Hi Khue
I am currently evaluating SE 5.5. for deployment within our infrastructure and so I have limited experience with the product. Nevertheless I hope my observations will be of some use to you/anyone.
The SE service credentials most definitely needs local admin rights over any server it is running on. If you dont do this, one of things you will see is the inability to see managed resources. I.e. If you allocate a storage policy and then save it, then browse SE as if trying to apply a policy to the same resource, you will see an icon indicating a policy is applied but it wont list itself in the SE console as a managed resource when you refresh (or close and relaunch the console). I hope that makes sense.
I dont see why SE needs to have domain admin rights. Basically when you launch the EAO configuration option for the 1st time the CN=WQuinn,DC=<insert FQDN for domain here> gets created. For this to happen, the person doing the EAO needs domain admin rights. This is because no one has been delegated control over the domainDNS object to say "allow create child(CC in sddl) and delete child (DC in sddl) rights for the wquinn-Container/wquinn-Value classes". But if you for example use the wquinn.LDF file in the c:\program files\veritas\storage exec\utility\adconfiguration\ldf folder to create the CN=WQuinn,DC=<insert FQDN for domain here> and then delegate full control to the object and sub objects to a group (e.g. My Storage Exec Admins) , then all you have to do is run the EAO configuration as a user that is a member of the above "My Storage Exec Admins" group. Note this group is fictitious ;-)
The SE credentials get added to the SCWrite so it should have rights to modify objects beneath cn=WQuinn assuming the rights are present for SCREAD and SCWRITE. I have an issue at the moment where the ACL for CN=WQuinn is not getting set at EAO configuration time and I need to raise a support incident.
If you create your own CN=WQuinn objects (e.g.beneath any OU which have SE servers housed) then you will need to ACL them such that SCREAD and SCWRITE have the necessary permissions. there is a section in the helpfile that explains whats required.
I guess the point I am trying to make is put the SE account into an additional group (other than SCWRITE) and delegate control to objects in AD that SE needs to control. That way, regardless of the permissions beeen explicitly granted to SCWRITE or not, SE credentials will have the necessary permissions to make the modifications it needs. If I were you, I will delegate full control to the wquinn-Container and wquinn-Value class objects and read/modify (also known as RPWP in sddl) for the wquinn-String and wquinn-dataType attributes wherever they exist. At the moment by default they are only in CN=WQuinn,DC=FQDN_OF_DOMAIN.
HTH
M@
P.S. If you find any more info on the subject please post for the benefit of others. cheers