAccelerator has failed temporarily to collect. For example, theseitems may be on a tape that was unavailable at the time ofcollection.

■ Items with no indexable content. Shows the number of items thatdo not have any content that Discovery Accelerator can index.

■ Items deleted from Enterprise Vault. Shows the number of itemsthat no longer exist in the Enterprise Vault archives.

If Discovery Accelerator fails to collect certain items, you can try tocollect them again by following these steps:

1 Click Error details.

2 In the Error management window, click Retry failed items.

Data collection

The Conversation analysis area shows the progress that DiscoveryAccelerator has made in identifying the items in the same conversationthread. The fields are as follows:

■ Analyzed items. Shows the number of items that DiscoveryAccelerator has analyzed for conversations.

■ Conversation threads found. Shows the number of threads thatDiscovery Accelerator has identified.

Conversationanalysis

Shows the number of marks and tags that you have defined for thecase or folder. Click the Define marks and Define tags hyperlinks toset up additional ones.

Marks and tags

71Working with casesImplementing analytics in cases and folders

Page 72: Symantec Discovery Acceleratorâ„¢

Table 6-4 Areas in the Analytics tab (continued)

DescriptionArea

The Automatic categorization area summarizes the progress thatDiscovery Accelerator has made in automatically categorizing theitems. This process takes place in parallel with the collection of data,if you defined analytics rules before you enabled the case or folder foranalytics. When Discovery Accelerator categorizes the items, themarks and tags that it applies are immediately available in the Reviewtab.

Discovery Accelerator lists marking rules and tagging rules separately.In both cases, Discovery Accelerator lists each rule’s name and actions,together with the number of items that the rule has categorized. Inthe case of marking rules, Discovery Accelerator also shows thepriority level of each rule.

Note: After you enable a case or folder for analytics, there is a onehour delay before automatic categorization begins. So, the Automaticcategorization area can show that your rules have not marked ortagged any items, even after Discovery Accelerator has started tocollect data.

Automaticcategorization

Speeding up analytics data collection in low bandwidth environmentsWhen there are low bandwidth connections (1GB or lower) between DiscoveryAccelerator and Enterprise Vault, and between Discovery Accelerator and SQLServer, the collection of analytics data can be slow due to high memory usage andservice restarts. If you know these connections to be slow, or if you experiencethese symptoms, you can take the following steps to speed up data collection.

To speed up analytics data collection in low bandwidth environments

1 Pause the collection of analytics data.

2 Locate the AnalyticsIngesterTask.exe.config file in the DiscoveryAccelerator program folder.

3 Open the file in a text editor such as Windows Notepad.

4 Make the following configuration changes:

<add key="numECMThreads" value="1" />

<add key="maxThreadsPerVaultServer" value="1" />

<add key="numDBThreads" value="2" />

Working with casesImplementing analytics in cases and folders

72

Page 73: Symantec Discovery Acceleratorâ„¢

5 Save and close the file.

6 Resume the collection of analytics data.

Checking the progress of casesIf you have Admin permissions in a case, you can monitor the progress thatreviewers are making and, when appropriate, change the number of items thatyou have assigned to them.

To check the progress of a case

1 Click the Cases tab in the Discovery Accelerator client.

2 In the left pane, click the case whose progress you want to check.

3 Click the Review Assignment tab.

4 In the center pane, assess the progress that the reviewers have made.

To change the number of items that are assigned to reviewers

1 In the Reviewers box in the Review Assignment tab, click the names of thereviewers for whom you want to change the number of assigned items.

To select multiple adjacent reviewers, click the first reviewer, and then holddown the Shift key and click the last reviewer. To select nonadjacent reviewers,click the first reviewer, and then hold down the Ctrl key and click additionalreviewers. To select all the reviewers, press Ctrl+A.

2 Do one or more of the following:

■ To assign all the unassigned and unmarked items equally between theselected reviewers, click Auto-AssignItems and then click AssignItems.

■ To assign a specific number of items to the selected reviewers, click Assignn ofm unassigned items in the right pane and then type the requirednumber of items.

■ To assign items by category, such as one or more date ranges or one ormore tags that Discovery Accelerator has applied to the items, click Assignby item attribute in the right pane and then select the required option.

■ To move a specific number of items from the selected reviewers to anotherreviewer or back to the case review set, click Move in the right pane andthen type the required number of items.

■ To remove all the items that you have assigned to the selected reviewersand return them to the case review set, click RemoveAssignedItems andthen click Remove Items.

3 Click Apply.

73Working with casesChecking the progress of cases

Page 74: Symantec Discovery Acceleratorâ„¢

Deleting casesWhen you have no further use for a case, you may be able to delete it and all itsassociated objects. These objects include case-specific searches, research folders,and targets and target groups. If analytics is enabled on a case when you deleteit, all the information that relates to analytics on the case is also deleted.

You must have the appropriate permissions to delete a case. Users with theapplication-wide Delete Case permission can delete any case in the system. Userswith the equivalent case-specific permission can delete cases in which they havethis permission.

To delete a case

1 Click the Cases tab in the Discovery Accelerator client.

2 In the left pane, click All Cases.

3 Click one or more cases that you want to delete.

You can select multiple adjacent cases by holding down the Shift key whileclicking the first and last case in the range. To select multiple nonadjacentcases, hold down the Ctrl key while clicking the required cases. To select allthe cases, press Ctrl+A.

4 Click Delete.

5 Click Delete Cases to confirm that you want to proceed.

Working with casesDeleting cases

74

Page 75: Symantec Discovery Acceleratorâ„¢

Setting up and assigningroles

This chapter includes the following topics:

■ About the predefined Discovery Accelerator roles

■ About the Discovery Accelerator permissions

■ Creating Discovery Accelerator roles

■ Assigning Discovery Accelerator roles to users

About the predefined Discovery Accelerator rolesYou assign roles to users to determine what they can access and the activities thatthey can perform in Discovery Accelerator. Some roles are effective at theapplication level, across the entire Discovery Accelerator system, whereas othersapply at the case level or folder level only.

Table 7-1 describes the predefined roles that come with Discovery Accelerator. Ifnone of these roles precisely meets your needs, you can create your own.

7Chapter

Page 76: Symantec Discovery Acceleratorâ„¢

Table 7-1 Predefined roles

Default permissionsDescriptionRole

■ Assign.

■ Case Admin.

■ Manage Legal Holds.

■ Production.

■ Review.

■ Search.

■ Show Reviewer Summaries OnHome Page

■ View Reports

This role lets you perform alladministrative activities within aspecific case. You can search foritems to include in the case,review items (and assign work toother reviewers), and export orproduce items for offline review.

CaseAdministrator

■ Search.This role lets you search for newitems to add to a research folder.

Folder CaptureMessages

■ Production.This role lets you export orproduce items from a researchfolder for offline review.

Folder Export

■ Assign.

■ Case Admin.

■ Delete Folder.

■ Production.

■ Review.

■ Search.

This role lets you search for newitems to add to a research folder,review them, and export orproduce them for offline review.

You can also give other usersaccess to your folder so that theycan participate in the reviewprocess.

Folder Full Control

■ Review.This role lets you review and markthe items in a research folder.

Folder Review

Setting up and assigning rolesAbout the predefined Discovery Accelerator roles

76

Page 77: Symantec Discovery Acceleratorâ„¢

Table 7-1 Predefined roles (continued)

Default permissionsDescriptionRole

■ Create and Configure Cases.

■ Export Configuration Data.

■ Import Configuration Data.

■ Manage AdministrationSecurity.

■ Manage Global Target andTarget Groups.

■ Manage Marks.

■ Manage Roles.

■ Manage Schedules.

■ Manage Scheme Templates.

■ Manage Search Attributes.

■ Manage Archives.

■ Modify System Configuration.

■ Monitor Searches.

■ View System Configuration.

This role lets you perform alladministrative activities withinDiscovery Accelerator. You cancreate and manage cases, assignapplication-wide roles to users,and import configuration datafrom XML files.

System AdminDiscovery

About the Discovery Accelerator permissionsThe following tables provide more information on the permissions that you canassociate with user roles.

Table 7-2 Application permissions

DescriptionPermission

Select the vault stores and archives to use whenyou conduct a search in a research folder.

Allow Archive Selection in ResearchFolder

Create new cases and assign owners to them, andedit the properties of existing cases.

Create and Configure Cases

Delete the selected cases and all the objects thatare associated with them (case-specific searches,user folders, targets and target groups, and soon).

Delete Case

Use the ImportExport command-line utility toexport configuration data from the DiscoveryAccelerator database to an XML file.

Export Configuration Data

77Setting up and assigning rolesAbout the Discovery Accelerator permissions

Page 78: Symantec Discovery Acceleratorâ„¢

Table 7-2 Application permissions (continued)

DescriptionPermission

Export the items in a research folder for offlinereview.

Export Research Items

Load configuration data into the DiscoveryAccelerator database from an XML file, and viewthe import log.

Import Configuration Data

Assign application-wide roles to users. However,application administrators cannot assign caseroles to users, as only case administrators canassign these roles.

Manage Administration Security

Set up the default vault stores and archivesavailable for searches. Case administrators canchange the archives that are used for particularsearches.

Manage Archives

Create, edit, and delete application-wide targetsand target groups. These provide a shorthand wayto supply multiple email addresses when youdefine the criteria for a search.

Manage Global Target and TargetGroups

Create and edit the marks that are available to allcases. However, this permission does not giveaccess to the marks that are created in a case.

Manage Marks

Add and remove application and case roles, andselect the permissions to assign to each role.

Manage Roles

Create, edit, and delete schedules, with which youcan define when a future search or recurrentsearch is to run.

Manage Schedules

Make additional, customized attributes availablefor searches.

Manage Search Attributes

Change the Discovery Accelerator systemproperties. You can also customize theappearance, performance, and functionality ofDiscovery Accelerator.

Modify System Configuration

Setting up and assigning rolesAbout the Discovery Accelerator permissions

78

Page 79: Symantec Discovery Acceleratorâ„¢

Table 7-2 Application permissions (continued)

DescriptionPermission

Monitor the status of searches across all casesand pause and resubmit searches, even if you donot normally have access to the associated cases.However, you cannot view the search criteria orthe results of the searches unless you normallyhave access permission.

Monitor Search

Set up research folders that are not linked to anycase.

Perform Research

Convert a research folder into a case.Promote Research to Case

View the Discovery Accelerator system propertiesand configuration options that determine theappearance, performance, and functionality ofthe application.

View System Configuration

Table 7-3 Case and folder permissions

DescriptionPermission

Assign the items in the case or research folder toindividual reviewers.

Assign

Assign case-specific roles to users, and create,edit, and delete case-specific targets and targetgroups. This permission automatically includesall the other case or research folder permissions.

Case Admin

Delete the current case and all the objects thatare associated with it (case-specific searches, userfolders, targets and target groups, and so on).

Delete Case

Delete the research folders in which users havestored items for review.

Delete Folder

Enable or disable the analytics feature in a caseor folder. You can also pause or resume theaddition of items to the analytics database.

Manage Analytics

Create, edit, and delete the rules by whichDiscovery Accelerator applies marks and tags tothe items that it adds to the analytics database.

Manage Automatic Categorization

79Setting up and assigning rolesAbout the Discovery Accelerator permissions

Page 80: Symantec Discovery Acceleratorâ„¢

Table 7-3 Case and folder permissions (continued)

DescriptionPermission

Place holds on the items in a case to prevent usersfrom deleting them.

Manage Legal Holds

Possess the full research permissions to create,delete, and modify research folders, search foritems to store in those folders, and review thoseitems.

Perform Ad Hoc Searches

Copy items out of the Discovery Acceleratordatabase so that they can be reviewed offline.

Production

Review items and assign marks and comments tothem.

Review

Undertake searches for items to store in thereview set.

Search

View a summary of reviewer activity on the startpage of the application.

Show Reviewer Summaries On HomePage

Create and view reports.View Reports

Creating Discovery Accelerator rolesIf none of the predefined roles provides the exact set of permissions that you wantto assign to users, you can create your own roles.

You must have the Manage Roles permission to create roles. By default, userswith the role of Discovery System Admin have this permission.

To create a role

1 Start the Discovery Accelerator client, if you have yet to do so.

See “Opening the Discovery Accelerator client” on page 45.

2 Click the Application tab in the Discovery Accelerator client, and then clickthe Roles tab.

3 Click New at the top of the window.

4 In the right pane, type a name and an optional description for the role.

The role name must be unique and can contain up to 50 characters. Thedescription can contain up to 250 characters.

Setting up and assigning rolesCreating Discovery Accelerator roles

80

Page 81: Symantec Discovery Acceleratorâ„¢

5 In the Scope box, choose whether to make the permissions that are associatedwith the role effective throughout the application or at the case level only.

Users with application roles can only perform tasks in a specific case if theyhave been assigned the appropriate roles in that case. To perform tasks inmore than one case, the users must be assigned the appropriate role in everycase that they need to access.

The selection that you make determines the permissions that are available.

6 Choose the permissions to associate with the role.

7 Click Save.

Assigning Discovery Accelerator roles to usersYou assign roles to employees or employee groups to determine what they canaccess and the tasks that they can perform in Discovery Accelerator. Some rolesare effective at the application level, across the entire Discovery Acceleratorsystem, and others apply at the case level only.

You must have the application permission Manage Administration Security toassign an application-wide role to a user. You require the case permission CaseAdmin to assign a case-specific role. By default, Discovery System Admin usershave the first permission, whereas Admin users in a case have the second.

To assign a role to a user

1 Start the Discovery Accelerator client, if you have yet to do so.

2 Do one of the following:

■ To assign an application role, click the Application tab in the DiscoveryAccelerator client, and then click the Role Assignment tab.

■ To assign a case role, click the Cases tab and then click the required casein the left pane. Then click the Role Assignment tab.If Discovery Accelerator lists a lot of cases, you can filter the list with thefields at the top of the pane. As well as filtering the cases by name, youcan choose whether to list any research folders that are associated withthem.

3 Click the name of the user to whom you want to assign a role.

If the user does not appear in the list, click Add at the top of the pane andthen select the user to add to it.

4 In the right pane, do one of the following:

■ Click Add to assign a new role.

81Setting up and assigning rolesAssigning Discovery Accelerator roles to users

Page 82: Symantec Discovery Acceleratorâ„¢

■ Click Remove to remove the selected role.

5 Click Save.

Setting up and assigning rolesAssigning Discovery Accelerator roles to users

82

Page 83: Symantec Discovery Acceleratorâ„¢

Setting up review marksand tags

This chapter includes the following topics:

■ About review marks and tags

■ Creating review marks

■ How retained marks work

■ Customizing the review marks that are associated with individual cases

■ Creating tags

■ Creating tag groups

About review marks and tagsWhen they check items, reviewers apply a mark to each item to indicate whetherit is relevant to the case. In a standard Discovery Accelerator installation, thepredefined marks are Relevant, Not Relevant, and Flagged, but you can modifythese marks and add new ones. You can also choose whether the items that aremarked in one case retain their marks when they appear in other cases.

Each mark has a status that is associated with it, such as Questioned or Reviewed.When you perform a production run, you can filter the items by their status.

Table 8-1 shows the statuses that Discovery Accelerator associates with the defaultreview marks.

8Chapter

Page 84: Symantec Discovery Acceleratorâ„¢

Table 8-1 Default review marks and their associated statuses

Associated statusMark

ReviewedRelevant

ReviewedNot Relevant

QuestionedFlagged

Note: You perform all the activities that are described in this chapter in theDiscovery Accelerator client.

Creating review marksIf the predefined review marks do not precisely meet your needs, you can createnew ones. The predefined marks and any custom marks that you create comprisethe global set of review marks. This global set is available for use with all cases,but you can choose whether to use each mark on a case-by-case basis.

You must have the Manage Marks permission to create marks. By default, onlyusers with the role of System Admin Discovery have this permission.

To create a review mark

1 Click the Application tab in the Discovery Accelerator client, and then clickthe Marks tab.

2 Click New, and then click Mark.

Alternatively, select an existing mark and then click Copy to create a newmark that has the same properties as the old one.

3 Type a name for the new mark and a description, if required.

The mark names appear as button labels at the bottom right of the Reviewpane, so it is advisable to keep them short.

4 In the Status box, choose a status to associate with the mark.

All marks must be associated with a status, such as Questioned or Reviewed.You use the status to group items and so determine what is included in theproduction set.

5 In the AccessKey box, type a shortcut key combination to associate with themark.

When reviewers press an access key combination, they can assign a specificmark to an item in the Review pane.

Setting up review marks and tagsCreating review marks

84

Page 85: Symantec Discovery Acceleratorâ„¢

6 In the Roles box, select the default user roles with which to associate thereview mark. Users who occupy these roles can apply this mark to the itemsthat they review.

Later, you can refine the list of associated roles when you customize the marksthat are associated with an individual case.

7 If you want the mark to work across multiple cases, check Items retain thismark foruse inother cases. When you select this option, the marks that youapply to an item in one case are also visible in other cases.

Note that items do not retain their marks across multiple DiscoveryAccelerator customer databases.

8 Click Apply.

How retained marks workDiscovery Accelerator keeps a master collection of all items that have ever beenaccepted into any case. When a reviewer marks an item then, depending on howyou defined that mark, the mark may apply just to the case or may apply to thecase and also be copied to the master collection so that it can be used in othercases.

For example, you may want a mark that is called Spam to stay with items in themaster collection. If these items are ever found by another search, they are alreadymarked Spam and may not need to be reviewed again.

When you perform a new search and accept the results, Discovery Acceleratordoes the following for each item that you accept:

■ If the item has not been accepted before, Discovery Accelerator adds the itemto the master collection and creates a link from the case to it.

■ If the item has been accepted before, Discovery Accelerator creates a link fromthe case to the item in the master collection. It also checks for existing marks.If you choose to keep the existing marks when you accept the search results,Discovery Accelerator adds existing retained marks to the case. If you do notchoose to keep the existing marks, Discovery Accelerator removes them fromthe items in the case. However, it does not remove the existing marks fromthe items in the master collection.

When a reviewer adds to an item a mark that has the property "Items retain thismark for use in other cases", that mark stays with the item in the master collectionso that it can be used in future cases. If the mark does not have this property, themark applies within the case but is not available to other cases.

85Setting up review marks and tagsHow retained marks work

Page 86: Symantec Discovery Acceleratorâ„¢

Figure 8-1 shows a master collection, with the items that have retained marksshown in red. Some items in the master collection are also in cases A and B.

Figure 8-1 Master collection with items that have review marks

Customizing the review marks that are associatedwith individual cases

By default, all the marks in your global set of review marks are associated withevery case. However, you can select the marks that are available for use in eachcase. You can also change the user roles that you have associated with each mark.

To customize the review marks associated with an individual case

1 Click the Cases tab in the Discovery Accelerator client.

2 In the left pane, select the case for which you want to customize the reviewmarks.

If Discovery Accelerator lists a lot of cases, you can filter the list with thefields at the top of the pane. As well as filtering the cases by name, you canchoose whether to list any research folders that are associated with them.

3 Click the Marks tab.

Setting up review marks and tagsCustomizing the review marks that are associated with individual cases

86

Page 87: Symantec Discovery Acceleratorâ„¢

4 Do one or more of the following:

■ To associate a new review mark with the case, click Add and then selectthe required mark in the Application Mark box at the right.

■ To change the user roles with which you have associated a review mark,click the mark name in the center pane. Then amend the details in theRoles box.

■ To dissociate a review mark from a case, click the mark name in the centerpane and then click Remove.

5 Click Apply.

Creating tagsYou can also set up a secondary set of marks, called "tags," that reviewers canassign to the items in a review set. Tags differ from marks in that reviewers canassign multiple tags to an item, but they can assign one mark only. In addition, areviewer who assigns a mark to an item also assigns the associated status to it.This is not the case with tags, which do not have an associated status.

You must have the Manage Marks permission to create tags. By default, only userswith the role of System Admin Discovery have this permission.

To create a tag

1 Do one of the following:

■ To create a tag that is available for use in all cases, click the Applicationtab in the Discovery Accelerator client, and then click the Tags tab.

■ To create a tag that is available for use in one case only, click the Casestab and then click the required case in the left pane. Then click the Tagstab.

2 Click New, and then click Tag.

Alternatively, select an existing tag and then click Copy to create a new tagthat has the same properties as the old one.

3 Type a name for the new tag and a description, if required.

The tag names appear as button labels in a pop-up window at the bottom ofthe Review pane. Therefore, it is advisable to keep them short.

4 In the AccessKey box, type a shortcut key combination to associate with thetag.

When reviewers press an access key combination, they can assign a specifictag to an item in the Review pane.

87Setting up review marks and tagsCreating tags

Page 88: Symantec Discovery Acceleratorâ„¢

5 In the Roles box, select the default user roles with which to associate the tag.Users who occupy these roles can apply this tag to the items that they review.

6 Click Apply.

Creating tag groupsYou can group related tags into groups and present them in a list from whichreviewers can choose as they mark items.

Two types of tag groups are available: single-choice groups and multiple-choicegroups. Reviewers can select one tag only from a single-choice group, but theycan select some or all of the tags in a multiple-choice group. You assemble amultiple-choice group from the existing tags in a case. However, a single-choicegroup contains the new tags that you define when you create the group.

You must have the Manage Marks permission to create tag groups. By default,only users with the role of System Admin Discovery have this permission.

To create a single-choice tag group

1 Click the Cases tab in the Discovery Accelerator client.

2 Click the required case in the left pane.

3 Click the Tags tab.

4 Click New, and then click Single Choice Tag Group.

5 Type a name for the new tag group and a description, if required.

6 In the Values box, click Add and then type the name of the first tag to includein the group.

7 Add more tags until the list is complete.

8 In the Roles box, select the default user roles with which to associate the taggroup. Users who occupy these roles can apply a tag to the items that theyreview.

9 Click Apply.

To create a multiple-choice tag group

1 Click the Cases tab in the Discovery Accelerator client.

2 Click the required case in the left pane.

3 Click the Tags tab.

Setting up review marks and tagsCreating tag groups

88

Page 89: Symantec Discovery Acceleratorâ„¢

4 Ensure that all the tags that you want to include in the group are listed in thecenter pane.

To create new tags, click New>Tag and then enter the details of the new tag.If you previously created an application-level tag and want to add it to thecase, click Add and then select the required tag.

5 Click New, and then click Tag Group.

6 Type a name for the new tag group and a description, if required.

7 In the Tags box, check the tags that you want to include in the group.

8 Click Apply.

89Setting up review marks and tagsCreating tag groups

Page 90: Symantec Discovery Acceleratorâ„¢

Setting up review marks and tagsCreating tag groups

90

Page 91: Symantec Discovery Acceleratorâ„¢

Searching for items

This chapter includes the following topics:

■ About searching with Discovery Accelerator

■ Creating and running Discovery Accelerator searches

■ About the search criteria options

■ Pausing and resuming Discovery Accelerator searches

■ Selecting the archives in which to search

■ Specifying the details of custom search attributes

■ Defining email targets with Address Manager

■ Building Discovery Accelerator search schedules

About searching with Discovery AcceleratorWhen you have created a case, you must search for information to include in it.This process involves the following activities:

■ Running one or more searches on the relevant vault stores for suitableinformation. Discovery Accelerator offers a wide range of search criteria fromwhich to choose: words and phrases to look for, date ranges, message size,author and recipient addresses, and more.

■ Studying the search results to assess their suitability, and then either acceptingor rejecting the results.

■ Searching again, until you have amassed all the information that you need.

When you are happy with the results that you have, you then go on to review theitems that you have found.

9Chapter

Page 92: Symantec Discovery Acceleratorâ„¢

You can build search schedules if you want to run searches at set times or set uprecurrent searches that run automatically. You can also customize the list ofEnterprise Vault archives in which Discovery Accelerator searches for items.

If you want to search for particular message senders or recipients, you can storetheir email addresses in Address Manager. When you next define the criteria fora search, you can select the users from a list.

Note: You perform all the activities that are described in this chapter in theDiscovery Accelerator client.

Creating and runningDiscovery Accelerator searchesYou must have the Search permission in a case to create and run a search in thatcase.

To create and run a Discovery Accelerator search

1 Do one of the following:

■ To create a search that runs in a case, click the Case tab and then clickthe required case in the left pane. Then click the Searches tab.

■ To create a search that runs in a research folder, click the Research taband then click the required folder in the left pane. Then click the Searchestab.

If Discovery Accelerator lists a lot of cases and folders, you can filter the listwith the fields at the top of the pane.

2 Click New Search.

3 If you are creating a search that runs in a research folder, and you clickedAll Research in the left pane, Discovery Accelerator prompts you to select acase with which to associate the search. Make your selection, and then clickSearch.

4 Enter the required search criteria.

See “About the search criteria options” on page 93.

5 Click Save to start an immediate search or queue a scheduled search to startautomatically at the appointed time.

6 When the search has completed, choose whether to accept or reject the results.Note the following:

Searching for itemsCreating and running Discovery Accelerator searches

92

Page 93: Symantec Discovery Acceleratorâ„¢

■ Discovery Accelerator does not add the captured items to the review setuntil you accept the search results. If you did not check Automaticallyaccept search results, you must manually accept or reject the results.

■ The options to assign a default mark and reviewer to the search resultsapply only to newly discovered items. If the search results include itemsthat you have previously captured and added to the review set, these itemsretain their assigned marks and reviewers.The option to keep existing marks applies only to those items to whichreviewers have already assigned marks in another case.

■ If you reject the results of a search, Discovery Accelerator deletes it.

About the search criteria optionsDiscovery Accelerator groups the search criteria options into multiple sections,which are described below. Click the arrow icons at the right to expand or collapsethe sections.

The New Search section identifies the search and specifies when it runs.

Identifies the case or research folder in which the searchwill run. When the folder is not linked to any case, "MyResearch "appears.

Context

Specifies a name for the search, such as “Daily MessageCapture (London)”.

Name

Lets you select an existing search as the basis on which toset the criteria for the new search.

Based on Search

When you create a folder-level search, lets you select alocation in which to save the results. Select "New folder in<Context>" in the drop-down list if you want to specify thedetails of a new folder in which to save the results.

Save results in

Specifies whether the search runs immediately or at ascheduled time. If you select Scheduled, you can specify aperiod during which the search is to run. You can also choosefrom one of a number of existing schedules.

See “Building Discovery Accelerator search schedules”on page 104.

Search Type

93Searching for itemsAbout the search criteria options

Page 94: Symantec Discovery Acceleratorâ„¢

Specifies whether to add the search results to the reviewset automatically. This option may be useful for any provensearches that you intend to run on a regular basis. If youcheck "Automatically accept search results", you cannotreject the results and change the search criteria. Werecommend that you uncheck "Automatically accept searchresults" until you have tested that the search returns theexpected results.

A search that returns an error from any archive is notautomatically accepted, regardless of this setting.

Automatically accept searchresults

Specifies whether the search results can include the itemsthat you have previously captured and added to the reviewset. We recommend that you check this box to ensure thatsearch information is applied to all the items.

Include items already inreview

The Date range section lets you search for items according to when they weresent or received.

Limits the search to items that were sent or received duringthe selected period. The date ranges are relative to whenthe search runs, which is today in the case of an immediatesearch.

You may find these options useful when creating ascheduled, recurrent search that runs once every day, week,two weeks or four weeks. For example, if the search runsonce a week, select "Last 7 days" to limit the range to thedays since the search last ran.

Today / Yesterday / Last 7days / Last 14 days / Last 28days

Lets you search the items that were sent or received duringa longer or more specific period than the other date rangeoptions permit. To enter a date, click the buttons at the rightof the From and To boxes and then select the required date.Unlike the other date range boxes, a specific date rangeremains static and not relative to when the search runs.

Check "Use Historical Information for Custodians andCustodian Groups" to use both the current information andhistorical information for custodians and custodian groupsin the search. If you uncheck this option, DiscoveryAccelerator uses only the current set of custodians, groups,and email addresses. Any deactivated users and groups areexcluded from the search.

See “Setting up a Custodian Manager Web site” on page 34.

Specific date range

Searching for itemsAbout the search criteria options

94

Page 95: Symantec Discovery Acceleratorâ„¢

For a scheduled search only, lets you search the new itemsthat have arrived since the last time you ran the search.This option is similar to options such as Today andYesterday. However, it lets you set an explicit start date forthe first run of the search.

By default, this option searches from the date of the lastrun (or the start date for the first search) to the current dayminus 1 (that is, up to yesterday).

Since search last ran

The Search terms section specifies the words or phrases for which DiscoveryAccelerator should search in items. Click Add search term to add each word orphrase for which you want to search. Note the following:

■ To search for a phrase, enclose the words in quotation marks.For example, you can search for all items whose subject lines contain the phrase"organizational changes" by defining a search term like this:

SUBJ: "organizational changes"

■ If you type multiple words on the same line, Discovery Accelerator finds allitems that contain any of the words or phrases on the line.Note that you must separate all the words in the search term with spaces. Thefollowing search term does not return the expected results because there isno space between words "changes" and "license"—and consequently DiscoveryAccelerator searches for items that contain one or more of the following words:"organizational", "changeslicense", and "agreements".

SUBJ: "organizational changes""license agreements"

■ Press the Return key in a search box to add another line to it. If you typemultiple lines in a search box, choose Any of or All of in the left box todetermine whether the lines are connected by OR or AND conditions.

■ To add the name of a target or custodian to the From box or To box, click Targetat the right and then selected the required target or custodian.See “Defining email targets with Address Manager” on page 102.

Note: If you specify as a target or custodian a Domino user whose details yousynchronize with a Domino directory, you must ensure that this user has anSMTP address defined in the Domino directory. Otherwise, the search fails tofind the matching items. Alternatively, you can search for such users by theirdisplay names.

95Searching for itemsAbout the search criteria options

Page 96: Symantec Discovery Acceleratorâ„¢

■ Place the plus sign (+) in front of a word or phrase to connect it to every otherword or phrase on the line with a Boolean AND condition. This sign instructsDiscovery Accelerator to treat the specified word or phrase as required criteria.For example, the following search string means "(server AND test) OR (groupAND test) OR (cluster AND test)":

[Any Of] server group +test cluster

In the following example, the search string means "(server AND test ANDgroup) OR (cluster AND test AND group)"

[Any Of] server +group +test cluster

■ Place the minus sign (-) in front of a word or phrase to connect it to every otherword or phrase on the line with a Boolean AND NOT condition. This signinstructs Discovery Accelerator to exclude from the result set those resultsthat match the other search criteria and contain the excluded term. Forexample, the following search string means "(server AND NOT test) OR (groupAND NOT test) OR (cluster AND NOT test)":

[Any Of] server group -test cluster

In the following example, the search string means "(server AND cluster AND(group AND NOT test))":

[All Of] server

cluster

group -test

■ You can use an asterisk (*) to represent zero or more characters, and a questionmark (?) to represent exactly one character.There must be a minimum of three characters before an asterisk, and youcannot use it at the start of a word (but you can use it by itself with a space oneither side to substitute for any single word). For example, the following searchstring returns hits for the words "make", "maker", "making", "The high road","The low road", "wonder", "wondering", and so on:

[Any Of] mak*

The * road

Wonder*

Similarly, there must be a minimum of three characters between each instanceof a question mark in the search string.If it is specified in the From field, the following example finds items from userswith an email address from "@acme.uk" or "@acme.hk":

Searching for itemsAbout the search criteria options

96

Page 97: Symantec Discovery Acceleratorâ„¢

[Any Of] @acme.?k

You cannot use either wildcard character after a special character, such as theampersand (@). For example, the search string "@?cme.uk" does not producethe expected results.

The Attachments section lets you search for items with a certain number or typeof attachments.

Specifies the required number of attachments. The defaultoption, "Does not matter", means that the item can havezero or more attachments. All the other options require youto type one or two values that specify the required numberof attachments.

Number

Specifies the file name extensions of particular types ofattachments for which to search. Separate the extensionswith space characters. For example, type the following tosearch for items with HTML or Microsoft Excel fileattachments:

.htm .xls

If you specify one or more attachment types, only theattachments are searched, and not the items that containthem. For example, you cannot search for those items thathave a specific word in their subject line or content and thatcontain a specific type of attachment.

Remember that there are attachment file formats such asFax or Voice that do not contain text.

File extensions

The Miscellaneous section lets you search for items of a certain size and type orthat have the specified retention category.

Specifies the size in kilobytes of each item for which tosearch, as reported by the message store (MicrosoftExchange, Lotus Domino, and so on). The item size includesthe size of any attachments.

Message size

Searches for items of the selected types. This option is onlyavailable if:

■ Your Enterprise Vault server is running Enterprise Vault5.0 or later.

■ You have specified a date range that does not include adate before you installed Enterprise Vault 5.0.

Message type

97Searching for itemsAbout the search criteria options

Page 98: Symantec Discovery Acceleratorâ„¢

Lets you search for unindexed items that do not normallyappear in the search results, such as encrypted mail itemsand password-protected .zip files.

If you check this option, you must leave the Content fieldempty.

Include only non-indexeditems

Searches for items to which Enterprise Vault has assignedthe selected retention categories.

Retention category

Searches for items to which a third-party application hasadded the specified custom attributes. You can configureEnterprise Vault to index items according to their associatedcustom attributes.

See “Specifying the details of custom search attributes”on page 100.

Custom attributes

The Policies section lets you search for items according to the policies with whichthe Enterprise Vault Automatic Classification Engine has tagged them.

Lets you search for those items that the AutomaticClassification Engine has tagged with particular types ofpolicies. There are three policy types:

■ Inclusion. This type of policy addresses the most seriousissues, such as swearing, racism, and insider trading.You would normally want to ensure that the itemsexhibiting any of these features were included in yourreview set.

■ Exclusion. This type of policy either precludes captureor advocates the non-capture of items. For example,spam items or newsletters may fall into this category.

■ Category. This type of policy does not affect the captureof items in any way; it provides a means to categorizeitems. For example, you can use category policies to flagthose items that are in Spanish or marked as Personal.

These policy types are not mutually exclusive; you can applymultiple policies of different policy types to the same item.

Filter by type

Lets you search for items to which the AutomaticClassification Engine has applied a specific policy.

Note:Discovery Accelerator automatically adds to the policylist any new policies that it encounters when running asearch.

Policies

Searching for itemsAbout the search criteria options

98

Page 99: Symantec Discovery Acceleratorâ„¢

Lets you omit from the list those policies that are not in usein the current case.

Filter policies by current case

Pausing and resumingDiscoveryAccelerator searchesIf you have the required permission level, you can monitor the status of allDiscovery Accelerator searches and pause or resubmit them as necessary. Thisis true even if you do not normally have access to the cases with which the searchesare associated. However, you cannot view the search criteria or the results of thesearches unless you normally have access permission.

You must have the Monitor Searches permission to pause and resume searches.By default, users with the role of Discovery System Admin have this permission.

To pause or resume a search

1 Click the Monitor tab in the Discovery Accelerator client.

2 Do one or more of the following:

■ To view detailed status information on a search, click its name.

■ To pause or resubmit one or more searches, select the required searchesand then click Pause or Resubmit.

Note: If you pause a search that you are conducting over a wide date rangeor a large number of archives, Discovery Accelerator may take a little timeto halt it.

Selecting the archives in which to searchYou can customize the list of Enterprise Vault archives in which DiscoveryAccelerator searches for items. For example, there may be archives that you wantto exclude from any searches because they contain irrelevant material.

As well as setting the default, global list of archives, which are available to thesearches that you conduct in any case, you can customize the searchable archivesfor individual cases.

You must have the application permission Manage Archives to set the global listof archives, and the case permission Case Admin to set a case-level archive list.By default, users with the application role of Discovery System Admin have thefirst permission, whereas users with the case role of Admin have the second.

99Searching for itemsPausing and resuming Discovery Accelerator searches

Page 100: Symantec Discovery Acceleratorâ„¢

To select the archives in which to search

1 Do one of the following:

■ To set the default list of archives that are available to all cases, click theApplication tab in the Discovery Accelerator client, and then click theArchives tab.

■ To set the list of archives in which to search for one case only, click theCases tab and then click the required case in the left pane. Then click theArchives tab.If Discovery Accelerator lists a lot of cases, you can filter the list with thefields at the top of the pane. As well as filtering the cases by name, youcan choose whether to list any research folders that are associated withthem.

2 Choose the archives in which to conduct searches. Use the followingtechniques to include or exclude archives:

■ If you want to set the list of archives in which to search for one case only,check Customize searchable archives for this case.

■ Check or uncheck a vault store at the left to include its archives in searchesor exclude them from searches.

■ Click a vault store at the left to list the associated archives at the right.Then check or uncheck the archives to include or exclude them.If Discovery Accelerator lists a large number of archives, you can filterthe list with the fields at the top of the right pane.

■ Check or uncheck the Archive Name box at the top of the right pane toinclude or exclude all the available archives.

3 Click Save.

Specifying the details of custom search attributesYou may have configured Enterprise Vault to index additional attributes of theitems that it archives, such as the properties that a third-party application hasadded to them. If you want to include these attributes in your search criteria whenyou create searches, you must first provide Discovery Accelerator with the detailsof the attributes.

You must have the Manage Search Attributes permission to specify the details ofa custom search attribute. By default, only users with the role of Discovery SystemAdmin have this permission.

Searching for itemsSpecifying the details of custom search attributes

100

Page 101: Symantec Discovery Acceleratorâ„¢

To specify the details of a custom search attribute

1 Click the Configuration tab in the Discovery Accelerator client, and thenclick the Search attributes tab.

2 Click New.

3 In the Template drop-down list, select the attribute whose details you wantto provide, or select NewSearchAttribute to define the details of a new one.

When you select an attribute, Discovery Accelerator automatically addspredefined values to the other boxes.

4 Check that the name, display name, and description are correct.

5 In the Type drop-down list, select the user interface elements with which topresent the custom attribute options in Discovery Accelerator searches. Thiscauses additional boxes to appear with which you can set additional options.

The options are as follows:

A single-line box lets the user enter or edit short text strings.

The Size box defines the number of characters that the box cancontain.

Single line

A multi-line text box lets the user enter or edit long strings overseveral lines.

The Size box defines the number of lines.

Multiple lines

A check box is a square box that is selected or cleared to turn onor off an option. More than one check box can be selected.

If you intend to set up multiple check boxes for a customattribute, use the Columnsize box to specify the number of checkboxes to group in a column. With a small column size and severalcheck boxes, there may be more than one column per line. Todisplay all the check boxes in a single row, set Column size to anumber equal to or more than the number of check boxes.

To assign values to the check box options, click New value andthen type the names with which to label the options and theirvalues. Check Selected to mark an option as selected by default.

Checkboxes

With a radio button, you make a choice among a set of mutuallyexclusive, related options. Users can choose one and only oneoption. Use the Columnsize box to indicate how the options areto be grouped, and the Values area to assign values to the options.Check Selected to mark an option as selected by default.

Radio buttons

101Searching for itemsSpecifying the details of custom search attributes

Page 102: Symantec Discovery Acceleratorâ„¢

With a list box, you can select from a set of values that arepresented in a list that is always visible.

If you check Multiple selection, you can hold down Shift or Ctrlto select several items from the list box. Assign values to theentries in the list box by clicking New value. Selected indicatesthe default value.

List box

A drop-down list is a closed version of a list box with an arrownext to it. Clicking the arrow opens the list.

Assign values to the entries in the list box by clicking Newvalue.Selected indicates the default value.

Drop down list box

Note the following:

■ When you specify the values to associate with custom attributes, enclosethe values in double quotation marks.

■ For some of the attribute types, you can choose operators with which toqualify the values. To select multiple operators, hold down Ctrl or Shiftand then click the required operators. For more information on theoperators, see the Enterprise Vault API documentation.

6 In the Datatype drop-down list, specify the data format with which the valuesthat you assign to the custom attribute must conform. The options are String,Number, and Date.

7 Click Save.

Defining email targets with Address ManagerAmong the criteria that you can define when you set up a search in DiscoveryAccelerator are the email addresses for which to look in items. If an employee hasmultiple email addresses then, to save you from having to enter them all wheneveryou set up a search, you can add them to a target entry in Address Manager. Thenyou can specify the target name in your search criteria as a shorthand way oflisting all the associated addresses.

Target groups provide a way to collect a number of people under a group name.You can then use this name as a shorthand way of referring to the list of people.For example, you could create a target group called "Directors" and then add thenames of all the company directors to the group. When you create a search, youcan search for items that are sent to the target group Directors, instead of listingall their names individually. You can add a target to multiple target groups.

Searching for itemsDefining email targets with Address Manager

102

Page 103: Symantec Discovery Acceleratorâ„¢

Unlike the custodians and custodian groups whose details you can supply throughthe Custodian Manager Web site, targets and target groups are not synchronizedwith an external source such as Active Directory.

You can set up targets and target groups at the application level, where they areavailable to all cases, and at the individual case level.

Setting up targetsDepending on the permissions that you have been granted, you can add anapplication-wide target (available in all cases) or a case-specific target.

You must have the application permission Manage Global Target and TargetGroups to add application-wide targets, and the case permission Case Admin toadd case-specific targets. By default, users with the application role of DiscoverySystem Admin have the first permission, whereas users with the case role ofAdmin have the second.

To set up a target

1 Do one of the following:

■ To add an application-wide target, click the Custodians tab in theDiscovery Accelerator client, and then click the Address Manager tab.

■ To add a case-specific target, click the Cases tab and then click the requiredcase in the left pane. Then click the Address Manager tab.

2 Click New Target at the top of the pane.

3 Type the first name and last name of the target.

The first name is optional, but the last name is mandatory.

4 If you want to amend how the target name appears in Discovery Accelerator,type the required name in the Display Name box.

5 In the Email addresses box, type all the email addresses of the target.

Type each address on a line of its own.

6 Click Save.

Adding targets to target groupsAfter you have set up a few targets, you can combine them in a group.

You must have the application permission Manage Global Target and TargetGroups to add targets to application-wide target groups, and the case permissionCase Admin to add them to case-specific groups. By default, users with the

103Searching for itemsDefining email targets with Address Manager

Page 104: Symantec Discovery Acceleratorâ„¢

application role of Discovery System Admin have the first permission, whereasusers with the case role of Admin have the second.

To add targets to a target group

1 Do one of the following:

■ To add an application-wide target group, click the Custodians tab in theDiscovery Accelerator client, and then click the Address Manager tab.

■ To add a case-specific target group, click the Cases tab and then click therequired case in the left pane. Then click the Address Manager tab.

2 Click New Target Group at the top of the pane.

3 Type a name and optional description for the group.

4 Click Add, and then select the targets to include in the group.

Use the following techniques to select the targets:

■ To find all the names that contain certain characters, type those charactersin the Filter box and then click Find.To remove the filter, delete the characters that you typed in the Filterbox and then click Find again.

■ To select multiple adjacent targets, hold down the Shift key and click thefirst and last target in the range. To select multiple nonadjacent targets,hold down the Ctrl key and click the required targets.

■ Press Ctrl+A to select all the names in the list.

Click OK when you have finished.

5 Click Save.

Building Discovery Accelerator search schedulesAs well as running searches immediately, you can schedule them to run at a futuretime. This facility may be desirable if, for example, you want to run an extensivesearch during an off-peak period, or you need to run the same search repeatedly.To create a scheduled search, you first define a “search schedule” and then selectit as one of the criteria of the search.

Setting up new search schedulesYou must have the Manage Schedules permission to set up new search schedules.By default, users with the application role of Discovery System Admin have thispermission.

Searching for itemsBuilding Discovery Accelerator search schedules

104

Page 105: Symantec Discovery Acceleratorâ„¢

To set up a new search schedule

1 Click the Configuration tab in the Discovery Accelerator client, and thenclick the Search Schedules tab.

2 Click New.

3 Type a name and an optional description for the schedule.

4 Check Enabled so that the schedule is available for selection when you definethe criteria for a new search.

5 Select the required schedule type. The options are as follows:

Causes any searches that use this schedule to runimmediately after the SQL Server Agent service hasstarted.

Start when SQL server agentstarts

Causes any searches that use this schedule to runwhen the system is quiet. For more information onCPU idle schedules, see the information onscheduling jobs in the online Help for SQL ServerManagement Studio.

Start when CPU(s) are idle

Causes any searches that use this schedule to runonly once, at the time that you set in the schedule.When you select this option, several additional boxesappear. Click the On date box to select the requireddate. Enter the time in the Attime box in the formathh:mm, using the 24-hour clock.

Once

Causes any searches that use this schedule to runautomatically at the interval that you specify in theschedule.

■ Occurs. Defines the interval in days, weeks, ormonths.

■ Daily frequency. Defines whether the scheduleruns once a day or several times a day, within agiven period.

■ Duration. Defines whether to restrict the scheduleto a particular period within given dates.

Recurring

6 Click Save.

Examples of recurring search schedulesAny searches that use the following schedules run automatically at the intervalthat you specify in the schedule.

105Searching for itemsBuilding Discovery Accelerator search schedules

Page 106: Symantec Discovery Acceleratorâ„¢

To create a schedule that runs once every day at 2 A.M. from now on

1 Select Daily, and enter 1 in the Every n day(s) box.

2 Select Occurs once at, and enter 02:00 in the (time) box.

3 Select No end date.

To create a schedule that runs every 3 hours on Mondays, between 9 A.M. and 6P.M., for the period between March 1 and August 2

1 Select Weekly and then check Mon.

2 Select Occurs every, and then enter 3 and select Hour(s).

3 Enter 09:00 in the Starting at box and 18:00 in the Ending at box.

4 Select March 1 for the start date and August 2 for the end date.

To create a schedule that runs at 9 P.M. on the first day of alternate months fromnow on

1 Select Monthly and Day, and enter 1 in the day box and 2 in the month(s)box.

2 Select Occurs once at, and enter 21:00 in the (time) box.

3 Select No end date.

Configuring the SQL Server Agent serviceThe SQL Server Agent service is responsible for managing search schedules, soyou must ensure that it is running. We also recommend that you configure thisservice to start automatically when the SQL Server computer starts.

To configure the SQL Server Agent service to start automatically

1 On your SQL Server computer, double-click the AdministrativeTools appletin Control Panel.

2 Double-click Services.

3 Right-click SQL Server Agent (MSSQLSERVER), and then click Properties.

4 Change the startup type to Automatic.

Discovery Accelerator creates the search schedules as SQL Server Agent jobs,which you can view in SQL Server Management Studio.

To view the search schedules in SQL Server Management Studio

1 Start SQL Server Management Studio.

2 Expand the tree in the left pane until the objects under the required serverare visible.

Searching for itemsBuilding Discovery Accelerator search schedules

106

Page 107: Symantec Discovery Acceleratorâ„¢

3 Expand the SQL Server Agent object.

4 Click Jobs to view the scheduled jobs.

Discovery Accelerator jobs have a category of KVS Auto Searches.

107Searching for itemsBuilding Discovery Accelerator search schedules

Page 108: Symantec Discovery Acceleratorâ„¢

Searching for itemsBuilding Discovery Accelerator search schedules

108

Page 109: Symantec Discovery Acceleratorâ„¢

Using Custodian Manager

This chapter includes the following topics:

■ About Custodian Manager

■ Setting up custodians

■ Setting up custodian groups

■ Setting up custom custodian attributes

■ Specifying the user account under which to synchronize custodians

■ Synchronizing with entire Active Directory domains and Domino servers

■ Setting the system configuration options

About Custodian ManagerCustodian Manager lets you submit the details of custodians and custodian groupsfor which you want to search when you conduct a Discovery Accelerator search.A custodian is an individual employee, whereas a custodian group is any collectionof employees, such as an NT group, distribution list, Active Directory container,Domino LDAP query, or Domino group.

After you have submitted a few details of a custodian or group with CustodianManager, you can synchronize them with an external source like Active Directoryor a Domino LDAP directory. This keeps the data in Custodian Manager up-to-dateand lets you retrieve additional information about the custodian or group fromthe external source.

Custodian Manager also lets assign additional, custom attributes to custodiansand custodian groups. Use these attributes to filter the list of custodians andgroups for which to search in Discovery Accelerator. For example, you can createa custom attribute called "Cost Center 1", assign it to the custodians who belong

10Chapter

Page 110: Symantec Discovery Acceleratorâ„¢

to the cost center, and then pick the attribute when you define your search targetswith Discovery Accelerator.

Setting up custodiansYou can enter a few custodian details and then populate the rest by synchronizingwith the corresponding Active Directory or Domino LDAP directory account.

To set up a custodian

1 In the Custodian Manager home page, click Custodians.

2 In the Custodian Management page, click New Custodian.

3 In the Create Custodian page, type the employee's name and the correspondingdisplay name.

4 In the Organization section, type the company details for the employee.Complete the boxes as follows:

Specifies the custodian's job title.Title

Identifies the custodian's department within the company.Department

Your company policy should specify how this box is used. Forexample, the start date can indicate when the employee joinedthe company.

Start Date

As with the start date, your company policy should specify howthis box is used. For example, the end date can indicate when theemployee left the company. This date is important for preservingaccurate system information.

End Date

If your company's administration or finance department issueseach employee with a unique company ID, you can enter it here.

Employee ID

These names are mandatory if you want to synchronizeinformation with either Active Directory or a Domino LDAPdirectory. Enter the name in the form domain\login_name, orclick Browse to display a list of accounts and then select the onefor this employee. Both names are optional but, if you want toassociate a Windows account with a Domino account, you mustset both.

Username andDomino Username

Using Custodian ManagerSetting up custodians

110

Page 111: Symantec Discovery Acceleratorâ„¢

5 If you have set up any custom attributes to assign to your custodians, choosea suitable one in the Custom Attributes area.

For example, if you previously set up a Cost Center attribute with a range ofvalues, you can select the appropriate value when you define the custodianproperties.

6 In the Automatically Synchronize Properties section, specify whetherregularly to update the custodian details with values in the associatedWindows or Domino user account. This section is unavailable until you entera user name in the Organization section.

By default, Discovery Accelerator synchronizes custodians and groups everyeight hours and every time the Discovery Accelerator service starts. To changethis schedule, click Settings in the Custodian Manager home page, selectEmployeeSynchronization in the drop-down list , and then set the requiredsynchronization interval.

7 In the EmailAddresses section, type all the email addresses associated withthe custodian—one address per line. If you search for the items that were sentto or from this custodian, Discovery Accelerator includes all the listedaddresses in the search. To ensure that you capture all the relevant items,remember to add old email addresses.

8 Click OK.

Setting up custodian groupsOrganizing custodians into groups helps to simplify the management of thosecustodians. By synchronizing a custodian group with a Windows or Domino usergroup, you can set up multiple custodians automatically.

To set up a custodian group

1 In the Custodian Manager home page, click Custodian Groups.

2 In the Custodian Groups Management page, click New Custodian Group.

3 Complete the fields in the Create Group page, and then click OK.

Setting up custom custodian attributesCustodian Manager automatically synchronizes a number of standard custodianattributes with the corresponding values in an external source like ActiveDirectory. These standard attributes include the custodian's first and last names,department, and start and end dates. If there are any additional attributes that

111Using Custodian ManagerSetting up custodian groups

Page 112: Symantec Discovery Acceleratorâ„¢

you want to synchronize, you can define custom attributes and map them to thecorresponding attributes in the external source.

To set up a custom custodian attribute

1 In the Custodian Manager home page, click Custodian Attributes.

2 In the Custodian Attributes page, click New Custom Attribute.

3 In the Custodian Custom Attribute page, type the name and an optionaldescription for the attribute.

4 If you want to make the attribute visible when you add or edit the details ofa custodian, check Display this attribute on the custodian details page. Ifyou do not mark an attribute as visible then it does not appear on these pages,and you cannot assign it to your custodians.

5 In the Synchronize box, specify the details of the attribute in Active Directoryor a Domino LDAP directory with which to synchronize the new attribute.

6 If you chose to synchronize the attribute with attributes in both ActiveDirectory and a Domino LDAP directory, select which of the two sources haspriority.

7 If you want to enter a free-text value for the attribute instead of choosingfrom a list of supplied values, check Allow free text values to be entered.

8 To add or modify the values from which to choose when setting the attributein the custodian properties pages, do the following:

■ To add a new value, click NewValue and then type the required name anddescription. Neither the name nor the description can contain any of thefollowing characters:\ : * ? " < > |

■ To edit an existing value, click Edit at the right of the row and then makethe required changes. Custodian Manager automatically updates theproperties of any custodian to which you assigned the value.

■ To delete an existing value, click Delete at the right of the row. CustodianManager automatically removes the value from the properties of anycustodian to which you assigned it.

9 Click OK.

Using Custodian ManagerSetting up custom custodian attributes

112

Page 113: Symantec Discovery Acceleratorâ„¢

Specifying the user account under which tosynchronize custodians

By default, Custodian Manager uses the service account under which theAccelerator Manager service is running when it synchronizes custodians andcustodian groups with the corresponding Active Directory accounts. If you prefer,you can nominate a different account on a per-domain basis.

The nominated user account must have certain delegated permissions to querythe Active Directory domain.

To specify the user account under which to synchronize custodians

1 In the Custodian Manager home page, click Synchronization Accounts.

2 In the Synchronization Accounts page, click New Account.

3 In the Synchronization Account page, type the NetBIOS name of the ActiveDirectory domain with which you want to synchronize.

4 Specify the user account under which to perform Active Directory access forthe domain.

5 Specify the required global catalog server if you want to force CustodianManager to use a specific server instead of attempting to find the globalcatalog automatically.

6 Enter any DNS fully qualified domain names that you want to map to theNetBIOS name.

7 Click OK.

To assign the required delegated permissions to the user account in an ActiveDirectory domain

1 Open Active Directory Users and Computers.

2 Right-click the domain object, and then select Delegate Control.

3 In the Delegation of Control Wizard, click Next, and then click Add.

4 In the Select Users, Computers, or Groups dialog box, enter the requiredaccount name, and then click OK, and then click Next.

5 In the Tasks to Delegate page, in Delegatethefollowingcommontasks, checkthe following tasks, and then click Next:

■ Read all user information

■ Read all inetOrgPerson information

6 Click Finish.

113Using Custodian ManagerSpecifying the user account under which to synchronize custodians

Page 114: Symantec Discovery Acceleratorâ„¢

Synchronizing with entire Active Directory domainsand Domino servers

You can set up Custodian Manager to create custodians and custodian groupsautomatically for every user and group that it finds in a nominated Active Directorydomain or Domino server.

To synchronize Custodian Manager with an Active Directory domain or Dominoserver

1 In the Custodian Manager home page, click Directory Synchronization.

2 In the Directory Synchronization page, click NewDirectorySynchronization.

3 In the New Directory Synchronization page, choose whether to synchronizeCustodian Manager with an Active Directory domain or Domino server. Thentype the name of the required domain or server.

4 Check Enable synchronization.

5 Do one of the following, depending on whether you want Custodian Managerto synchronize with all the containers in the nominated domain or server orwith selected containers only.

■ To synchronize with all the containers, click Whole Domain/Server andthen optionally choose to synchronize with mail-enabled users ormail-enabled groups only.

■ To synchronize with selected containers only, click The followingcontainers and then click Addacontainer to supply the container details.

6 Click OK.

Setting the system configuration optionsMany aspects of Custodian Manager are configurable. For example, you can specifythe following:

■ The frequency with which Custodian Manager synchronizes custodian detailswith the corresponding Active Directory or Domino LDAP directory accounts.

■ The number of days that Custodian Manager should wait before marking asdeactivated a custodian for whom no Active Directory or Domino LDAPdirectory account is available.

■ Whether to delete the email addresses associated with a custodian before yousynchronize the custodian with the corresponding Active Directory or DominoLDAP directory account.

Using Custodian ManagerSynchronizing with entire Active Directory domains and Domino servers

114

Page 115: Symantec Discovery Acceleratorâ„¢

To set the system configuration options

1 In the Custodian Manager home page, click Settings.

2 In the Settingsfor box in the Settings page, click the category of settings thatyou want to customize.

3 For each option whose value you want to change, do the following in the orderlisted:

■ Click Edit at the right of the row.

■ Set the required value.

■ Click OK at the right of the row.

4 When you have set all the required options, click OK at the bottom of thepage to return to the previous page.

5 If necessary, restart the Enterprise Vault Accelerator Manager service to putyour changes into effect.

115Using Custodian ManagerSetting the system configuration options

Page 116: Symantec Discovery Acceleratorâ„¢

Using Custodian ManagerSetting the system configuration options

116

Page 117: Symantec Discovery Acceleratorâ„¢

Reviewing items

This chapter includes the following topics:

■ About reviewing with Discovery Accelerator

■ About the Review pane

■ Reviewing analytics data

■ Filtering the items in the Review pane

■ Using quick and advanced search

■ Changing how the Review pane looks

■ Setting your Review pane preferences

■ Finding all items in the same conversation

■ Viewing the history of items

■ Displaying printable versions of items

■ Assigning review marks and tags to items

■ Adding comments to items

■ Downloading the original versions of items

■ Copying the item list to the Clipboard

About reviewing with Discovery AcceleratorEach item in the review set should be assessed by a reviewer. The reviewer readsthe item, selects the appropriate status mark to assign to it, and adds a commentas necessary. Items can be reviewed more than once, and other reviewers can addmore comments or change the assigned mark.

11Chapter

Page 118: Symantec Discovery Acceleratorâ„¢

Some items may have extra marks from which to choose. These marks are availableat the bottom of the review page and are usually set up especially in response toquestions from a judge.

To access the Review pane

1 Start the Discovery Accelerator client, if you have yet to do so.

See “Opening the Discovery Accelerator client” on page 45.

You perform all the activities that are described in this chapter in theDiscovery Accelerator client.

2 Click the Review tab at the top of the Discovery Accelerator window.

About the Review paneThe Review pane lets you review and mark the items in a review set. The pane isdivider into the following areas:

Filter pane Header area

Item list Footer area Reading pane

Reviewing itemsAbout the Review pane

118

Page 119: Symantec Discovery Acceleratorâ„¢

The header area provides options for customizing the view and selecting differentitems to display.

Maximizes the Review pane by hiding the button bar acrossthe top of the Discovery Accelerator window. Click thebutton again to restore the button bar.

Lets you view the items that you have copied to a researchfolder for further investigation.

See “About research folders” on page 135.

Lets you search for more items that share the same subjectline as the selected item.

Sets your preferences for the Review pane.

See “Setting your Review pane preferences” on page 128.

Lets you hide or change the position of the Reading paneand set the size of the text to display in it.

View

Shows the number of items in the list that you have yet toreview.

Unreviewed

Shows the Discovery Accelerator ID of the highlighted item.If you know the ID of an item that you want to review, typeit here and then press the Enter key to display the item.

Item

Groups the items in the list by date, author, subject, or theaction with which Enterprise Vault Automatic ClassificationEngine has tagged them. Display or hide the items in a groupby clicking the down-arrow or up-arrow button at the left.

Group

In lists where you have chosen not to group the items, letsyou sort the items by date, author, subject, or policy action.

Sort

Downloads the current item in its original form and opensit in the appropriate application. You can also download anitem by right-clicking the item and then clicking Vieworiginal.

Finds all the items that share the same subject line as theselected item. This feature also generates a hierarchy viewfor Exchange mail items.

Sends the current item for printing.

Shows the mark that is assigned to the current item.Mark

119Reviewing itemsAbout the Review pane

Page 120: Symantec Discovery Acceleratorâ„¢

Shows the status of the current item.Status

The filter pane provides a large number of criteria by which you can filter theitems in the list. The number next to each filter option shows the number ofmatching items that Discovery Accelerator will add to the item list when you applythe selected filters.

See “Filtering the items in the Review pane” on page 122.

Note: You can quickly apply marks to items by right-clicking the options in thefilter pane.

The item list shows the items in the review set that match the filter options youhave selected. Unreviewed items display in bold text.

The tabs at the bottom of the Reading pane have the following functions:

Displays an HTML preview of the current item.Preview

Shows the comments that reviewers have assigned to thecurrent item.

Comments

Displays the comment and audit history of the current item.History

Displays a printable version of the current item.Printable

Displays information on any holds that you have placed onthe current item to stops users from deleting it from theirEnterprise Vault archives.

Legal holds

The footer area provides facilities for navigating from one item to another andapplying marks and comments to those items.

Displays the first page of the series.

Displays the previous page of the series. By default, pressingthe key sequence Alt+z performs the same function.

Shows the number of the currently displayed page and thetotal number of pages. To go to a particular page, type itsnumber in the box and then press Enter.

n of m

Displays the next page of the series. By default, pressingthe key sequence Alt+x performs the same function.

Reviewing itemsAbout the Review pane

120

Page 121: Symantec Discovery Acceleratorâ„¢

Displays the last page or item.

Applies the required mark to the selected items.No mark/Relevant/Flagged/Not relevant

If displayed, lets you accept the mark or tag with whichDiscovery Accelerator has automatically categorized theselected items.

If displayed, lets you apply tags (secondary marks) to theselected items.

Tags differ from marks in that you can assign multiple tagsto an item, but you can assign one mark only. In addition,by assigning a mark to an item, you also assign theassociated status to it. This is not the case with tags, whichdo not have an associated status.

If displayed, lets you delete one or more items from thereview set.

Lets you type a comment to add to the selected items.

In the item list, the comment indicator symbol in theComment Present column indicates that one or morecomments have been added to the items.

Comment

Reviewing analytics dataIn cases that are enabled for analytics, the following additional features areavailable in the Discovery Accelerator Review pane:

■ Additional options in the Filter area. These let you filter the items in the caseusing more options than are available in a case that is not enabled for analytics.

■ A Quick search tab and an Advanced search tab.

■ Conversation view. This feature lets you see conversations or threads in thecase’s items.

■ An Accept feature that lets you accept the automatic categorization actionsthat the analytics rules have applied.

These features provide additional ways to filter and select items before you review,mark, and tag them.

121Reviewing itemsReviewing analytics data

Page 122: Symantec Discovery Acceleratorâ„¢

Filtering the items in the Review paneThe options at the left of the Review pane provide a large number of criteria withwhich you can filter the items for review.

To filter the items in the Review pane

1 In the Case drop-down list at the top of the filter pane, select the case orfolder for which you want to display the items in the review set.

2 In the Items drop-down list, select a group of items that you want to review.The options are as follows:

This option lets you reserve the specified number ofitems in the review set. Other reviewers cannot seethese items until you have finished work on them.

Temporary Assignment

This option lets you view all the items in the reviewset, even if they have been assigned to other reviewers.

You may duplicate the work of other reviewers if youuse this option. Therefore, we recommend that youselect this option only if there are no other reviewersworking alongside you, or you want to browse the itemswithout marking them.

All Items

This option lets you review any items that your caseadministrator has assigned to you.

See “Checking the progress of cases” on page 73.

My Items

3 If you have enabled analytics in the selected case, use the facilities in theSearch area to find items that match your specified criteria.

See “Using quick and advanced search” on page 125.

4 In the Filter section, select the "facets" (item classifications) that you wantto apply. To show the available values, click the facet name or the arrow atthe left of the name.

The following table lists all the available facets in alphabetical order.

(Available only in cases that you have enabled foranalytics.) Selects items by the type of file that isattached to them.

Attachment type

Selects items by the name of the person who sent them.

In cases that you have enabled for analytics, you canalso select authors by their email addresses or domains.

Author

Reviewing itemsFiltering the items in the Review pane

122

Page 123: Symantec Discovery Acceleratorâ„¢

Selects items that Discovery Accelerator has capturedover the specified period.

Capture date

Selects items to which reviewers have added comments.Comment

Selects items by the date on which they were created.Date

Selects items that have traveled in the specifieddirection. The options are as follows:

■ Internal. Selects items where the author and allrecipients are internal to your organization.

■ External Inbound. Selects items where the authoris external to your organization and at least onerecipient is internal.

■ External Outbound. Selects items where the authoris internal to your organization and at least onerecipient is external.

Direction

(Available only in cases that you have enabled foranalytics.) Selects items by the status of their retrievalfrom the Enterprise Vault archives into your DiscoveryAccelerator customer database.

Ingestion status

Select items by the reviewer who last assigned a markto them.

Last marked by

Selects items by their legal hold status in the case.Legal hold status

Select items by the mark that reviewers have assignedto them.

Mark

(Available only in cases that you have enabled foranalytics.) Selects items by the rule that you have usedto mark them automatically.

Marked by rule

Selects items by the number of attachments that theyhave.

Number of attachments

Selects items by the policy with which the AutomaticClassification Engine has tagged them.

Policy

Selects items by the action with which AutomaticClassification Engine has tagged them. This action canbe one of the following:

■ Include (demands or suggests capture in the reviewset).

■ Exclude (precludes capture or advocatesnon-capture in the review set).

Policy action

123Reviewing itemsFiltering the items in the Review pane

Page 124: Symantec Discovery Acceleratorâ„¢

(Available only in cases that you have enabled foranalytics.) Selects items by the names, email addressesor domains of their recipients.

Recipient

Selects items that one or more scheduled searches havecaptured.

Scheduled search

Selects items that one or more searches have captured.Search

Selects items by their size in kilobytes.Size (KBytes)

Selects items by their status, such as Pending,Questioned, or Reviewed.

Status

Select items by the tags that reviewers have assignedto them.

Tag

(Available only in cases that you have enabled foranalytics.) Selects items by the rule that you have usedto mark them automatically.

Tagged by rule

Selects items by their type.Type

Note the following:

■ Each facet value is a hyperlink that, when clicked, selects that value andimmediately filters the item list accordingly. Click the facet value againto remove it from the filter.If you have already selected one or more values within the same facet,clicking another one deselects the others. However, it does not affect anyvalues that you have selected within other facets.

■ The numbers next to the facet values show the number of matching items.After you apply the filter, Discovery Accelerator updates these numbersto show how many of the items are now in the item list. For example, thevalues for the Author facet initially show the number of matching itemsin the entire review set. If you then set the value of the Status facet toUnreviewed and apply this filter, the Author values are updated to showonly the number of unreviewed items for each author.Facet values that are shown in an italicized font do not have any matchingitems in the current item list.

■ When you select two or more values for a facet, Discovery Acceleratorlooks for items that match any of the values. For example, you can chooseto view all the items that have a status of Pending or Questioned byselecting both values.When you select values for two or more different facets, DiscoveryAccelerator looks for items that match all the facets. For example, selecting

Reviewing itemsFiltering the items in the Review pane

124

Page 125: Symantec Discovery Acceleratorâ„¢

the status value Pending and the type value Exchange matches only thoseitems that have a status of Pending and a type of Exchange.

■ When a facet has a large number of possible values, Discovery Acceleratordisplays an abbreviated list of the most relevant values. You can add morevalues to the list by clicking the blue hyperlinks at the end of the list.

■ If you frequently use the same facet settings to filter the items in theReview pane, you can save them as a preset by clicking the Save buttonat the right of the Preset box. Then you can quickly apply the settings byselecting the preset from the drop-down list.

■ You can apply marks to items by right-clicking the facet values. Forexample, to mark all the items by a particular author, right-click theauthor's name in the list and then click Mark all items.

5 Click Apply at the top of the filter pane.

If you have used any feature that is only available in cases that are enabledfor analytics, you may see this message:

Results may be incomplete due to partial ingestion

This occurs when the number of retrieved items is not the same as the totalnumber of items in the case. For example, some of the items in the case mayhave been deleted from Enterprise Vault before you enabled the case foranalytics.

Using quick and advanced searchThe Quick tab in the Search area lets you make quick searches of the items in thecase. You can set the scope of your search to all available fields, or set it to specificfields and field pairs.

There are two ways to set the search scope:

■ Use the Fields list to set the scope before you enter your search. Select one ofthe following:

■ All

■ From

■ To

■ To or from

■ Subject

■ Content

125Reviewing itemsUsing quick and advanced search

Page 126: Symantec Discovery Acceleratorâ„¢

■ Subject or content

Any scope that you set in the search overrides the setting in this list.

■ Set this scope in your search; for example, from:bob. Set the scope using theseidentifiers:

■ all

■ from

■ to

■ fromto

■ subject

■ content

■ subjcont

If you do not set a search scope in your search, Discovery Accelerator uses thescope that you specify in the Fields list.

The following table lists quick search features and gives examples of how you canuse them in your searches:

Table 11-1 Quick search features

ExamplesFeature

bill AND suebill OR bobbill AND NOT "bill smith"

Boolean operators

(bill OR sue) AND (bill OR bob)Brackets

stock NEAR priceNEAR operator

stock* OR share*Wildcards

from:bob AND (subject:stock OR subject:"share price")Search scope

Reviewing itemsUsing quick and advanced search

126

Page 127: Symantec Discovery Acceleratorâ„¢

To make a quick search

1 From the Fields list, select a scope for your search.

You do not need to complete this step if you plan to specify the scope in thesearch.

2 Enter you search in the quick search box.

3 Click Apply.

You cannot save the searches you make in the Quick tab but it retains a historyof recent searches which you can reuse. This history is not specific to the case,but contains searches for all analytics enabled cases.

The Advanced tab in the Search area lets you construct more advanced searcheswhich you can save for use in the future.

Note: The Advanced search page uses functionality that is identical to parts ofthe analytics Rule Builder tab.

To create a new advanced search

1 Click New search.

2 Use the Advanced search page to create your search.

See “Adding conditions to rules and advanced searches” on page 53.

Changing how the Review pane looksYou can customize the appearance of the Review pane to suit the way you workand help you find items quickly.

Table 11-2 How to customize the Review pane

Do thisTo do this

Click the Expand Reviewing Screen button abovethe item list.

Expand the Review pane to occupy theavailable space

Click View above the item list, and then point toReading Pane Layout and select the requiredposition.

You can position the Reading pane at the bottomor right of the main window, or detach it from themain window and display its contents in a newwindow.

Change the position of the Readingpane.

127Reviewing itemsChanging how the Review pane looks

Page 128: Symantec Discovery Acceleratorâ„¢

Table 11-2 How to customize the Review pane (continued)

Do thisTo do this

Click View above the item list, and then point toSize of Reading Pane Text and select the requiredsize.

Change the size of the text in theReading pane.

Click the Review Preferences button in the headerarea and then, on the Display tab, set the requiredfonts.

Change the font or font size.

Right-click any column heading in the item listand then point to Select Columns and select thecolumns to hide or show. Then click ApplyChanges.

Hide or show columns in the item list.

Click a column heading in the item list to sort theitems by the entries in the column.

The direction of the arrow in the column headingindicates whether the entries are sorted inascending or descending order.

Sort the items in the item list.

Select the required option in the Group box abovethe item list.

Display or hide the items in a group by clickingthe arrow at the left of the group.

Group the items by date, author,subject, or policy action.

In the Page Size box below the item list, select therequired number of items.

Specify the maximum number of itemsto display per page.

Setting your Review pane preferencesDiscovery Accelerator provides extensive facilities with which you can customizethe appearance and operation of the Review pane.

To set your Review pane preferences

1 Click the Review Preferences button in the header area of the Review pane.

2 Select your required options on the General tab. The options are as follows:

When selected, lets you proceed directly to the Reviewpane when you start Discovery Accelerator.

Go straight to review screenwhen application starts

When selected, applies the default filter options to theitems in the item list.

Apply default preset whenapplication starts

Reviewing itemsSetting your Review pane preferences

128

Page 129: Symantec Discovery Acceleratorâ„¢

When selected, saves the current filter options as thedefault options for the Review pane.

On exit, save current presetsas default

When selected, causes Discovery Accelerator to displaythe next item in the list automatically when you markan item.

Move to next item aftermarking

Sets a limit on the number of items that you can displayin the Review pane.

Maximum number of itemsto display

Specifies the number of lines over which DiscoveryAccelerator displays each item in the list.

Item list display type

3 Select your required options on the Display tab. The options are as follows:

Sets the font to use for all buttons and labels in theReview pane.

Font

Sets the font to use in the item list.Item list font

Sets the font to use in the Reading pane.Reading pane font

Specifies whether Discovery Accelerator displays theitems in the list in a single-line layout or multilinelayout. The multiline layout displays item informationover two lines. The first line displays the sender, andthe second line displays the text from the Subject boxof the item header.

If you select Automatic, Discovery Acceleratorautomatically switches to the multiline layout whenthere is insufficient screen room to display a headerin a single line.

Item list display type

Turns on or off highlighting for search terms.Highlight search terms inreading pane

Determines what happens when you type charactersin the text input boxes in the Review pane, such as theComment box. When this option is checked, DiscoveryAccelerator displays the characters in a separatepop-up window as you type them. This lets you viewall the characters at once, instead of hiding oldercharacters as you type new ones.

Use pop-up for text input

When selected, removes the text labels from the actionbuttons that are below the Preview pane.

Hide text on action buttons

129Reviewing itemsSetting your Review pane preferences

Page 130: Symantec Discovery Acceleratorâ„¢

When selected, provides additional information abovethe Preview pane on the location from which thecurrent item was archived.

Show original location inreading pane

4 Click OK.

Finding all items in the same conversationIn cases that are enabled for analytics, Discovery Accelerator analyzes the itemsin the case as it retrieves the data. Once this analysis is complete, you can easilyfind all the items that have the same subject line as the current one.

Conversation analysis is based primarily on the subject of the mail items, but alsoincludes other mail attributes that define a conversation. For the purposes ofconversation analysis, mail subjects are normalized to remove prefixes that areadded by email clients. For example, RE:, Re:, Fwd:, and Antwort: are removed.After normalization, messages must have identical subjects to be considered partof the same conversation.

For any messages generated by Outlook 2003 or later, conversation analysis canalso construct a conversation hierarchy. Items from Outlook clients earlier thanOutlook 2003 are simply grouped in a flat list.

To find all items in the same conversation

1 In the Review pane, select an item for which you want to find all the relateditems.

2 Right-click the item, and then click View conversation.

Discovery Accelerator lists the related items in a separate Conversationwindow. The items are sorted by sender or date and, where possible, by theirplace in the item hierarchy. Unreviewed items are shown in bold.

3 Use the facilities in the Conversation window to apply marks and tags to theitems, display printable versions of the items, and download or copy them.

Conversation analysis may find many conversations with a frequently used emailsubject such as “Hello”. In this case, the Conversation window shows all the results,from multiple conversations, each with its own top level item in the hierarchy.The conversation can display up to 1,000 top level items in the hierarchy.

Reviewing itemsFinding all items in the same conversation

130

Page 131: Symantec Discovery Acceleratorâ„¢

Note:The Conversation window may not show all the items in a conversation untilthe retrieval of analytics data is complete for the case or folder. Even when theretrieval of analytics data is complete, Discovery Accelerator does not include inthe results of conversation analysis any items for which it failed to retrieve suchdata.

Viewing the history of itemsDiscovery Accelerator provides ready access to historical information on a selecteditem, such as the dates and times at which reviewers assigned marks and commentsto it.

To view the history of an item

1 In the Review pane, select the item whose history you want to view.

2 Click the History tab at the bottom of the Reading pane.

Discovery Accelerator displays the following details:

■ The subject, date, and details of the sender and recipients.

■ The item type, such as Microsoft Exchange or Bloomberg, and its direction(Internal, ExternalInbound, or ExternalOutbound).

■ The case in which Discovery Accelerator captured the item.

■ When and how Discovery Accelerator captured the item.

■ The ID of the item within Discovery Accelerator.

■ The original location from which the item was archived.

■ The status history of the item, including the reviewers who marked theitem and the date and time at which they did so.

■ Any policy and policy action with which the Enterprise Vault AutomaticClassification Engine has tagged the item.

Displaying printable versions of itemsYou can display the contents of items in a form that is suitable for printing.

131Reviewing itemsViewing the history of items

Page 132: Symantec Discovery Acceleratorâ„¢

To display a printable version of an item

1 In the Review pane, select the item that you want to print.

2 Click the Printable tab at the bottom of the Reading pane.

Discovery Accelerator displays a printable version of the item.

3 Click the Print button at the top of the Reading pane to send the item forprinting.

Assigning review marks and tags to itemsAs part of the review process, you assign a status mark to each message to indicatethat you have reviewed it and have no concerns—or conversely, that you do havesome concerns, and therefore want to question the message.

As well as assigning marks to items, or as an alternative to assigning marks, youcan assign "tags" to the items. Tags differ from marks in two ways:

■ You can assign multiple tags to an item, but you can assign one mark only.

■ Assigning a tag to an item does not change its action status. This status onlychanges when you click one of the primary mark buttons, such as Relevant orFlagged.

In cases that are enabled for analytics, items may have been marked or tagged byanalytics rules. You can use the Review pane to accept the automatic categorizationon these items.

Tips:

■ In the item list, the headers of unreviewed items display in bold text.

■ You can quickly mark all the items that match a certain filter option byright-clicking that option in the left pane and then selecting the required mark.

To assign a review mark or tag to an item

1 In the Review pane, select the items that you want to mark.

To select multiple adjacent items, click the first item, and then hold downthe Shift key and click the last item. To select nonadjacent items, click thefirst item, and then hold down the Ctrl key and click additional items. Toselect all the items, press Ctrl+A.

2 Do one or more of the following:

■ To apply a mark to the items, click the appropriate button at the bottomright of the pane.After a few moments, Discovery Accelerator changes the status of theitems accordingly.

Reviewing itemsAssigning review marks and tags to items

132

Page 133: Symantec Discovery Acceleratorâ„¢

■ To assign tags to the items, click the Tags button below the Reading pane,and then select the required values.

■ To accept the marks and tags that analytics rules have applied to the itemsin this case, click the Accept button.

Adding comments to itemsAs well as assigning a review mark to an item, you can add a comment to it.

To add a comment to an item

1 In the Review pane, select one or more items to which you want to add acomment.

2 In the Comment box at the bottom of the pane, type a new comment.

3 Click the button at the right of the Comment box.

Discovery Accelerator displays a comment indicator in the Commentpresentcolumn of the item list to show that you have added the comment.

Click the Comments tab at the bottom of the Reading pane to view thecomments assigned to an item. You can also customize the item list columnsto add a column that shows the comments on items.

Downloading the original versions of itemsAs well as viewing an HTML rendering of an item, you can download it in itsoriginal form to your computer. Note that downloaded items do not include anyaudit information, such as the action status and comment history. If you want toobtain both an item and its audit information, you must export it from DiscoveryAccelerator.

To download the original version of an item

◆ In the Review pane, do one of the following:

■ Click the item that you want to download and then click the Vieworiginalitem button above the Reading pane.

■ Right-click the item and then click View original.

Discovery Accelerator downloads the item to your computer and displays itusing the appropriate application.

133Reviewing itemsAdding comments to items

Page 134: Symantec Discovery Acceleratorâ„¢

Copying the item list to the ClipboardYou can copy one or all of the rows in the item list to the Windows Clipboard, andthen paste them into a spreadsheet application like Microsoft Excel. The copiedinformation includes additional information that Discovery Accelerator does notdisplay in the list, such as the Enterprise Vault saveset identity of each item.Regardless of whether you have chosen to hide some of the columns in the itemlist, all the information is copied.

To copy the item list to the Clipboard

1 In the Review pane, do one of the following:

■ To copy a single row in the item list, right-click it and then click Copyitems details to clipboard.

■ To copy all the rows, first press Ctrl+A to select them all. Then right-clickand click Copy items details to clipboard.

2 Open the application in which you want to paste the information.

3 Paste the information in the normal way.

Reviewing itemsCopying the item list to the Clipboard

134

Page 135: Symantec Discovery Acceleratorâ„¢

Working with researchfolders

This chapter includes the following topics:

■ About research folders

■ Creating research folders

■ Giving other users access to your research folders

■ Reviewing the items in research folders

■ Exporting items from research folders

■ Deleting items from research folders

■ Deleting folders

About research foldersBy creating one or more research folders, you can work privately on the itemsthat interest you without generating additional work for other reviewers. Forexample, suppose that you are pursuing an alleged instance of insider trading.Rather than add a large number of search results to the review set, where theyare visible to other reviewers, you can conduct the searches from a research folderand store the results there. Then you can review and mark the items in the normalway, or export them for offline review.

Discovery Accelerator 8.0 provides a new option with which you can enable"analytics" on a research folder. This option provides additional analyses of themetadata and content of items that are collected in the folder. Analytics also letsusers search within specific items in a folder, examine and review entireconversation threads in one view, and automatically pre-mark or categorize the

12Chapter

Page 136: Symantec Discovery Acceleratorâ„¢

items in the case. These functions deliver a new review experience that is knownas "Guided Review".

Where necessary, you can give other users access to your research folders so thatthey can collaborate in the review process. The permissions that you grant theseusers determine whether they can export items from the folder, search for moreitems to add to it, and review and mark the items.

Note: You perform all the activities that are described in this chapter in theDiscovery Accelerator client.

Creating research foldersDiscovery Accelerator provides several methods for creating folders. In additionto the method described here, you can also create new folders when you definethe criteria for searches, accept the search results, and review items.

To create a research folder

1 Click the Research tab in the Discovery Accelerator client, and then click theFolders tab.

2 In the left pane, click All Research.

3 Click Create at the top of the window.

4 In the Name box, type a name for the folder.

5 In the Case box, select the case with which to associate the folder. You musthave the Perform Ad Hoc Searches permission in this case.

Alternatively, select <My Research> to create a folder that is not attached toany case.

6 Specify a location in which you want to store any items that you export fromthe folder.

7 If you have chosen to create a folder that is not attached to any case, selectthe vault stores in which to search for items. Check or uncheck the box nextto each vault store to include it in searches or exclude it from searches.

8 Click Save.

Giving other users access to your research foldersYou can give other users access to your folders by assiging roles to them. Forexample, anyone who wants to review and mark the items in a folder must have

Working with research foldersCreating research folders

136

Page 137: Symantec Discovery Acceleratorâ„¢

the Review role in that folder. Other roles permit users to export items from thefolder and search for new items to add to it. The Full Control role combines allthese permissions in one role.

You must have the Folder Full Control role in the folder to give other users accessto it.

To give another user access to a research folder

1 Click the Research tab in the Discovery Accelerator client.

2 In the left pane, click the folder to which you want to give access.

3 Click the Role Assignment tab.

4 Click the name of the user to whom you want to assign a role.

If the user does not appear in the list, click Add at the top of the pane andthen select the user to add to it.

5 In the right pane, do one of the following:

■ Click Add to assign a new role.

■ Click Remove to remove the selected role.

6 Click Save.

Reviewing the items in research foldersYou review the items in a folder in exactly the same way that you review the itemsin the review set.

You must have the Review Messages permission in the folder to review the itemsin it. By default, users with the Folder Full Control or Folder Review role have thispermission.

To review the items in a research folder

1 Click the Research tab in the Discovery Accelerator client.

2 In the left pane, click the folder whose items you want to review.

3 Click the Properties tab.

4 Click Go To Review.

5 In the Review pane, review the items as you normally would do.

137Working with research foldersReviewing the items in research folders

Page 138: Symantec Discovery Acceleratorâ„¢

Exporting items from research foldersIf you want to review items offline or present them in evidence to a third party,you must export them. You can export the items in several different formats:HTML, MSG, and PST. If you export to HTML, you can export review markinginformation along with each item.

Exporting does not affect the status of items, and you can continue to work onthose that you have exported.

You must have the Export Messages permission in the folder to export items fromit. By default, users with the Folder Full Control or Folder Export role have thispermission.

To export the items from a research folder

1 Click the Research tab in the Discovery Accelerator client.

2 In the left pane, click the folder from which you want to export some items.

3 Click the Export tab.

4 Click New.

5 Enter the required run details and filter information.

Discovery Accelerator exports items to a folder on the Discovery Acceleratorserver rather than to a folder on the computer where you are running theclient. If you use the same output folder and export run name for multipleruns, Discovery Accelerator overwrites the report summary each time. It istherefore advisable to give each run a different name.

6 Click Apply.

7 Click OK to export the specified number of items.

8 Wait a few moments for processing to finish, and then browse to the outputfolder on the Discovery Accelerator server to retrieve the exported items.

Deleting items from research foldersWhen you have no further use for an item, you can delete it from your researchfolder.

To delete an item from a research folder

1 Click the Research tab in the Discovery Accelerator client.

2 In the left pane, click the folder from which you want to delete some items.

3 Click the Properties tab.

Working with research foldersExporting items from research folders

138

Page 139: Symantec Discovery Acceleratorâ„¢

4 Click Go To Review.

5 In the Review pane, select one or more items that you want to delete.

To select multiple adjacent items, hold down the Shift key and click the firstand last item in the range. To select multiple, nonadjacent items, hold downthe Ctrl key and click the required items.

6 Click the Delete button below the preview pane.

7 Choose whether to delete the selected items only or all the items in the folder.

8 Click Delete.

Deleting foldersWhen you have no further use for a folder, you can delete it. You must have theDelete Folder permission to delete a folder.

If analytics is enabled on the folder, you must disable analytics separately, or theassociated analytics data remains on the SQL server. Folders that are linked to acase must be disabled for analytics before you delete the case.

To delete a folder

1 Click the Research tab in the Discovery Accelerator client.

2 In the left pane, click All Research.

3 Choose one or more folders that you want to delete.

To select multiple adjacent folders, click the first folder, and then hold downthe Shift key and click the last folder. To select nonadjacent folders, click thefirst folder, and then hold down the Ctrl key and click additional folders. Toselect all the folders, press Ctrl+A.

4 Click Delete.

5 Click Delete folders to confirm that you want to proceed.

139Working with research foldersDeleting folders

Page 140: Symantec Discovery Acceleratorâ„¢

Working with research foldersDeleting folders

140

Page 141: Symantec Discovery Acceleratorâ„¢

Creating and viewingreports

This chapter includes the following topics:

■ About the Discovery Accelerator reports

■ Available Discovery Accelerator reports

■ Creating reports

■ Viewing existing reports

■ Deleting reports

About the Discovery Accelerator reportsDiscovery Accelerator provides extensive facilities for monitoring the details ofa case and validating compliance with discovery requests.

Besides printing the reports, you can export them in a number of formats, includingXML, comma-separated values (CSV), Acrobat (PDF), Web archive (MHTML), Excel,and TIFF.

Note: Any reports that you used with Discovery Accelerator 2007 or earlier arenot suitable for use with Discovery Accelerator 8.0.

Available Discovery Accelerator reportsTable 13-1 describes the reports that accompany Discovery Accelerator.

13Chapter

Page 142: Symantec Discovery Acceleratorâ„¢

Table 13-1 Available Discovery Accelerator reports

ShowsThis report

The Enterprise Vault archives in which you haveconducted Discovery Accelerator searches withina selected case.

Archive Source

Information on a selected Discovery Acceleratorcase, including the users who have access to thecase and the searches, reviews, and productionruns that they have conducted.

Case History

The items in the selected case on which DiscoveryAccelerator has placed a hold to stop them frombeing deleted from the Enterprise Vault archives.

Legal Holds

The items in the selected case.Item Detail

The production runs that you have conducted forthe selected case.

Productions

The live and accepted searches in the selectedcase.

Searches

The users who have access to the selected case,and their associated roles and permissions.

Security

The following sections provide detailed information on the available reports.

Archive SourceThe Archive Source report provides information on the Enterprise Vault archivesin which you have conducted Discovery Accelerator searches within a selectedcase.

This report contains the following fields.

Table 13-2 Fields in the Archive Source report

ShowsThis field

The identifier that Enterprise Vault has assignedto the archive.

Archive ID

The name of the Enterprise Vault archive.Archive Name

The vault store in which the archive is located.Vault Store

Creating and viewing reportsAvailable Discovery Accelerator reports

142

Page 143: Symantec Discovery Acceleratorâ„¢

Table 13-2 Fields in the Archive Source report (continued)

ShowsThis field

The number of hits that the search has generated.Hits In Archive

The range of dates between which the items inthe archive were sent and received.

Earliest/Latest Date In Archive

Case HistoryThe Case History report provides information on a selected Discovery Acceleratorcase, including the users who have access to the case and the searches, reviews,and production runs that they have conducted.

This report contains the following fields.

Table 13-3 Fields in the Case History report

ShowsThis field

Cases

The name that the creator of the case has assignedto it, and the identifying number that DiscoveryAccelerator has assigned to it.

Case Name/Number

The date on which the case was created.Case Creation Date

Whether the items in the case review set are onhold to stop users from deleting them from theirEnterprise Vault archives.

Legal Hold Status

The number of items in the case review set.Total Items In the Case

The number of items that you have produced foroffline review.

Total Items Produced

The users who have access to this case and theirroles within it.

Role/User Name

Searches

The date on which a search was run.Date Run

The name that the creator of the search hasassigned to it.

Search Name

The identifying number that DiscoveryAccelerator has assigned to the search.

Search ID

143Creating and viewing reportsAvailable Discovery Accelerator reports

Page 144: Symantec Discovery Acceleratorâ„¢

Table 13-3 Fields in the Case History report (continued)

ShowsThis field

The number of archives that DiscoveryAccelerator has searched.

# of Archives

The progress of the search, expressed as apercentage value.

Search Status

The number of hits that the search has generated.# of Hits

The number of items that the search has retrievedthat no other search in the case has retrieved.

# of Unique Hits

Review

The number of items in the case review set thatreviewers have marked.

Items Reviewed

The number of items in the case review set thatare currently assigned to reviewers for marking.

Items Assigned

Production/Export History

The date on which the production or export wascompleted.

Date of Production/Export

The name of the production run or export run.Production/Export Name

The identifying number that DiscoveryAccelerator has assigned to the production runor export run.

Production/Export ID

The progress of the production run or export run,expressed as a percentage value.

Status

The identifying numbers of the first and last itemsin the production run. -1 means None.

Begin ID/End ID

The number of items in the production run. -1means None.

Number of Items Produced/Exported

The name of the search with which you selecteditems for production.

Search Name

The name of the review mark with which youselected items for production.

Mark

The path to the folder on the file system whereyou can find the produced or exported items.

Location

Creating and viewing reportsAvailable Discovery Accelerator reports

144

Page 145: Symantec Discovery Acceleratorâ„¢

Item DetailThe Item Detail report provides information on the items in the selected case.

This report contains the following fields.

Table 13-4 Fields in the Item Detail report

ShowsThis field

The identifying number that DiscoveryAccelerator has assigned to the item.

DAID

The identifier of the saveset (.DVS) file thatcontains the item.

SSID

The identifier that Enterprise Vault has assignedto the archive.

Archive ID

The name of the Enterprise Vault archive.Archive Name

The date on which the item was sent or received.Sent/Received Date

The email address of the person who sent theitem.

Author

A truncated list of the people who received theitem.

Recipients (truncated)

The subject line of the item.Subject

The last mark that a reviewer has assigned to theitem.

Latest Mark

The last comment that a reviewer has assignedto the item.

Latest Comments

Legal HoldsThe Legal Holds report provides a summary of the items in the selected case onwhich Discovery Accelerator has placed a hold to stop them from being deletedfrom the Enterprise Vault archives. The report first shows details of the case andof the searches that you have conducted in it. The report then shows details ofthe held items in the search results.

This report contains the following fields.

145Creating and viewing reportsAvailable Discovery Accelerator reports

Page 146: Symantec Discovery Acceleratorâ„¢

Table 13-5 Fields in the Legal Holds report

ShowsThis field

Case

The number of items in the case review set.Total Items

Whether the items in the case review set are onhold to stop users from deleting them from theirEnterprise Vault archives.

Legal Hold State

The ID of the legal hold on the case.Legal Hold Group ID

The reason why the the items in the case havebeen placed on hold.

Reason

The progress of the legal hold.Legal Hold Status

The number of items that Discovery Acceleratorhas placed on hold.

Total Items Held

The number of items that Discovery Acceleratorcannot place on hold.

Total # of Hold Errors

The number of items that have been deleted fromthe Enterprise Vault archives before DiscoveryAccelerator can place them on hold.

Total # of Items Deleted

The number of archives in which items have beenplaced on hold.

Total Archives with Items Held

Searches

The identifying number that DiscoveryAccelerator has assigned to the search.

Search ID

The name that the creator of the search hasassigned to it.

Search Name

The date on which the search was run.Search Date

The total number of items that match the searchcriteria.

Total Hits

The number of items that the search has retrievedthat no other search in the case has retrieved.

Total Unique Items

The number of unique items that DiscoveryAccelerator has placed on hold.

Total Unique Items Held

Creating and viewing reportsAvailable Discovery Accelerator reports

146

Page 147: Symantec Discovery Acceleratorâ„¢

Table 13-5 Fields in the Legal Holds report (continued)

ShowsThis field

The number of Enterprise Vault archives that thesearch has queried.

Total Archives

Archive Details

The identifier that Enterprise Vault has assignedto the archive.

Archive ID

The name of the Enterprise Vault archive.Archive Name

The vault store in which the archive is located.Vault Store

The number of items on hold in the archive.# of Items on Hold

The range of dates between which the items onhold were sent and received.

Earliest/Latest Date

ProductionsThe Productions report provides information on the production runs that youhave conducted for the selected case.

This report contains the following fields.

Table 13-6 Fields in the Productions report

ShowsThis field

The date and time at which the production orexport was completed.

Date of Production/Export

The name that the initiator of the production runhas assigned to it.

Production/Export Name

The identifying number that DiscoveryAccelerator has assigned to the production.

Production/Export ID

The progress of the production run or export run,expressed as a percentage value.

Status

The identifying numbers of the first and last itemsin the production. -1 means None.

Begin ID/End ID

The number of items in the production run orexport run.

Number of Items Produced/Exported

147Creating and viewing reportsAvailable Discovery Accelerator reports

Page 148: Symantec Discovery Acceleratorâ„¢

Table 13-6 Fields in the Productions report (continued)

ShowsThis field

The name of the search with which you selectedthe items for production or export.

Search Name

The name of the review mark with which youselected the items for production or export.

Mark

The path to the folder on the file system whereyou can find the produced or exported items.

Location

SearchesThe Searches report provides information on the live and accepted searches inthe selected case.

This report contains the following fields.

Table 13-7 Fields in the Searches report

ShowsThis field

The date and time at which the search was run.Date Run

The name that the creator of the search hasassigned to it. Click the name to display thecriteria used for the search.

Search Name

The identifying number that DiscoveryAccelerator has assigned to the search.

Search ID

The status of the search, such as PendingAcceptance, In Progress, Accepted, Failed, orCompleted.

Status

The number of archives that DiscoveryAccelerator has searched.

# of Archives

The progress of the search, expressed as apercentage value.

Search Status

The number of items that match the searchcriteria.

# of Hits

The number of found items that no other searchin the case has retrieved.

# of Unique Hits

The following table lists the Search Criteria fields.

Creating and viewing reportsAvailable Discovery Accelerator reports

148

Page 149: Symantec Discovery Acceleratorâ„¢

Table 13-8 Search Criteria fields

ShowsThis field

The date range between which items must be sentor received to match the search criteria.

Date Ranges

The recipients of the items.To

The senders of the items.From

The words or phrases for which to search in thesubject lines of items.

Subject

The words or phrases for which to search in themessage bodies of items.

Content

The required number of attachments to items.Number of Attachments

The file name extensions of particular types ofattachments for which to search.

Attachment Type

The size of item for which to search.Message Size

The type of item for which to search.Message Type

The selected retention category that EnterpriseVault has assigned to the items.

Retention Category

The selected policy type (Inclusion, Exclusion, orCategory) with which third-party policymanagement software has tagged the items.

Policy Type

The specific policy with which the policymanagement software has tagged the items.

Policy

The filter applied in the search to sort by case.Filter Policies by Case

SecurityThe Security report provides information on the users who have access to theselected case, and their associated roles and permissions.

This report contains the following fields.

Table 13-9 Fields in the Security report

ShowsThis field

The security role in Discovery Accelerator.Role

149Creating and viewing reportsAvailable Discovery Accelerator reports

Page 150: Symantec Discovery Acceleratorâ„¢

Table 13-9 Fields in the Security report (continued)

ShowsThis field

A list of users to whom the role is assigned.User Name

Whether the role is a predefined system role or auser-created role.

Role Type

The permissions associated with the role.Permissions

Creating reportsYou must have the View Reports permission to generate a new report. By default,most users with a case role have this permission.

To create a new report

1 Start the Discovery Accelerator client, if you have yet to do so.

See “Opening the Discovery Accelerator client” on page 45.

2 Click the Reports tab in the Discovery Accelerator client.

3 Click New Report at the top left of the window.

4 In the Type box, select the type of report that you want to create.

In some cases, choosing a report type causes additional boxes to appear sothat you can define the scope of the report.

5 In the Name box, type a unique name that contains up to 50 characters.

6 If required, type an optional description that contains up to 250 characters.

7 Set any remaining report parameters, and then click Apply.

8 When Discovery Accelerator has generated the report, double-click the reportname in the left pane to view it.

Viewing existing reportsDiscovery Accelerator makes it easy to view the contents of a report, print it, andexport it in formats such as Excel, Acrobat (PDF), XML, and comma-separatedvalues (CSV).

You must have the View Reports permission to view an existing report. By default,most users with a case role have this permission.

Creating and viewing reportsCreating reports

150

Page 151: Symantec Discovery Acceleratorâ„¢

To view an existing report

1 Click the Reports tab in the Discovery Accelerator client.

2 In the center pane, click the report that you want to view. DiscoveryAccelerator provides information on the selected report in the Details tab atthe right.

You can filter the list of reports by checking the options in the left pane.Alternatively, in the Search Reports box at the top of the center pane, entera keyword for which to search in the names and descriptions of the reports.

3 Click the Preview tab to display the contents of the report.

4 Do one or more of the following:

■ To page through the report, go to a specific page, find a specific word, oradjust the magnification level, click the navigation controls at the top ofthe preview pane.

■ To export the report, select the required format and then click Export.Discovery Accelerator prompts you to choose a location for the reportfile.

■ To update the report contents, click Refresh.

■ To print the report, click Print and then select the printing options youwant.

Deleting reportsWhen you have no further use for a report, you can delete it from DiscoveryAccelerator.

You must have the View Reports permission to delete a report. By default, mostusers with a case role have this permission.

Caution: You cannot recover reports that you accidentally delete.

To delete a report

1 Click the Reports tab in the Discovery Accelerator client.

2 In the left pane, click the report that you want to delete.

3 Click Delete Report at the top left of the window.

4 Click Yes to confirm that you want to delete the report.

151Creating and viewing reportsDeleting reports

Page 152: Symantec Discovery Acceleratorâ„¢

Creating and viewing reportsDeleting reports

152

Page 153: Symantec Discovery Acceleratorâ„¢

Importing and exportingdata

This chapter includes the following topics:

■ About importing and exporting data

■ Sample XML files

■ Format of the Dataload.xml file

■ Importing the configuration data

■ ImportExport command

■ How exporting differs from producing

■ Creating an export or production run

■ Making the export ID visible in Microsoft Outlook

About importing and exporting dataAs part of the process of setting up Discovery Accelerator, you must enterconfiguration data on roles, users, cases, and so on. If this data already existsoutside Discovery Accelerator and is convertible to XML format, you can importit into Discovery Accelerator from an XML file. Then you can quickly load largeamounts of configuration data that might otherwise be time-consuming to enter.

If you want to review items offline or present them in evidence to a third partythen you must export them from Discovery Accelerator. You can export the itemsin several different formats, which include HTML, MSG, and PST. Export to HTMLif you want to export review marking information and comments along with eachitem.

14Chapter

Page 154: Symantec Discovery Acceleratorâ„¢

Sample XML filesThe Discovery Accelerator server software comes with a number of sample XMLfiles. These files reside in subfolders of the Discovery Accelerator program folder(typically C:\Program Files\Enterprise Vault Business Accelerator).

Table 14-1 Sample XML files

FunctionResides in subfolderFile

Explains how to load case,target, and vault store data.

AcceleratorAdminWeb\

Installation

Dataload.xml

Gives an example of how toload details of custodians,custodian groups, andcustom attributes forCustodian Manager.

CustodianManagerWeb\

Installation

dataloadcustodian

manager.xml

Format of the Dataload.xml fileYou can use theDataload.xml file with both Compliance Accelerator and DiscoveryAccelerator, so it contains some information that applies to both applications.However, the file is well documented and shows which sections apply to DiscoveryAccelerator.

Table 14-2 Primary Discovery Accelerator sections in Dataload.xml file

DefinesSection

Vault stores available to all cases for searching.ApplicationVaultStore

Custom attributes of the Custodian Manager custodiansand custodian groups that you want to synchronize withan external source like Active Directory or a DominoLDAP directory.

See “Setting up custom custodian attributes” on page 111.

CustodianAttributeDefinition

Individual users for whom you want to search when youconduct a Discovery Accelerator search.

See “Setting up custodians” on page 110.

Custodian

Importing and exporting dataSample XML files

154

Page 155: Symantec Discovery Acceleratorâ„¢

Table 14-2 Primary Discovery Accelerator sections in Dataload.xml file(continued)

DefinesSection

Any collections of employees for whom you want tosearch when you conduct a Discovery Acceleratorsearch. These collections can include NT groups,distribution lists, Active Directory containers, DominoLDAP queries, and Domino groups.

See “Setting up custodian groups” on page 111.

CustodianGroup

Users to add to the system as administrators orreviewers, and the application administration roles toassign to them.

Employee

Targets and their email addresses. These are availablein all cases.

ApplicationTarget

Groups of targets. These are available in all cases.ApplicationTargetGroup

Cases. This section includes definitions of the following:

■ Case users

■ Case roles that are assigned to individuals

■ Vault stores for the case

■ Case targets and target groups

Department

The second part of the file describes each XML entry. The last part of the fileprovides sample entries for a Discovery Accelerator system.

If you use any non-ASCII characters in a dataload file, you must specify theappropriate encoding. For example, you can save a file that contains accentedEuropean characters in Unicode format or add the following at the start of thefile:

<?xml version="1.0" encoding="iso-8859-1" ?>

Importing the configuration dataYou must have the Import Configuration Data permission to import configurationdata from an XML file. By default, users with the application role of DiscoverySystem Admin have this permission.

155Importing and exporting dataImporting the configuration data

Page 156: Symantec Discovery Acceleratorâ„¢

To import configuration data from an XML file

1 Start the Discovery Accelerator client, if you have yet to do so.

See “Opening the Discovery Accelerator client” on page 45.

2 Click the Configuration tab in the Discovery Accelerator client, and thenclick the Import Configuration tab.

3 In the Configurationfile box, type the full path to the XML file that you wantto import, or click Browse and then choose the file to import.

The path can contain up to 250 characters.

You can specify a UNC path or NTFS path to the file if it is stored on a remotecomputer. For example:

\\server2\EVBA\import.xml

4 If you want to clear the import information from previous imports beforeyou proceed, check Clear log before import.

5 Click Import.

ImportExport commandThe ImportExport command provides a command line alternative to the DiscoveryAccelerator client for importing data into the customer database. It also lets youexport the data from the database to an XML file.

The command is installed in the Discovery Accelerator program folder on theDiscovery Accelerator server, together with a configuration file,ImportExport.exe.config.

Note: You must have Administrator privileges to run ImportExport.

ImportExport syntaxImportExport.exe -F:FileName -C:CustomerID [-I] [-L:LogFile] [-O]

[-NoValidation] [-BypassService] [-LogToDB] [-LeaveDBLog]

[-ShowOnlyErrors] [-CommitOnceOnSuccess] [-?]

Table 14-3 describes the parameters that you can append to the command.

Importing and exporting dataImportExport command

156

Page 157: Symantec Discovery Acceleratorâ„¢

Table 14-3 ImportExport command parameters

FunctionParameter

Identifies the XML file from which to import data or towhich the data is to be exported.

-F:FileName

Identifies the Discovery Accelerator customer for whichto import or export data. If you run ImportExport withoutany parameters then, when prompted for a customer ID,you can type ? to list all the customer names andidentifiers.

-C:CustomerID

Instructs the command to import configuration data intothe Discovery Accelerator database from the XML file thatyou specify with the -F parameter. Omit this parameterto export data to the specified XML file.

-I

Specifies the name of the log file. If you omit the path tothe file, the command creates it in the DiscoveryAccelerator program folder on the Discovery Acceleratorserver.

-L:LogFile

Overwrites the output XML file and log file, if they exist.If you omit this parameter, and the output and log filesexist, the command displays an error message and stops.

-O

Accelerates the process of importing data from an XMLfile by turning off XML validation. The command ignoresthis parameter if you export data to a file.

-NoValidation

157Importing and exporting dataImportExport command

Page 158: Symantec Discovery Acceleratorâ„¢

Table 14-3 ImportExport command parameters (continued)

FunctionParameter

Instructs the command to bypass the Enterprise VaultAccelerator Manager service and connect directly to thedatabase. This may be necessary if you experienceout-of-memory problems when you try to import data intoor export data from from a very large database.

To use this facility, you must ensure that:

■ You have access permissions to the database.

■ The ImportExport.exe.config file specifies theSQL Server for the Discovery Accelerator database asthe DSN key. Each time you start the Enterprise VaultAccelerator Manager service, it automatically updatesthe DSN key value in this file to match the value thatis specified in theAcceleratorManager.exe.config andAcceleratorService.exe.config files. So, if youspecify a different value in theImportExport.exe.config file, DiscoveryAccelerator overwrites it when you next start theservice.

-BypassService

Writes the log messages to both the log file and theDiscovery Accelerator database, where they are visiblewhen you use the Discovery Accelerator client.

-LogToDB

If you also specify the -LogToDB parameter, instructs thecommand to leave log information on previous importsand exports in the Discovery Accelerator database insteadof overwriting it.

-LeaveDBLog

If you also specify the -LogToDB parameter, instructs thecommand to report error messages but not informationmessages.

-ShowOnlyErrors

Commits the data to the Discovery Accelerator databaseonly if the command imported it without error.

-CommitOnceOnSuccess

Displays the online Help information for the command.-?

Examples of ImportExport commandsThe following command imports unvalidated data from the file data.xml, whichis in the folder C:\temp. The log file, import.log, contains error messages only,

Importing and exporting dataImportExport command

158

Page 159: Symantec Discovery Acceleratorâ„¢

and the command overwrites the previous contents of the log file as it importsthe XML data.

ImportExport.exe -C:2 -I -F:C:\temp\data.xml -NoValidation -O

-L:import.log -ShowOnlyErrors

The following command exports the data in the Discovery Accelerator databaseto the XML file export.xml, which is in your %USERPROFILE% folder on theDiscovery Accelerator server (C:\Documents and Settings\{username}). Thecommand also overwrites the error messages that it has previously logged in thedatabase.

ImportExport.exe -C:2 -F:export.xml -LogToDB -LeaveDBLog

-ShowOnlyErrors

How exporting differs from producingExporting items is different from producing items in the following ways:

■ Discovery Accelerator generates Bates numbers for produced items but notfor exported items.

■ Discovery Accelerator locks produced items, but it does not lock exporteditems.

■ After you have exported an item, you can change the mark or status that youhave assigned to it. However, after you have produced an item, you cannotmark it or change its status (but you can still display it in the Review pane). Ifthe same item has been captured in another case, its status in that case remainsunaffected.

■ You can export individual items multiple times, but you can produce itemsonce only.

In effect, the export feature provides a less formal way to copy items out ofDiscovery Accelerator for offline review.

You do not have to wait until the end of the reviewing process to carry outproduction; you can produce the items that you have reviewed at any time. Youcan then carry out productions of further items later, after they have beenreviewed. If you use the same output folder and production run name for multipleruns, Discovery Accelerator overwrites the report summary each time.

If you carry out a production run and then something goes wrong with the filesthat you have produced—for example, they are accidentally deleted—you canreproduce the items. However, once you have successfully produced items, youcannot undo the process.

159Importing and exporting dataHow exporting differs from producing

Page 160: Symantec Discovery Acceleratorâ„¢

Creating an export or production runIf you want to review items offline or present them in evidence to a third party,you must export them from Discovery Accelerator. There are several outputformats from which to choose, including HTML, MSG, and PST. Exporting theitems as HTML lets you export review marking information along with each item.

You must have the Production permission to produce or export items. By default,users with the case role of Admin have this permission.

To create an export or production run

1 Start the Discovery Accelerator client, if you have yet to do so.

See “Opening the Discovery Accelerator client” on page 45.

2 Click the Cases tab in the Discovery Accelerator client.

3 In the left pane, click the case from which you want to export items.

If Discovery Accelerator lists a lot of cases, you can filter the list with thefields at the top of the pane. As well as filtering the cases by name, you canchoose whether to list any research folders that are associated with them.

4 Click the Export/Production tab.

5 Click New at the top of the window.

6 In the Name box, type a name for the run.

The name that you specify here becomes the name of the subfolder in whichDiscovery Accelerator stores the output from the run.

7 In the Output folder box, type the path to the folder on the DiscoveryAccelerator server in which you want to store the output from the run.

Discovery Accelerator places the output from the run in a subfolder of thenominated folder.

8 Choose whether to produce or export the selected items.

If you select Production, a Production Details box appears in which you canset the ID prefix and number for the production. You may have set this whenyou created the case, but you can change it here.

9 In the Items Selection box, choose the items that you want to export.

The options are as follows:

Selects items by their type, such as Microsoft Exchangeor Fax.

Original source

Importing and exporting dataCreating an export or production run

160

Page 161: Symantec Discovery Acceleratorâ„¢

Selects items by the action with which the EnterpriseVault Automatic Classification Engine has tagged them.This action can be one of the following: Inclusion(demands or suggests capture), Exclusion (precludescapture or advocates non-capture), and No Action (theitem is subject to normal random sampling).

Policy action

Specifies whether to export all the items in the reviewset or only those items that are assigned to you.

Items

Selects items that the specified search has captured.Search

Selects items by the mark that reviewers have assignedto them.

Mark

Selects items by the person who last assigned a reviewmark to them.

Last marked by

Selects items by their status, such as Pending,Questioned, or Reviewed.

Current status

Selects items by the specific policy with which theEnterprise Vault Automatic Classification Engine hastagged them.

Policy

Specifies the ID of an individual item that you want toexport. To determine the ID of an item, view the itemin the Review pane.

Item ID

10 In the Options box, choose whether to export the items in their originalformat or as HTML.

If you click Original Type, you can choose to output Microsoft Exchangeitems as individual MSG files or encapsulate them all in a single PersonalFolders (.pst) file. If you click PST, Discovery Accelerator displays someadditional options with which you can set a password and a maximum sizefor the file. The password can contain alphanumeric characters only.

If you click HTML, Discovery Accelerator displays some additional optionswith which you can choose to include comments and mark history, and thecontents of attachments.

11 Type the number of items that you want to export.

12 If you are exporting file system items or Lotus Domino items and want tomake them read-only so that they cannot be changed or accidentally deleted,check Read Only.

161Importing and exporting dataCreating an export or production run

Page 162: Symantec Discovery Acceleratorâ„¢

13 Click Apply.

14 When the run has finished, open the output folder on the DiscoveryAccelerator server to retrieve the exported items.

Making the export ID visible in Microsoft OutlookWhen you view exported Personal Folders (.pst) files in Microsoft Outlook, youmay find it helpful to see the export ID that Discovery Accelerator has assignedto each item. You can do this by adding a custom column to the view in Outlook.

The configuration option PST ExportID Column Name lets you set the name ofthe custom column.

See “Export/production configuration options” on page 168.

To make the export ID visible in Microsoft Outlook

1 Open the exported .pst file in Outlook.

2 Right-click the column headers in Outlook, and then click Field Chooser.

3 Click New.

4 In the Name box in the New Field dialog box, type Export ID, and then clickOK.

5 Close the Field Chooser dialog box.

6 Right-click the column headers in Outlook, and then click CustomizeCurrentView.

7 Click Fields and then, in the Select available fields from list, selectUser-defined fields.

8 Add the Export ID field to the list of displayed fields, and then click OK twiceto close the dialog boxes.

Importing and exporting dataMaking the export ID visible in Microsoft Outlook

162

Page 163: Symantec Discovery Acceleratorâ„¢

Customizing DiscoveryAccelerator

This chapter includes the following topics:

■ Setting system configuration options

■ Customizing the columns in the Review pane

Setting system configuration optionsYou can configure many aspects of Discovery Accelerator.

Table 15-1 lists the categories of configuration settings from which you can choose.

Table 15-1 Configuration settings by category

To do thisUse this category

Configure the searches that users can initiate from their researchfolders.

Ad Hoc Searches

Control how third-party tools may exchange data with your DiscoveryAccelerator database through the Discovery Accelerator applicationprogramming interface (API).

API

Enable or disable the Discovery Accelerator troubleshooting facilities.Diagnostics

Customize the error messages that Discovery Accelerator displays inthe Review pane when it cannot open an item in the preview windowof that pane.

DocumentConversion

Configure the output when users export or produce items fromDiscovery Accelerator for offline review.

Export/production

15Chapter

Page 164: Symantec Discovery Acceleratorâ„¢

Table 15-1 Configuration settings by category (continued)

To do thisUse this category

Configure general Discovery Accelerator options.General

Configure the primary settings for the Discovery Accelerator prefetchcache mechanism. This mechanism is designed to speed up therendering of items in the Review pane.

Item PrefetchCache

Configure advanced settings for the prefetch cache mechanism.Item PrefetchCache (Advanced)

Configure the Discovery Accelerator Legal Hold mechanism. Thismechanism allows case administrators to prevent the documents andmessages in their cases from being deleted.

Legal Hold

Customize the counts of pending, questioned, and unreviewed itemsin the Discovery Accelerator Summary tab. You can select a color foreach type of count and specify an identifying prefix for it.

Message Counts

Integrate Discovery Accelerator with the Enterprise Vault AutomaticClassification Engine to better flag items for inclusion in or exclusionfrom the review set.

Policy Integration

Control how Discovery Accelerator synchronizes user profiles withthe corresponding Active Directory or Domino directory accounts.

ProfileSynchronization

Configure the Reports pane, which shows the status of recentlygenerated reports.

Reporting

Customize the appearance and functionality of the Review pane.Reviewing

Optimize the search features in Discovery Accelerator.Search

Choose whether to make the SQL Server SystemAdmin logon thecreator and owner of Discovery Accelerator search schedules.

Security

Record the dates on which you installed Enterprise Vault and beganto archive data, and more.

System

Configure when Discovery Accelerator synchronizes with theEnterprise Vault archives.

Vault DirectorySynchronization

You must have the Modify System Configuration permission to change theconfiguration settings. By default, only users with the role of Discovery SystemAdmin have this permission.

Customizing Discovery AcceleratorSetting system configuration options

164

Page 165: Symantec Discovery Acceleratorâ„¢

To set system configuration options

1 Start the Discovery Accelerator client, if you have yet to do so.

See “Opening the Discovery Accelerator client” on page 45.

2 Click the Configuration tab in the Discovery Accelerator client, and thenclick the Settings tab.

3 Click the plus sign at the left of a section name to list the associated settings.

Alternatively, type some characters in the filter box at the top of the windowto search for the configuration options that contain those characters. Forexample, type Color to find all the options that contain this word in theirnames.

4 For each setting whose value you want to change, do the following in theorder listed:

■ Click the value in the Value column.

■ Set the required value.

■ Click outside the Value column.

5 When you have set all the required options, click Apply.

6 If you have changed any setting that has a tick in its RestartRequired column,restart the Enterprise Vault Accelerator Manager service on the DiscoveryAccelerator server to put your changes into effect.

The following sections describe the available options.

Ad Hoc Searches configuration optionsUse these settings to configure the searches that users can initiate from theresearch folders that they have created.

Specifies the prefix to add to the names of ad-hocsearches that users save to the review set.

Ad-hoc search Pre-fix

Specifies whether users can delete the items froman ad-hoc or folder search before they accept thesearch into the review set. By default, DiscoveryAccelerator lets users delete the items.

Allow hits to be deleted from an Ad-Hocsearch result

165Customizing Discovery AcceleratorSetting system configuration options

Page 166: Symantec Discovery Acceleratorâ„¢

Specifies whether reviewers can commit itemsfrom their research folders to the review setwithout also committing the associated reviewmarks and comments. This option is only used ifyou select "Commit All Audit History WhenCommitting An Item". By default, DiscoveryAccelerator expects users to commit the marksand comments when they commit items to thereview set.

Allow users to commit items withoutcommitting audit history

Specifies whether reviewers must commit the fullaudit history when committing items from theirpersonal folders to the review set. By default,Discovery Accelerator lets users choose theelements that they want to commit.

Commit All Audit History WhenCommitting An Item

API configuration optionsUse these settings to control how third-party tools may exchange data with yourDiscovery Accelerator database through the Discovery Accelerator applicationprogramming interface (API). For more information on the Discovery AcceleratorAPI, contact Symantec Support.

Specifies whether to enable or disable access tothe Discovery Accelerator Web service API. Bydefault, access is disabled, which means that noneof the API methods works.

API Enabled

Specifies the number of seconds that an APIcommand should wait before abandoning itsattempt to exchange data with the DiscoveryAccelerator customer database.

Database command timeout (seconds)

Specifies the Lotus Domino template (.ntf) fileto use with the GetItems API method.

Domino template file

Specifies a limit in bytes on the size of each chunkof item content that you can retrieve with theGetItem and GetItems API methods.

Maximum item chunk size (bytes)

Specifies a limit on the number of items for whichyou can retrieve information in one batch withthe GetItemList API method.

Maximum item list chunk size

Customizing Discovery AcceleratorSetting system configuration options

166

Page 167: Symantec Discovery Acceleratorâ„¢

Specifies the location in which to store itemstemporarily when they are retrieved through theAPI. By default the setting is blank, which meansthat the Windows %TEMP% folder is used. If youwant to specify an alternative folder, ensure thatthe Accelerator service account has fullpermissions on it. The folder must also haveplenty of free space.

For performance reasons, exclude the temporarystorage area from on-access virus scanning.

Temporary storage area

Specifies the frequency in minutes with which topurge stale data from the temporary storage area.The default setting is 30 minutes.

Temporary storage area cleanupinterval (minutes)

Diagnostics configuration optionsUse these settings to enable or disable the Discovery Accelerator troubleshootingfacilities.

Specifies whether to report Discovery Acceleratorperformance data, which you can view with theWindows Performance Monitor utility.

Enable performance monitor

Specifies whether to record every server actionin the event log. Tracing to the event log appliesto information events only, as DiscoveryAccelerator always records all error messages andwarning messages in the log.

Enable tracing

Specifies whether to generate search criteria filesin a SearchCriterias subfolder of yourDiscovery Accelerator installation folder on theDiscovery Accelerator server. These files, whichare in plain text and XML format, may assist theSymantec Support team when dealing withsearch-related problems. By default, DiscoveryAccelerator does not create the files.

Save Search Criteria

Specifies whether to save the XML files of theitems to commit to the database under a subfolderof the server. By default, Discovery Acceleratordoes not save the XML files.

Save XML Search Items To Commit

167Customizing Discovery AcceleratorSetting system configuration options

Page 168: Symantec Discovery Acceleratorâ„¢

Specifies whether to generate search results files(one for each Enterprise Vault archive that issearched) in aSearchResults subfolder of yourDiscovery Accelerator installation folder on theDiscovery Accelerator server. By default,Discovery Accelerator does not create the files.

Save XML Search Results

Document Conversion configuration optionsUse these settings to customize the error messages that the Review pane of theDiscovery Accelerator client may display.

Specify the error messages to display if DiscoveryAccelerator cannot display an item in the previewwindow of the Review pane. Each message cancontain up to 200 characters.

Conversion Errors

Export/production configuration optionsUse these settings to configure the output when users export or produce itemsfrom Discovery Accelerator for offline review.

Specifies whether to add an identifying Batesnumber to the file name of each exported itemthat Enterprise Vault has archived through FileSystems Archiving.

The options are as follows:

■ 0. Omit the Bates number.

■ 1. Add the Bates number to the start of the filename. This option is the default option.

■ 2. Append the Bates number to the end of thefile name.

Add Bate identifier to File Systemexports

Specifies whether to append a last-modified datestamp to the file name of each exported item thatEnterprise Vault has archived through FileSystems Archiving. By default, DiscoveryAccelerator appends the date stamp.

Always date stamp exported FileSystem items

Specifies the maximum number of attempts thatDiscovery Accelerator makes to repeat an exportrun that failed for any reason. Set the value to 0to stop Discovery Accelerator from retrying therun.

Automatic retry: Maximum retries

Customizing Discovery AcceleratorSetting system configuration options

168

Page 169: Symantec Discovery Acceleratorâ„¢

Specifies the minimum delay in minutes betweenautomatic attempts to repeat a failed export orproduction run. By default, Discovery Acceleratorwaits five minutes between retries.

Note that Discovery Accelerator multiplies thisvalue by the number of retries. So, if this value is5, the delay between retries starts at five minutesand increases to 10, 15, and so on with subsequentretries.

Automatic retry: Minimum timebetween retries (minutes)

Specifies the file name extension of the files tocreate when exporting items for viewing outsideDiscovery Accelerator. For example, you wouldspecify .xls as the extension for export files inMicrosoft Excel format.

Custom conversion extension

Specifies the name of the template file to usewhen exporting files in their custom format. Forexample, if you have created a template file forexporting items in Microsoft Excel format, youcan enter ExcelReport.xslt as the file name.

Custom conversion file

Specifies the default folder on the DiscoveryAccelerator server to use for exported items. Ifyou do not specify a default export folder,Discovery Accelerator uses the folderc:\Discovery Accelerator Export\

customer_name.

Default export folder

Specifies the ID number of the mark that you wantto set as the default current mark when youperform an export run.

Default Production mark ID

Specifies the status that you want to set as thedefault current status when you perform anexport run.

Type one of the following values:

■ 0. N/A

■ 1. Pending

■ 2. Reviewed

■ 3. Questioned

Default Production status

Specifies whether to export PST and MSG files inUnicode (Outlook 2003) format or ANSI (Outlook97-2002) format. By default, DiscoveryAccelerator exports the items in Unicode format.

Default to Unicode for PST and MSG

169Customizing Discovery AcceleratorSetting system configuration options

Page 170: Symantec Discovery Acceleratorâ„¢

Specifies the name of the file to use as a templatewhen exporting files to a Lotus Notes DatabaseTemplate (NTF) file. The default file name isaccelexp.ntf.

Domino Export Template

Specifies the name of the .id file that is used forlocal Domino authentication when exporting filesto an NTF file. The default file name isAccelerator.id.

Domino ID File

Specifies the password that is used for localDomino authentication when exporting files toan NTF file.

Domino Password

Specifies whether to enable or disable allexporting and production facilities. By default,Discovery Accelerator enables these facilities.

Enable Production threads

Lets you download, edit, and then upload an XSLstyle sheet. This style sheet serves as the templatefor all the export reports that DiscoveryAccelerator generates in HTML format.

HTML conversion file

Specifies the number of attempts that DiscoveryAccelerator makes to retrieve an item from anoffline device, such as a tape drive, before givingup. Enter a value between 1 and 1000, where thedefault is 120.

Maximum production retry for itemsstored on slow devices

Specifies the number of minutes that DiscoveryAccelerator waits between retry attempts whentrying to retrieve an item from an offline device.Enter a value between 1 and 300, where thedefault is 5.

Minimum number of minutes betweenretries for items stored on slow devices(min)

Specifies the number of threads that DiscoveryAccelerator assigns to generating reports ofexport runs. The default is 5.

Number of production report threads

Specifies the number of threads in the SQLconnection pool that are assigned to export runs.Enter a value in range 1 to 25, where the defaultis 25.

Number of Production Threads

Sets the order in which Discovery Acceleratorlists the searches when you set the criteria for anexport run. You can choose to sort the searchesby name or by run date. By default, DiscoveryAccelerator sorts the searches by name.

Production order Search by RunDate

Customizing Discovery AcceleratorSetting system configuration options

170

Page 171: Symantec Discovery Acceleratorâ„¢

Determines what you see in Microsoft Outlookwhen you import into it a Personal Folders (.pst)file that you have exported from DiscoveryAccelerator. In this case, you can set the columnname to display in Microsoft Outlook.

See “Making the export ID visible in MicrosoftOutlook” on page 162.

PST ExportID Column Name

Specifies the Outlook folder in which to place theitems after you import a Personal Folders (.pst)file that you exported from Discovery Accelerator.

PST Folder Name

Specifies the number of exported items to list ineach report file. The default is 25000.

Report chunk size

Specifies whether, when you undertake an exportrun, Discovery Accelerator prompts you to selecta PST version: Outlook 97-2002 (ANSI) or Outlook2003 (Unicode). By default, Discovery Acceleratordoes not display the prompt.

Show PST version option on export run

Specifies whether, when you initiate an exportrun or production run, Discovery Accelerator firstopens the Review pane. This facility lets youbrowse the items before you proceed with the run.By default, Discovery Accelerator does not displaythe Review pane.

Show review page on export

Lets you download, edit, and then upload an XSLstyle sheet. This style sheet serves as the templatefor all the export reports that DiscoveryAccelerator generates in tab-separated format.

TAB Conversion file

General configuration optionsUse these settings to configure general Discovery Accelerator options.

In areas of Discovery Accelerator where you selectan Active Directory account, specifies whether toshow any accounts whose names end with thecharacter $. By default, Discovery Acceleratorshows these accounts.

Hide Active Directory accounts endingwith '$' in account selector

171Customizing Discovery AcceleratorSetting system configuration options

Page 172: Symantec Discovery Acceleratorâ„¢

When you filter items by search, specifies whetherto omit from the list those searches that failed tocapture any items. By default, DiscoveryAccelerator shows these searches.

List searches without sampled hits infilters

Specifies the order in which to display the firstand last names of employees. By default, the firstname precedes the last name. You may want touncheck this option when working in countrieswhere the names are typically reversed, such asJapan.

Show First Name followed by Last Name

Specifies whether to hide or show the CustomerProperties link in the Application pane. By default,Discovery Accelerator shows the link.

Show System Explorer

Home Page configuration options

Sets a limit on the number of cases that users canchoose to list in the home page of the application.The default is 10.

Maximum number of cases to show onhome page

Sets a limit on the number of export runs thatDiscovery Accelerator can list in the home pageof the application. The default is 30.

Maximum number of exports to showon home page

Sets a limit on the number of searches thatDiscovery Accelerator can list in the home pageof the application. The default is 30.

Maximum number of searches to showon home page

Specifies the maximum age of the data thatDiscovery Accelerator can display for tasks in thehome page of the application. The default is 30days.

Maximum task age (days) to show onhome page

Specifies whether to list individual researchfolders on the Discovery Accelerator home page.By default, Discovery Accelerator lists the folders.

Show Folders on Home Page

Specifies whether reviewers can see the statisticsfor other reviewers on the home page of theapplication. By default, all reviewers can see thesestatistics.

Show Reviewers' statistics to reviewers

Customizing Discovery AcceleratorSetting system configuration options

172

Page 173: Symantec Discovery Acceleratorâ„¢

Item Prefetch Cache configuration optionsUse these settings to configure the Discovery Accelerator prefetch cachemechanism. This mechanism retrieves and caches items from the vault storeduring a scheduled window every night, instead of retrieving each item when theuser chooses to review it. The cache therefore helps to speed up the rendering ofitems in the Review pane. You can specify the size, location, and othercharacteristics of the cache.

To optimize performance in an environment where you review items veryintensively, we recommend the following:

■ Use the fastest storage available and set aside a full partition so that there isno competition for I/O.

■ Set the maximum size within the cache to match the partition size.

■ Set the cache to 365 days before expiry.

■ Set the cache to retrieve the full items with HTML and MSG. If you do not needto export the items, you can choose to retrieve the items with HTML only.

The Item Prefetch Cache options are the more commonly used cache options. Youcan also set the Item Prefetch Cache (Advanced) options.

Specifies whether to enable or disable the prefetchcache. By default, Discovery Accelerator disablesthe cache. Therefore, prefetching does not occurand the cache is not used for item retrieval, evenif there are items in the cache. Only enable thecache for a Discovery Accelerator database inwhich you actively review items or where youconnect to slow storage for export runs.

We recommend that you do not enable theprefetch cache in any databases that you useprimarily for legal hold searches. This generatesa lot of unnecessary network traffic and consumesstorage space.

Note that the cache is either enabled or disabledfor an entire database.

Cache enabled

173Customizing Discovery AcceleratorSetting system configuration options

Page 174: Symantec Discovery Acceleratorâ„¢

Specifies the local path or network share path tothe folder in which to store the cache. Within thisfolder, Discovery Accelerator stores theprefetched files in a subfolder that is calledAcceleratorPrefetch_CustomerId.

Note the following:

■ We recommend that you specify a local path,where possible. If you must specify a networkshare path, always use the UNC path ratherthan a mapped drive.

■ The folder must already exist; DiscoveryAccelerator does not create it.

■ In a hosting environment, multiple customersmust not share the same folder.

Cache location

Specifies the number of days for which items canremain in the cache before Discovery Acceleratorautomatically deletes them. The item age is basedon the creation time of the file in the cache, andnot the time that Discovery Accelerator capturedthe item or the time that the item was originallysent. The default age is 5 days.

Discovery Accelerator may remove an item fromthe cache earlier than the maximum item age ifthe cache becomes full.

Cache maximum item age (days)

Specifies the maximum size of the cache inmegabytes (MB). The default is 1000 MB. Thelarger the value of the "Cache maximum item age(days)" setting, the higher the cache maximumsize must be to accommodate the items.

Cache maximum size (Mbytes)

Specifies the time of day at which DiscoveryAccelerator stops prefetching items. The defaultis 05:00 A.M. Use this setting with "Startprefetching time of day" to determine the hoursof the day that prefetching is active. Configuringa period during which caching does not occur letsyou undertake other maintenance activitiesduring this period, such as performing EnterpriseVault backups.

To make prefetching active at all times, set thisoption and "Start prefetching time of day" to thesame time.

End prefetching time of day

Customizing Discovery AcceleratorSetting system configuration options

174

Page 175: Symantec Discovery Acceleratorâ„¢

Specifies the time of day at which DiscoveryAccelerator starts to prefetch items. The defaultis 20:00 P.M. Use this setting with End prefetchingtime of day to determine the hours of the day thatprefetching is active. Configuring a period duringwhich caching does not occur lets you undertakeother maintenance activities during this period,such as performing Enterprise Vault backups.

To make prefetching active at all times, set thisoption and "End prefetching time of day" to thesame time.

Start prefetching time of day

Item Prefetch Cache (Advanced) configuration optionsThese settings provide additional, advanced options for configuring the DiscoveryAccelerator prefetch cache functionality. Use these settings with the Item PrefetchCache options.

Specifies whether to encrypt files before they arestored in the cache. By default, DiscoveryAccelerator does not encrypt the cache.

Cache encrypted

Specifies the time of day at which DiscoveryAccelerator performs cache housekeeping(primarily removing old items). The default timeis midnight (00:00).

Cache purge time of day

Excludes from the cache those captured itemsthat are older than the specified number of days.The default is 3 days. This setting only has animpact when prefetching is first turned on, or ifit has been disabled for some time and is thenreenabled.

Maximum capture age (days)

Specifies the maximum number of times thatDiscovery Accelerator tries to prefetch an itembefore giving up. The default is 10.

Maximum item fetch attempts

175Customizing Discovery AcceleratorSetting system configuration options

Page 176: Symantec Discovery Acceleratorâ„¢

Sets a limit on the size of items and parts of itemsthat Discovery Accelerator can prefetch. If anitem or part of an item exceeds this limit, it isignored. The default is 10 MB. For example,Discovery Accelerator still prefetches an itemthat has multiple attachments, none of which isbigger than 10 MB, even though the combinedsize of the attachments may greatly exceed the10 MB limit.

Maximum item size to store in cache(bytes)

Specifies the number of minutes that DiscoveryAccelerator waits between attempts to prefetchitems. The default is 30 minutes. Use this settingwith "Maximum item fetch attempts" to configureretry behavior for failed fetches.

Minimum time between item fetchretries (minutes)

Specifies whether to prefetch the attachments toitems. By default, Discovery Acceleratorprefetches attachments. Note that attachmentsof nested items are not prefetched.

Prefetch attachments

Specifies whether to render attachments as HTMLwhen prefetching them. By default, DiscoveryAccelerator prefetches attachments as HTML.

Prefetch attachments as HTML

Specifies whether to prefetch the items that usershave captured with an immediate, unscheduledsearch. By default, Discovery Accelerator doesnot prefetch these items.

Prefetch immediate search items

Specifies whether to prefetch items in theiroriginal, native format. By default, DiscoveryAccelerator does not prefetche the items in theirnative format. However, if your policy is to reviewitems in their original format then you shouldenable this feature.

Prefetch Native format

Specifies whether to prefetch the items that usershave placed in personal folders through ad hocsearches. By default, Discovery Acceleratorprefetches these items.

Prefetch research items

Specifies whether to prefetch the items that usershave captured with a scheduled search. By default,Discovery Accelerator prefetches the items.

Note that items are only prefetched when thesearch is accepted, so this option works best whenscheduled searches are set to auto-accept.

Prefetch scheduled search items

Customizing Discovery AcceleratorSetting system configuration options

176

Page 177: Symantec Discovery Acceleratorâ„¢

Specifies whether to prefetch the items that usershave captured with a search. You can furthercontrol this facility with the "Prefetch immediatesearch items" and "Prefetch scheduled searchitems" options. By default, Discovery Acceleratorprefetches the items.

Prefetch search items

Specifies whether to prefetch the XML structureof an item. This structure defines the parts of theitem and includes a list of attachments (but notthe attachments themselves). The XML structureis used for the preview pane in the Review pane.An XSL transform is applied to the XML to convertit to HTML. By default, Discovery Acceleratorprefetches the XML structure.

Prefetch XML structure

Specifies whether to prefetch the items for reviewin HTML format. By default, DiscoveryAccelerator prefetch the items in this format.

Prefetching the items improves reviewperformance because Discovery Accelerator doesnot need to perform the rendering from XML toHTML at review time. The benefits of this aremost likely to be noticeable on a system wheremany reviewers work concurrently.

Render HTML for message review

Specifies whether to prefetch the printableversions of items in HTML format. By default,Discovery Accelerator does not prefetch the itemsin HTML format. However, it is advisable tochange the setting if you expect to use theprintable view functionality regularly.

Render printable HTML

Specifies how long Discovery Accelerator keepsrecords of repeated, failed attempts to prefetchitems. The default is 30 days.

Retry record retention period (days)

Legal Hold configuration optionsUse these options to control how Discovery Accelerator places and releases holdson the items in a case. You may want to place a hold on items to stop users fromdeleting them from their Enterprise Vault archives.

177Customizing Discovery AcceleratorSetting system configuration options

Page 178: Symantec Discovery Acceleratorâ„¢

Specifies whether to allow case administrators toplace a hold on the items in their cases, so thatthose items cannot be deleted. By default,Discovery Accelerator enables the legal holdfunctionality.

Enable Legal Hold

Specifies whether, when you define the propertiesfor a new case, the option to put items on hold isautomatically checked.

Enable Legal Hold on new case

Specifies the frequency in seconds with whichDiscovery Accelerator checks for case items toplace on legal hold or release from hold. Thedefault frequency is 30 seconds.

Legal Hold thread checking period (sec)

Specifies the maximum number of times thatDiscovery Accelerator tries to place a legal holdon an item before giving up. The default numberis 2.

Maximum Legal Hold Retry

Specifies the number of threads with whichDiscovery Accelerator places or removes legalholds on items. The default number is 10.

Number of Legal Hold Threads

Specifies the maximum number of items to placeon hold concurrently. The default number is 1000.

Placing hold items Batch Size

Specifies the maximum number of items to releasefrom hold concurrently. The default number is1000.

Removing hold items Batch Size

Message Counts configuration optionsUse these settings to customize the counts of items in the Discovery Acceleratorhome page. You can choose a color for each type of count and specify an identifyingprefix for it.

For settings where you can specify a color, type a color name (for example, “Blue”)or red-green-blue value in hexadecimal format (for example, “#0000FF”).

Specifies the color with which to identify thecount of Pending items on the home page. Thedefault is orange.

Pending Color

Specifies one or more identifying, alphanumericcharacters with which to precede the count ofPending items on the home page.

Pending Prefix

Customizing Discovery AcceleratorSetting system configuration options

178

Page 179: Symantec Discovery Acceleratorâ„¢

Specifies the color with which to identify thecount of Questioned items on the home page. Thedefault is red.

Questioned Color

Specifies one or more identifying, alphanumericcharacters with which to precede the count ofQuestioned items on the home page.

Questioned Prefix

Specifies whether to show the Pending andQuestioned counts on the home page. By default,Discovery Accelerator does not show these counts.

Show Extra Counts

Specifies whether to set the Pending andQuestioned counts on the home page in normalor bold text. By default, Discovery Acceleratorsets the counts in normal text.

Show Extra Counts Bold

Specifies whether to display a key of the colorsand prefixes used to identify the Unreviewed,Pending, and Questioned counts on the homepage. By default, if you have chosen to show theextra counts, Discovery Accelerator shows thekey.

Show Extra Counts Key

Specifies whether to show a prefix before eachcount on the home page.

Show Extra Counts Prefix

When all the items in a review set have beenreviewed, specifies whether to indicate this fact.By default, Discovery Accelerator does not showthe zero count.

Show Zero Unreviewed

Specifies the color with which to identify thecount of Unreviewed items on the home page. Thedefault is black.

Unreviewed Color

Specifies one or more identifying, alphanumericcharacters with which to precede the count ofUnreviewed items on the home page.

Unreviewed Prefix

Policy Integration configuration optionsUse these settings to integrate Discovery Accelerator with the Enterprise VaultAutomatic Classification Engine.

179Customizing Discovery AcceleratorSetting system configuration options

Page 180: Symantec Discovery Acceleratorâ„¢

When you preview an item that has no associatedpolicies in the Review pane, specifies whether toshow the Policy field above the item. By default,Discovery Accelerator hides this field when thereare no associated policies.

Always show policy display in reviewgrid

When you preview an item in the Review pane,specifies the order in which to list the associatedpolicies in the banner above the item. Enter oneof the following values:

■ 0. The policies are not sorted.

■ 1 (default). Discovery Accelerator first groupsthe policies by policy type (inclusion,exclusion, and category) and then sorts themalphabetically within each type.

■ 2. The policies are sorted alphabetically,regardless of policy type.

Changing the sort order does not affect the itemsthat are already in the Accelerator database; onlynewly-added items are affected.

Sort Policies within type

Profile Synchronization configuration optionsUse these settings to control how Discovery Accelerator synchronizes employeeprofiles with the corresponding Active Directory or Domino directory accounts.

Specifies whether Discovery Accelerator shouldautomatically deactivate those employee profilesfor which it cannot find a corresponding ActiveDirectory or Domino directory account.

Automatically detect deleted profilesand mark them as deactivated

Specifies a domain to add to a user nameautomatically when synchronizing employeeswith Domino accounts.

Default Domino domain when creatingprofiles

Specifies the name of the default Domino LDAPserver to use when you browse for new users toadd to your Discovery Accelerator system.

Default Domino server when browsingfor users

Stops you from choosing any Domino LDAP serverother than the default server when you browsefor new users to to your Discovery Acceleratorsystem. By default, Discovery Accelerator lets younominate any Domino server.

Force users to use the default Dominoserver when browsing for users

Customizing Discovery AcceleratorSetting system configuration options

180

Page 181: Symantec Discovery Acceleratorâ„¢

Specifies the number of days after whichDiscovery Accelerator should automaticallydeactivate those employee profiles for which itcannot find a matching Active Directory orDomino directory account.

Minimum days to wait before profilesare deactivated

Specifies the number of times that DiscoveryAccelerator should fail to synchronize anemployee profile with the corresponding ActiveDirectory or Domino directory account before itdeactivates the profile.

Minimum number of failedsynchronizations before deactivatingprofiles

Specifies the number of threads that DiscoveryAccelerator employs when it synchronizesemployee profiles with the corresponding ActiveDirectory or Domino directory accounts. Enter avalue in the range 1 through 5, where the defaultis 1.

Number of synchronization threads

Specifies whether Discovery Accelerator deletesthe email addresses in an employee profile beforeit synchronizes the profile with Active Directoryor a Domino directory. By default, DiscoveryAccelerator does not delete the addresses. This isbecause you may still want to perform searchesthat use old email addresses, or you may haveentered some additional email addressesmanually.

Discovery Accelerator does not delete the emailaddresses in the profile if synchronization failsfor any reason.

Remove addresses that do not exist inDomino or Active Directory

Specifies the frequency in hours with whichDiscovery Accelerator synchronizes employeeprofiles with the corresponding Active Directoryor Domino directory accounts. Enter a value inthe range 1 through 24. The default is every eighthours and every time the Accelerator Managerservice starts.

Synchronization interval (hours)

Specifies whether Discovery Accelerator shouldattempt to synchronize employees and groupswith the corresponding Active Directory orDomino directory accounts. The default is to doso.

Synchronize profiles

181Customizing Discovery AcceleratorSetting system configuration options

Page 182: Symantec Discovery Acceleratorâ„¢

Specifies the number of minutes to wait after theAccelerator Manager service starts beforesynchronizing employees and groups with ActiveDirectory or a Domino directory. Enter a value inthe range 0 through 720. By default, the servicedoes not wait before synchronizing.

When service starts wait beforesynchronizing (minutes)

Reporting configuration optionsUse this setting to configure the Reports pane, which shows the status of recentlygenerated reports.

Specifies the frequency in seconds with whichDiscovery Accelerator refreshes the Reports pane.Enter a value between 1 and 300, where thedefault is 10.

Reports page refresh time

Reviewing configuration optionsUse these settings to configure the Review pane.

Specifies the default number of items to show inthe Review pane. Enter a value in the range 1through 1000, where the default is 100.

Default Page Size

Specifies how to show the available marks in theReview pane: as clickable options across thebottom of the page, or in a drop-down list. Bydefault, Discovery Accelerator shows the marksas clickable options rather than as options in adrop-down list .

Display Marking List

Customizing Discovery AcceleratorSetting system configuration options

182

Page 183: Symantec Discovery Acceleratorâ„¢

Specifies the path to the folder in whichtemporarily to store the items that you retrieveby using the Enterprise Vault ContentManagement API. By default, DiscoveryAccelerator uses the Windows %TEMP% folder.

Note the following:

■ We recommend that you specify a local path,where possible. If you must specify a networkshare path, always use the UNC path ratherthan a mapped drive.

■ The folder must already exist; DiscoveryAccelerator does not create it.

■ In a hosting environment, multiple customersmust not share the same folder.

ECM Temporary Storage Area

Specifies the frequency in minutes with which topurge stale data from the temporary storage area.The default value is five minutes.

ECM Temporary Storage Area CleanupInterval (Minutes)

Provides a comma-separated list of the filteroptions that are not available to users in theReview pane. The available options are as follows:

author, authoraddress, authordomain,authorname, capturedate, commentid, direction,extension, ingestionstatus, legalstatus, maildate,markingid, markstatusid, numattachments,policyaction, policyid, recipientaddress,recipientdomain, recipientname, reviewerid,ruleid, scheduledsearchid, searchid, size, tagid,tagruleid, type

Facets To Hide

Specifies the color with which to identify theitems in a research folder that already exist in theassociated review set. The default color is red.

Folder item color when it exists in thereview set

Specifies the background color with which tohighlight instances of search terms in HTMLrenderings of items. You can enter a color name,such as “Yellow” (the default color), or ared-green-blue color value, such as “#FFFF00”.

Highlight Background Color

Specifies the foreground color with which tohighlight instances of search terms in HTMLrenderings of items. You can enter a color name,such as “Black” (the default color), or ared-green-blue color value, such as “#000000”.

Highlight Foreground Color

183Customizing Discovery AcceleratorSetting system configuration options

Page 184: Symantec Discovery Acceleratorâ„¢

Specifies whether to enable or disable searchhighlighting in HTML renderings of items. Setthe value to 1 (the default) if you want to highlightinstances of search terms in items, or to 0 todisable highlighting.

Hit Highlighting Type

Specifies whether to enable or disable itemlocking. By default, Discovery Accelerator enablesitem locking so that only one user at a time canlook at an item.

Item Unlocking Thread

Specifies the subject line to assign to the itemsthat do not have a subject line. The default is “NoTitle”.

Label for messages without a subject

Sets a limit on the number of items that users cantemporarily assign to themselves while theyreview. The default is 10000.

Maximum items user can temporarilyself-assign

Specifies the maximum number of items to liston a page within a review set. Enter a valuebetween 1 and 300, where the default is 300.

Maximum Page Size

Lets you download and upload an XML file withwhich to define the column layout in the Reviewpane for all users.

See “Customizing the columns in the Reviewpane” on page 192.

Review Grid File

Specifies the number of minutes of inactivity afterwhich a user's review set expires. The defaultvalue is 120 minutes.

Review Set Expiry Time (Minutes)

Specifies whether to preprocess HTML itemsbefore review to remove any script that may causenavigation problems. By default, DiscoveryAccelerator preprocesses the items.

Sanitize HTML for review

Specifies the number of seconds within whichDiscovery Accelerator must build a review set orsort a review set before the process times out. Thedefault is 300.

Timeout for building or sorting reviewset (seconds)

Search configuration optionsUse these settings to optimize the search features in Discovery Accelerator.

Customizing Discovery AcceleratorSetting system configuration options

184

Page 185: Symantec Discovery Acceleratorâ„¢

Specifies whether, when you set the criteria fora new search, you can choose to includepreviously-captured items in the search results.By default, you have the option to do so.

Allow search and capture of existingitems

When you select a schedule to use when youdefine the criteria for a new search, you can selectSince last run in the Date range section. Thisoption instructs Discovery Accelerator to searchnew items that have arrived since you last ranthis scheduled search. In the Start box, you enterthe date to be taken as a starting point for thefirst run of the search.

By default, Since last run searches from the dateof the last run (or the Start date for the firstsearch) to the current day minus 1 (that is, up toyesterday). If required, you can change thisinterval to search to the current day minusndays.To use Since last run with any searches that runmore than once a day, set the interval to 0.

Buffer Since Last Run

Specifies the tag with which DiscoveryAccelerator prefixes custodian groups when youenter them in the criteria for a new search. Thedefault is CG.

Custodian GroupTag

Specifies the tag with which DiscoveryAccelerator prefixes custodian names when youenter them in the criteria for a new search. Thedefault is C.

CustodianTag

Specifies the custom search attributes to use inXML form.

Custom search attributes XML

Specifies whether the lines within search fieldscan solely contain search terms that have a NOToperator (-). By default, every line within thesearch fields must have at least one search termthat does not have this operator.

Disallow negative lines in search fields

Specifies whether you can define custom searchattributes and select them when defining thecriteria for a search. By default, you can defineand select these attributes.

Enable custom search attributes

Specifies whether to enable or disable all searchfacilities. By default, Discovery Acceleratorenables these facilities.

Enable Search Threads

185Customizing Discovery AcceleratorSetting system configuration options

Page 186: Symantec Discovery Acceleratorâ„¢

Specifies whether the search of a particulararchive returns an error if its index is offline,rebuilding, or failed. By default, DiscoveryAccelerator returns an error in thesecircumstances.

Error search if index is rebuilding orfailed

Specifies whether the search of a particulararchive returns an error if its index has failed toindex either an indexable archived item or thecontent of the item. The default setting is false(not enabled).

Error search if missing items or content

Specifies whether the search of a particulararchive returns an error if its index must berebuilt to handle full-width characters correctly.The default setting is Off.

Error search if index requires widthnormalization

Specifies the index attribute information to usein XML form.

Index Attribute Info

For areas of Discovery Accelerator that listsearches from which you can choose, specifiesthe maximum number of searches to include inthe list. The default is 250.

Maximum number of searches listed infilters

Specifies the number of times that DiscoveryAccelerator tries to search an archive beforegiving up. Enter a value in the range 1 through50, where the default is 5.

Maximum Search Retries

Specifies the number of threads that are assignedto accepting search result sets. For example, thedefault setting of 5 means that no more than fivesearch results sets are accepted at a time. Entera value in the range 1 through 10.

Number of acceptance search Threads

Specifies the number of threads that are assignedto deleting search result sets. For example, thedefault setting of 2 means that no more than twosearch results sets are deleted at a time. Enter avalue in the range 1 through 10.

Number of delete search Threads

Specifies the number of threads that are assignedto sampling search result sets. For example, thedefault setting of 5 means that no more than fivesearch results sets are sampled at a time. Enter avalue in the range 1 through 10.

Number of sampling search Threads

Customizing Discovery AcceleratorSetting system configuration options

186

Page 187: Symantec Discovery Acceleratorâ„¢

Specifies the number of threads that are assignedto searching archives per index server. Forexample, the default setting of 10 means that nomore than 10 archives are searched per EnterpriseVault server at a time. Enter a value in the range1 through 10.

Number of Vault search Threads

Specifies whether, when you click multiple itemsin the Review pane and then click Search,Discovery Accelerator lets you specify the searchcriteria for each of the selected items or only forthe first of the selected items.

Only allow 'Research this message' onthe first selected message

When set to True, improves performance byexcluding from a search those archives thatDiscovery Accelerator has determined do notcontain any items in the date range that you havespecified in your search criteria. The defaultsetting is False, which means that DiscoveryAccelerator searches all the available archives,regardless of whether their contents fall withinyour specified date range or not.

Use this setting with "Synchronize threadchecking period (sec)", which is one of the VaultDirectory Synchronization page settings. If youset "Optimize search based on oldest and youngestitems" to true, you must lower the setting for"Synchronize thread checking period (sec)" toensure that Discovery Accelerator does not runsearches against out-of-date data. For example,you can lower the setting to 3600 seconds (1 hour).

Optimize search based on oldest andyoungest items

When accepting the results of a search, specifieswhether to override the marks that are assignedto items that already exist in the review set. Itemsthat you have already produced are exempt.

Override Marks when acceptingsearches

For items that have previously appeared in othercases, specifies whether to respect any explicitlyassigned marks but override all other marks.

Override Marks when acceptingsearches only If Not Marked

Specifies whether it is mandatory to enter thedesignated criteria before you can perform asearch. By default, these criteria are optional.

Require 'Author' / 'Content' / 'FromDate' / 'Recipients' / 'Subject' / 'To Date'to be specified

187Customizing Discovery AcceleratorSetting system configuration options

Page 188: Symantec Discovery Acceleratorâ„¢

Specifies the frequency in minutes with whichDiscovery Accelerator tries to access anEnterprise Vault Indexing service that is too busyto perform a search. Enter a value in the range 1through 300, where the default is 5.

Retry time when index service is busy(min)

Specifies the frequency in minutes with whichDiscovery Accelerator tries to access anEnterprise Vault Indexing service that isunavailable. Enter a value in the range 1 through300, where the default is 5.

Retry time when index service notrunning (min)

Specifies whether searches return the top-levelitems only. Setting this option to Off means thatall files attached to the top-level items aredisplayed in search results.

Return only top messages in searchresults

For items that were archived using File SystemArchiving (FSA), specifies whether to show theSMTP message subject rather than the FSA filename in the Review pane.

Save SMTP subject rather thanfilename

Specifies the frequency in seconds with whichDiscovery Accelerator refreshes the resultssummary page during a running search. Enter avalue in the range 1 through 300, where thedefault is 10.

Search result page refresh time

Specifies the frequency in seconds with whichDiscovery Accelerator refreshes the Searchespane for a case. Enter a value in the range 1through 300, where the default is 20.

Searches page refresh time

Specifies whether users can access the Reviewpane while a search is in progress, so that theycan immediately start to review the items thatDiscovery Accelerator has found. By default,Discovery Accelerator permits this.

Show Search Result In Progress

Specifies the tag with which DiscoveryAccelerator prefixes target groups when you enterthem in the criteria for a new search. The defaultis TG.

TargetGroupTag

Specifies the tag with which DiscoveryAccelerator prefixes target names when you enterthem in the criteria for a new search. The defaultis T.

TargetTag

Customizing Discovery AcceleratorSetting system configuration options

188

Page 189: Symantec Discovery Acceleratorâ„¢

Specifies the number of seconds after whichDiscovery Accelerator abandons attempts to listand sort the items in the Review pane.

Timeout for building or sorting reviewset (seconds)

Specifies the maximum number of search resultsworker threads that are allowed to run on thesystem. These threads handle the processing ofsearch results returned from the archive. Themaximum value is 5, and the default is 2.

Total number of search results workerthreads

Specifies the maximum number of search threadsthat are allowed to run on the system across allindex volumes. The maximum value is 500, andthe default is 100.

Total number of search threads

Optimizes performance for searches that returnmore than 50,000 results. By default, this optionis disabled.

Use sequence number for searches

Specifies the number of minutes that DiscoveryAccelerator waits at startup before synchronizingwith available index services. Enter a value in therange 0 through 300, where the default is 0.

When service starts, wait beforesynchronizing Index Services (minutes)

Specifies the number of minutes that DiscoveryAccelerator waits at startup before searching thearchives for items. Enter a value in the range 0through 300, where the default is 0.

When service starts, wait beforestarting Vault Searches (minutes)

189Customizing Discovery AcceleratorSetting system configuration options

Page 190: Symantec Discovery Acceleratorâ„¢

Security configuration options

When selected, makes the SystemAdmin logonthe creator and owner of Discovery Acceleratorsearch schedules.

If you want to lock down your SQL Serverinstance, uncheck this setting and then do thefollowing in the order listed:

■ Add the Vault Service account to the msdbdatabase.

■ Give the Vault Service account Selectpermissions on the following msdb tables:sysjobs, sysjobschedules, sysjobsteps, andsysschedules.

■ Give the Vault Service account Executepermissions on the msdb stored proceduresp_add_category.

■ Assign the database role SQLAgentUserRoleto the Vault Service account.

See “Assigning the permissions and roles requiredto create search schedules” on page 27.

Use SQL Server 2005 SystemAdminServer Role for Schedules

System configuration optionsUse these options to record the dates on which you installed Enterprise Vault andbegan to archive data, configure the threads that Discovery Accelerator uses topause searches, and more.

Specifies the date on which Enterprise Vaultarchived the oldest available data.

If the oldest archived item date and V5installation date are the same then, when enteringthe criteria for a search, you can specify themessage type without also specifying a start date.(Discovery Accelerator does not return any pre-5.0data.) However, if the oldest archived item dateis earlier than the V5 installation date, you canonly specify the message type if you specify a startdate that is on or after the V5 installation date.

Enterprise Vault Oldest Archived ItemDate

Specifies the date on which you first installed orupgraded Enterprise Vault 5.0 or later.

Enterprise Vault V5 Installation Date

Customizing Discovery AcceleratorSetting system configuration options

190

Page 191: Symantec Discovery Acceleratorâ„¢

Identifies the application pool in which theAccelerator Web applications are grouped.Application pools allow specific configurationsettings to be applied to groups of applications,and the worker processes servicing thoseapplications. The default application pool isEVAcceleratorAppPool.

IIS Application Pool

Specifies the maximum number of searches thatyou can pause instantly. The default is 2.

Initial Pausing Queue Size

Specifies the number of threads that are assignedto pausing searches. Enter a value in the range 1through 10, where 1 is the default value.

Number Of Pause Search Threads

Specifies the number of minutes that DiscoveryAccelerator waits at startup before it initializesthe threads that are assigned to pausing searches.By default, Discovery Accelerator does not delaybefore it initializes the threads.

Pause Threads Delay

Specifies the number of seconds to wait beforestarting pause threads. The default is 5.

Search Pause Thread Checking Period(Sec)

Vault Directory Synchronization configuration optionsUse these settings to configure when Discovery Accelerator synchronizes withthe Enterprise Vault archives.

Specifies the maximum number of EnterpriseVault archives to display on a single page duringarchive selection. By default, DiscoveryAccelerator lists a maximum of 100 archives. Ifthe number of available archives exceeds thevalue that you specify here, Discovery Acceleratordisplays some extra hyperlinks so that you canpage through the archives.

Archive selection page size

191Customizing Discovery AcceleratorSetting system configuration options

Page 192: Symantec Discovery Acceleratorâ„¢

Specifies whether, when a new vault store iscreated, Discovery Accelerator automaticallyincludes it in searches.

The options are as follows:

■ 1. New vault stores are never automaticallyenabled.

■ 2. New vault stores are always automaticallyenabled.

■ 3 (default value). New vault stores areautomatically enabled when all the other vaultstores in the same site are already enabled.

Automatically enable new Vault Storesin departments/cases

Specifies whether to synchronize all the archiveswhen running a new search. By default, DiscoveryAccelerator does not synchronize all the archives.

Synchronize archives on search

Specifies whether to synchronize all the retentioncategories when running a new search. By default,Discovery Accelerator does not synchronize allthe retention categories.

Synchronize Retention Categories onsearch

Specifies the frequency in seconds with whichDiscovery Accelerator synchronizes with theEnterprise Vault archives. The default is 21600(six hours).

The more frequently synchronization occurs, thegreater the load on the Discovery Acceleratordatabase. However, if the synchronization is notfrequent enough, Discovery Accelerator may takea long time to recognize new archives, vaultstores, and retention categories.

Synchronize thread checking period(sec)

Specifies whether to synchronize the vault storeswhen displaying the properties page for a case.By default, Discovery Accelerator does notsynchronize the vault stores.

Synchronize Vault Stores when viewingDepartment/Case properties

Customizing the columns in the Review paneEach reviewer can hide or show columns in the item list of the Review pane byright-clicking the column header and then clicking Select Columns. The reviewercan also change the column order by dragging and dropping the column headers.However, the changes that a reviewer makes in these ways are available to thatreviewer only.

Customizing Discovery AcceleratorCustomizing the columns in the Review pane

192

Page 193: Symantec Discovery Acceleratorâ„¢

If you want to customize the column layout in the Review pane for all DiscoveryAccelerator users, you must set up an XML configuration file. Note that reviewerscan still change their column layout on the Review pane by using the SelectColumns menu and drag and drop.

Table 15-2 lists the columns that you can display and the name to use when yourefer to the column in the XML file.

Table 15-2 How the column headers are identified in the XML file

Default visibilityName to use in XML fileColumn header in Reviewpane

TrueNeedCommittingModified

TrueAttachmentsAttachments

FalsePolicyActionPolicy action

TrueCommentPresentComment present

TrueFromFrom

FalseToAll recipients

TrueSubjectSubject / Filename

TrueDateDate

TrueStatusAction status

FalseReviewerPrincipalNameLast reviewed by

TrueMessageTypeMessage type

FalseMessageDirectionMessage direction

FalseDiscoveredItemIDItem ID

FalseCommentComment

FalseCommentPrincipalNameLast comment by

FalseMarkMark

FalseTagSummaryTag summary

FalseKVSVaultNameArchive

FalseItemPathOriginal Location

193Customizing Discovery AcceleratorCustomizing the columns in the Review pane

Page 194: Symantec Discovery Acceleratorâ„¢

To configure the default column layout in the Review pane

1 Start the Discovery Accelerator client, if you have yet to do so.

See “Opening the Discovery Accelerator client” on page 45.

2 Click the Configuration tab in the Discovery Accelerator client, and thenclick the Settings tab.

3 Expand the Reviewing section to show the available options.

4 In the Review Grid File row, click Save as.

5 Select a location in which to store the review grid file.

6 Open the review grid file in a text editor such as Windows Notepad.

7 Edit the file as necessary, using the information at the start of the file to guideyou.

Each column that you want to display must have the attributevisible='true'. This is either because you have specified the attribute inthe configuration file or because true is the default setting for the column.The order of the configuration lines determines the left-to-right order of thecolumns in the Review pane.

The XML file must contain at least one configuration line between the<reviewgrid> and </reviewgrid> tags.

8 Save the file.

9 In the Review Grid File row on the System Configuration tab, click Browse.

10 Select the XML file that you want to import.

11 Click Open at the right of the row to save the changes that you have made.

12 Click Apply at the bottom right of the window.

13 Start a new Discovery Accelerator session to see the column changes.

Customizing Discovery AcceleratorCustomizing the columns in the Review pane

194

Page 195: Symantec Discovery Acceleratorâ„¢

Troubleshooting

This appendix includes the following topics:

■ Installation problems

■ Problems when running Discovery Accelerator

Installation problemsThis section provides guidelines on how to deal with some problems that you mayencounter when you install Discovery Accelerator.

Enterprise Vault Accelerator Manager service not createdIf the installation program is unable to create the Enterprise Vault AcceleratorManager service on the Discovery Accelerator server, you may need to create itmanually.

To create the Enterprise Vault Accelerator Manager service manually

1 In Windows Explorer, search the folders under your .NET Frameworkinstallation for the file InstallUtil.exe.

2 Open a Command Prompt window.

3 Change to the folder that contains InstallUtil.exe.

4 Run the following command:

InstallUtil "InstallFolder\AcceleratorManager.exe"

where InstallFolder is the path to the folder in which you installed theDiscovery Accelerator server software.

AAppendix

Page 196: Symantec Discovery Acceleratorâ„¢

5 If the command fails, and you have more than one copy of InstallUtil.exe,try the same command with each of the other copies.

6 If service creation still fails, reinstall the .NET Framework and then type thecommand again using the newly installed copy of InstallUtil.exe.

Home page of a Discovery Accelerator Web site not foundIf you receive the message “Page Cannot Be Displayed” when you browse to thehome page of a Discovery Accelerator Web site, start IIS Manager and then checkthe following:

■ The virtual directories have been created.

■ The Web sites are running.

■ The virtual directory is configured to use ASP.NET 2.0 rather than an earlierversion.

If the installation program failed to create the virtual directory as part of theinstallation process, you can create it manually.

To create the virtual directory manually

1 Open IIS Manager on the server that is hosting the Web site.

2 Right-click the container for your default Web site and then click New >Virtual Directory.

3 When the Virtual Directory Creation Wizard appears, click Next.

4 For the virtual directory alias, type one of the following, and then click Next.

For the Accelerator Manager Web siteEVBAAdmin

For the Custodian Manager Web siteEVBACustodianManager

5 For the Web site home directory, enter the path to the appropriate subfolderof the Discovery Accelerator program folder (AcceleratorAdminWeb orCustodianManagerWeb), and then click Next.

6 When you are prompted to set the access permissions for the virtual directory,click Next without changing the default permissions.

7 Click Finish to close the wizard and create the virtual directory.

TroubleshootingInstallation problems

196

Page 197: Symantec Discovery Acceleratorâ„¢

To configure the settings for the virtual directory

1 Open IIS Manager on the server that is hosting the Web site.

2 Right-click the EVBAAdmin or EVBACustodianManager virtual directory, andthen click Properties.

3 On the Virtual Directory tab, do not change the default selections (Read,Log visits and Index this resource). However, do remove the entry in theApplication name box and ensure that the application pool is set toEVAcceleratorAppPool.

4 On the Documents tab, remove all the entries in the Enable default contentpage box, and then add Login.aspx.

5 On the Directory Security tab, click Edit under Authentication and accesscontrol.

6 In the Authentication Methods dialog box, uncheck Enableanonymousaccessand check Integrated Windows authentication. (You can select Basicauthentication, but it is less secure.)

7 Click OK to save the changes you have made to the Authentication Methodsdialog box.

8 Click OK to close the properties dialog box.

9 Check that the Web site is running.

Other applications using TCP/IP port 8085Discovery Accelerator uses TCP/IP port 8085 by default. However, if anotherapplication on the Discovery Accelerator computer needs to use this port, youcan set Discovery Accelerator to use a different one.

Remember that you should not run Compliance Accelerator and DiscoveryAccelerator concurrently on the same computer.

To change the port that Discovery Accelerator uses

1 Locate the copies of the Web.config file in the AcceleratorAdminWeb andCustodianManagerWeb subfolders of the Discovery Accelerator programfolder.

2 Open each file in a text editor such as Windows Notepad.

3 Find the following line, and change the port number to a suitable alternative.

<add key="RemotePort" value="8085"/>

197TroubleshootingInstallation problems

Page 198: Symantec Discovery Acceleratorâ„¢

4 Save and close the files.

5 Restart the Enterprise Vault Accelerator Manager service.

Uninstalling the Discovery Accelerator client from a shared locationmay prevent other users from starting the client

If a user uninstalls the Discovery Accelerator client from the same shared locationto which other users have installed the client, these users may no longer be ableto start the client. However, they can easily fix the problem by performing a repairinstallation of their Discovery Accelerator clients.

To perform a repair installation of the Discovery Accelerator client

1 On each computer where you want to perform the repair installation, startControl Panel.

2 Double-click the Add or Remove Programs applet.

3 Find and click Symantec Enterprise Vault Discovery Accelerator Client in thelist of installed programs.

4 Click the Click here for support information hyperlink.

5 Click Repair, and then follow the on-screen instructions.

Problems when running Discovery AcceleratorThis section provides guidelines on how to deal with any problems that you mayencounter when running Discovery Accelerator.

Enterprise Vault Accelerator Manager service does not startIf you cannot start the Enterprise Vault Accelerator Manager service, check thestatus of the Windows Management Instrumentation (WMI) service. If the WMIservice is stopped, start it and then start the Enterprise Vault Accelerator Managerservice.

Vault stores not displayedIf no vault stores and archives are displayed in the Discovery Accelerator vaultspage, check that the Enterprise Vault Directory service is running. Ensure alsothat the same version of Enterprise Vault is running on the Discovery Acceleratorand Enterprise Vault servers.

TroubleshootingProblems when running Discovery Accelerator

198

Page 199: Symantec Discovery Acceleratorâ„¢

Unable to select message typeWhen you specify the criteria for a search, you may find that you cannot select amessage type. Ensure that the start date you specify in the date range is after thedate on which you installed Enterprise Vault 5.0. Earlier versions of EnterpriseVault did not add information to messages about the message type.

To specify the installation and oldest archived item dates in the DiscoveryAccelerator database

1 Start the Discovery Accelerator client, if you have yet to do so.

See “Opening the Discovery Accelerator client” on page 45.

2 Click the Configuration tab in the Discovery Accelerator client, and thenclick the Settings tab.

3 Expand the System section to show the available options.

4 In the Enterprise Vault Oldest Archived Item Date row, click the Valuecolumn.

5 Select the date on which Enterprise Vault archived the oldest available data.

6 In the Enterprise Vault V5 Installation Date row, click the Value column.

7 Select the date on which you first installed Enterprise Vault 5.0 or later.

8 Click Apply to save the changes that you have made.

If the oldest archived item date and V5 installation date are the same then,when you enter the criteria for a search, you can specify the message typewithout also specifying a start date. (Discovery Accelerator does not returnany pre-5.0 data.) However, if the oldest archived item date is earlier thanthe V5 installation date, you can only specify the message type if you specifya start date that is on or after the V5 installation date.

Search returns unexpected resultsSymantec Support may request a search criteria file if you report a problem withsearches that return unexpected results.

To generate the search criteria file

1 Start the Discovery Accelerator client, if you have yet to do so.

See “Opening the Discovery Accelerator client” on page 45.

2 Click the Configuration tab in the Discovery Accelerator client, and thenclick the Settings tab.

3 Expand the Diagnostics section to show the available options.

199TroubleshootingProblems when running Discovery Accelerator

Page 200: Symantec Discovery Acceleratorâ„¢

4 In the Save Search Criteria row, check the option in the Value column.

5 Click Apply to save the changes that you have made.

6 Restart the Enterprise Vault Accelerator Manager service on the DiscoveryAccelerator server.

7 Rerun the searches.

On the Discovery Accelerator server, Discovery Accelerator creates a file thatis called Criteria_SearchID.txt in the SearchCriterias subfolder of theDiscovery Accelerator program folder. If the folder contains several files, youcan identify the associated searches by hovering the mouse pointer over thesearch names in the Discovery Accelerator client.

Unable to view HTML items in the Review paneCheck the permissions on the Windows and ASP.NET Temp folders.

See “Setting the Temp folder permissions” on page 24.

Errors when exporting itemsIf you receive the following error message when you export items, the version ofthe file mapisvc.inf on the Discovery Accelerator server may be incorrect.

Error Failed to write the file:

The EVPSTAPI COM object has not been initialized

To fix MAPI problems

1 In Windows Explorer, browse to the %windir%\system32 folder on theDiscovery Accelerator server.

2 Double-click fixmapi.exe to run the MAPI repair tool. (Note that this tooldoes not appear to do anything when you run it.)

3 Restart the Discovery Accelerator server.

4 Test whether the problem has been fixed.

TroubleshootingProblems when running Discovery Accelerator

200

Page 201: Symantec Discovery Acceleratorâ„¢

If you cannot fix the problem by running FIXMAPI.EXE

1 In the%windir%\system32 folder on the Discovery Accelerator server., renamethe existing mapisvc.inf file.

2 Copy the version of mapisvc.inf that comes with Microsoft Outlook to the%windir%\system32 folder. This version is typically in the following folder:

C:\Program Files\Common Files\System\MSMAPI\locale_ID

where locale_ID is the numeric identifier for your locale. The following tablelists some common locale identifiers.

1037Hebrew2052Chinese Simplified

1040Italian1028Chinese Traditional

1041Japanese1030Danish

2070Portuguese1043Dutch

3082Spanish1033English U.S.

1053Swedish1036French

1031German

3 Restart the Discovery Accelerator server.

Synchronization errors after you rename the SQL Server computerIf you rename the SQL Server computer, the following message may appear in theevent log of the Discovery Accelerator server when the Discovery Acceleratordatabase synchronizes with SQL Server:

Cannot add, update, or delete a job (or its steps or schedules)

that originated from an MSX server. The job was not saved.

For more information on this problem and guidelines on how to resolve it, see thefollowing article in the Microsoft Knowledge Base:

http://support.microsoft.com/?kbid=281642

You may also be able to fix the problem by running a script on the SQL Servercomputer.

201TroubleshootingProblems when running Discovery Accelerator

Page 202: Symantec Discovery Acceleratorâ„¢

To fix synchronization errors by running a SQL script

1 Connect to your SQL Server with Query Analyzer.

2 Type the following command to access the msdb database:

USE msdb

3 Run the following script:

DECLARE @srv sysname SET @srv = CAST(SERVERPROPERTY('server_name')

AS sysname) UPDATE sysjobs SET originating_server = @srv

where you must replace server_namewith the new name of your SQL Servercomputer.

Performance counter errors when the Accelerator Manager servicestarts

When the Enterprise Vault Accelerator Manager service starts, the following errormessages may appear in the event log of the Discovery Accelerator server:

Event Type: Error

Event Source: Accelerator Manager

Event Category: None

Event ID: 41978

Description: APP ATM - Error: deleting Performance Counters

Description: Input string was not in a correct format.

Event Type: Error

Event Source: Accelerator Manager

Event Category: None

Event ID: 41980

Description: APP ATM - Error: Creating Performance Counters

Description: Input string was not in a correct format.

For more information on this problem and guidelines on how to resolve it, see thefollowing article in the Microsoft Knowledge Base:

http://support.microsoft.com/?kbid=300956

SQL Service Broker warning when restoring a customer database to adifferent server

SQL Server may record the following warning message in the event log if yourestore a Discovery Accelerator customer database to a different server than thaton which it originally resided:

TroubleshootingProblems when running Discovery Accelerator

202

Page 203: Symantec Discovery Acceleratorâ„¢

Service Broker needs to access the master key in the database

'database_name'. Error code:25. The master key

has to exist and the service master key encryption is required.

You can suppress this warning message by using the following SQL Servercommand to create a master key for the database:

CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'password'

For more information, see the following article on the Microsoft Web site:

http://msdn.microsoft.com/en-us/library/aa337551(SQL.90).aspx

Issues with reportsA number of issues can arise when you print reports from the DiscoveryAccelerator client.

Prompt to install SQL Server when printing a report for thefirst timeWhen you print a report for the first time from the Discovery Accelerator client,a Security Warning window prompts you to install Microsoft SQL Server. This isa known issue in Microsoft SQL Server Reporting Services, which requires you todownload an ActiveX control for client-side printing of reports. To resolve thisissue, enable the setting "Download signed ActiveX controls" in Internet Explorerso that you can install the required control.

To change the security settings in Internet Explorer

1 In Microsoft Internet Explorer, click Tools > Internet Options.

2 Click the Security tab.

3 Select the Trusted sites zone, and then click Sites.

4 Type the URL of the SQL reporting server.

5 Click Add, and then click Close.

6 Click the Custom level button.

7 Scroll to the ActiveX controls and plug-ins node.

8 Click Enable for Download signed ActiveX controls, and then click OK.

203TroubleshootingProblems when running Discovery Accelerator

Page 204: Symantec Discovery Acceleratorâ„¢

Reports that you export as CSV may not open properly inMicrosoft ExcelBy default, SQL Reporting Services exports CSV files with Unicode encoding ratherthan ANSI encoding. The data in a Unicode-encoded CSV file does not tabulateproperly when you open it in Microsoft Excel.

To work around this problem

1 Locate the file rsreportserver.config in the SQL Reporting Servicesinstallation folder.

2 Open the file in a text editor such as Windows Notepad.

3 Comment out the following text block by enclosing it in the marks <!-- and-->:

<Extension Name="CSV" Type="Microsoft.ReportingServices.Rendering.

CsvRenderer.CsvReport, Microsoft.ReportingServices.CsvRendering"/>

4 Add the following text block:

<Extension Name="CSV" Type="Microsoft.ReportingServices.Rendering.

CsvRenderer.CsvReport, Microsoft.ReportingServices.CsvRendering">

<Configuration>

<DeviceInfo>

<Encoding>ASCII</Encoding>

</DeviceInfo>

</Configuration>

</Extension>

5 Save and close the file.

After you have edited the configuration file, SQL Reporting Services ignoresany Unicode characters that were stored in the initial report.

Garbled characters when exporting reports in Acrobat formaton Japanese Windows computersAny Discovery Accelerator reports that you export in Acrobat (PDF) format on aJapanese Windows computer may contain garbled characters. This typicallyhappens on computers that have version 2.30 of the Microsoft Gothic font. Theproblem is not evident on computers where version 5.00 of this font is installed.

Version 5.00 of the Microsoft Gothic font is supplied with Windows Vista, butmost other versions of Windows come with version 2.30. See this page for moreinformation:

TroubleshootingProblems when running Discovery Accelerator

204

Page 205: Symantec Discovery Acceleratorâ„¢

http://www.microsoft.com/typography/fonts/font.aspx?FMID=1610

205TroubleshootingProblems when running Discovery Accelerator

Page 206: Symantec Discovery Acceleratorâ„¢

TroubleshootingProblems when running Discovery Accelerator

206

Page 207: Symantec Discovery Acceleratorâ„¢

AActive Server Pages

enabling on Windows 2003 22ensuring the scripts can run 24

Ad Hoc Searches page 165Adding

comments to items 133custodian groups 111custodians 110custom custodian attributes 112folders 136roles 80search schedules 105

Admin role 81Allow Archive Selection in Research Folders

permission 77API configuration options 166App Rule Admin role 105App User Admin role 50Archive Source report 142Archives

selecting archives to search 99ASP.NET

enabling on Windows 2003 22Temp folder permissions 200

ASPNET Temp folder permissions 24Assign permission 75, 77Attributes

setting up 112Audit history 131

CCase Admin permission 75, 77Case History report 142–143Comments

adding to items 133viewing 131

Commit Research Items Marks and Commentspermission 77

Conversation window 130Copy Research Items permission 77

Create and Configure Cases permission 50, 75, 77Creating

custodian groups 111custodians 110custom custodian attributes 112folders 136reports 150roles 80search schedules 105searches 92

Custodianssetting up 110

Custom custodian attributessetting up 112

DDelete Case permission 74, 77Delete Folder permission 75, 139Deleting

folder items 138folders 139items from folders 138reports 151

Diagnostics configuration options 167Discovery System Admin role 74, 80–81, 155

EEnterprise Vault Accelerator Manager service 13Expanding distribution lists 21Export Configuration Data permission 75, 77Export IDs 162Export Messages permission 138Export Research Items permission 77Export role 138Export/production configuration options 168Exporting

creating an export run 160introduction to 153items from folders 138

Index

Page 208: Symantec Discovery Acceleratorâ„¢

FFinding

all items in the same conversation 130Folders

creating 136deleting 139deleting items from 138exporting items from 138introduction to 135reviewing the items in 137

Full Control role 137–138

GGeneral configuration options 171Groups

setting up 111

HHolds report 145HTML

exporting or producing to 160

IImport Configuration Data permission 75, 77, 156ImportExport command 156Importing

configuration data 156introduction to 153

Item Detail report 142, 145Items

adding comments to 133deleting from folders 138displaying printable versions of 131exporting from folders 138exporting or producing 160reviewing folder messages 137viewing comments and audit history 131

LLegal Holds report 142Locating

all items in the same conversation 130

MManage Administration Security permission 75Manage Archives permission 75, 77

Manage Global Target and Target Groupspermission 75, 77

Manage Legal Holds permission 75, 77Manage Marks permission 75, 77Manage Roles permission 75, 77, 80Manage Schedules permission 75, 77, 105Manage Scheme Templates permission 75, 77Manage Search Attributes permission 75, 77mapisvc.inf version 200Message Counts page 178Microsoft .NET Framework 22Microsoft Outlook 162

making export ID visible in 162Modify System Configuration permission 75, 77Monitor Searches permission 77Monitor searches permission 75MSG

exporting or producing to 160

OOutlook

making export ID visible in 162

PPerform Ad Hoc Searches permission 136Perform Research permission 77Personal Folders (.pst) files 162Printable versions of review items 131Producing

creating a production run 160Production permission 75, 77, 160Productions report 142, 147Profile Synchronization configuration options 180Promote Research to Case permission 77PST

exporting or producing to 160

RRemoving

folder items 138folders 139items from folders 138reports 151

Reporting configuration options 182Reports

available Discovery Accelerator reports 141deleting 151generating 150

Index208

Page 209: Symantec Discovery Acceleratorâ„¢

Reports (continued)introduction to 141viewing 150

Retained marks 85Review Messages permission 137Review pane 130

changing the appearance of 127filtering the items listed in 122

Review pane columnscustomizing default 192

Review permission 75Review role 137Reviewing configuration options 182Reviewing items

adding comments to items 133displaying printable versions of items 131exporting from folders 138exporting or producing 160in folders 137introduction to 117viewing comments and audit history 131

Rolescreating 80

SSearch configuration options 184Search criteria file 199Search permission 75, 77, 92Search schedules

introduction to 104setting up 105

Searchescreating and running 92introduction to 91pausing and resuming 99selecting the archives to search 99

Searches report 142, 148Searching for

all items in the same conversation 130Security report 142, 149Setting up

custodian groups 111custodians 110folders 136reports 150roles 80search schedules 105searches 92

Show Reviewer Summaries On Home Pagepermission 77

SQL Server Enterprise Manager 105SQLServerAgent service 104–105Support contact information 9System configuration options 190

TTCP/IP port 197

VVault Directory Synchronization configuration

options 191Vaults

selecting the vaults to search 99View Reports permission 75, 77View System Configuration permission 75, 77Viewing

reports 150

WWindows 2003

enabling Active Server Pages and ASP.NET 22Windows Temp folder

permissions 200

XXML files

importing from 153, 156

209Index