How to audit Discovery Accelerator ?
Hi Everybody, EV version is11.0.1 If it is possible I would like toenable auditingfor Discovery Accelerator. 5 years ago it wasasked inforum discuss about this issue :https://www-secure.symantec.com/connect/forums/auditing-actions-taken-discovery-accelerator Auditing situationfor DA still is the same or is there any new work ? Thank you,Solved5.5KViews0likes12CommentsLitigation Hold Procedure
Hi Everyone, I'm looking for some kind of procedure to set up a Litigation Hold on mailboxes and archives. I have a standard setup of 2 Exchange servers, a Enterprise Vault (first archive policy is "older than a year")and Discovery Accelerator set up on my infrastructure i must put some mailboxes in legal hold in order to protect everything on it. But i don't know how to achieve and be sure is "Legal compliant" (I know how to do it in Exchange, but not with Enterprise Vault). I searched for a procedure or something like that, but didn't find anything. Can someone help me ? ThanksSolved1.9KViews0likes3CommentsEVault .Cloud Business to Customer Data Confidentiality
Dear Team, We are in the process of launching Email Archiving Services in Saudi Arabia through one of our Telco partners. There is a continuous concern about how well Symantec can manage that information stored into our data centers. For the sake of answering customers on that inquiry, we will require Non-Disclosure Agreement samples that we can share with customers to assure them that their data is safe and undisclosed to any entity, except in the event of a government or legal order such as a subpoena. I need documents that describe the levels of security that Symantec provides (security staff, locks, encrypted transfer and at rest policies, etc...) which may be shared with customers. Your support would be greatly appreciated. Regards, Hadi El-JundiSolved1.9KViews7likes3CommentsSymantec Enterprise Vault - UK Partner advice.
Hi, We are currently using Enterprise Vault v10.0.2.1112 for Exchange, SharePoint and File Shares (FSA). Due to issues and concerns we are now considering dropping the SharePoint and FSA components and only retaining Exchange (maybe even dropping that). Can anyone advise on/recommend some UK Partners who can assist us, as i'm sure most of our issues/concerns are down to our set-up and not the product itself. The sweetener for any partners will be the potential consultancy if we decide to stay with Enterprise Vault and upgrade to the latest release, and the possibility of procuring and installing additional Enterprise Vault add-ons. Regards, SurinderSolved1.9KViews0likes5CommentsAfter Enabling Repeating Status Reminder
Hello- We are looking to change how we currently use eDP. We are thinking about enabling the status reminder notices. I have tried a few tests with some success. I do have a few questions that we need some guidance on. Is there a way to get a acknowldegment box on the status reminder or is that only a option for the notice? If a Legal Hold Notice has been sent out and initially the staus reminder had not been selected but was to be selected on a later date, would the status reminder go immediatly or at the next time selected (ex. if we were to select every 12 weeks and 2nd 12 weeks after the initial was in a day would the reminder go out then). Also is the date for the reminder calculated when the notice is sent or on the day the notice is created? Thank you for your assistance.Solved1.8KViews0likes4CommentsDuplicate Email in Outlook after Legal Hold activation
Hi everyone, I have a big issue with my Enterprise Vault infrastructure. Last week, i activated the Legal hold on several mailboxes. (Using this answer :https://www-secure.symantec.com/connect/forums/litigation-hold-procedure) During the week-end, the database has grown a lot... and every items in users mailboxes got duplicated. (Email, Calendar items, etc...) In another thread (this onehttps://www-secure.symantec.com/connect/forums/getting-duplicate-emails-when-trying-archive-emails-outlook), it's said that that kind of thing happen when no option are selected in the policy. My purpose was to set legal hold on several mailboxes and "don't touch" the original.(it seems to worked... before i discover the duplicate items) Can anyone help me before i contact the support ? Does someone know a way to eliminate the duplicate and get back to normal ? ThanksSolved1.6KViews0likes7CommentsAfter 8.0 upgrade can't copy/paste legal hold from Word
Has anyone else had anissue with being able to copy from a Word document into the body of a legal hold after upgrading to version 8.0? It returns an error: "Length of the notice body has exceeded the maximum limit of 13000 characters. The characters used by the HTML editor for tagging are also considered in the characters limit." The characters don't exceed that limit, so I think it has to do with the HTML issue.1.6KViews1like9CommentseDiscovery Platform 8.3 Cumulative Hotfix 2 Release
Hello Everybody, I wanted to let you all know that as of October 2, 2017, eDiscovery Platform 8.3 CHF2 has been released eDiscovery Platform 8.3 CHF2 Release https://www.veritas.com/support/en_US/article.000128033. Besides a good many fixes, this release contains several highlights: Automatically convert OST to PST Data Files for processing The eDiscovery Platform can now seamlessly convert OST files to PST files for processing. Starting with 8.3 CHF2, OST data files are converted to PST data files during the discovery phase. Upon successful completion of this operation, normal PST processing is applied to the files for easy access, review, and analysis. See technical article for details: https://www.veritas.com/support/en_US/article.000128050 Integrated Windows Authentication Single Sign-On for Legal Hold Starting with 8.3 CHF2, Veritas eDiscovery Platform supports Integrated Windows Authentication (IWA) SingleSign-On (SSO) for Legal Hold authentication. When IWA SSO is configured, the logged-in Windows credentials of the custodian are used for authentication, and the custodian is subsequently directed to the Legal Hold Confirmation page without the need to enter login credentials. To use the SSO option, LDAP must be configured and enabled against the Active Directory domain from which Windows users will be authenticating. See technical article for details: https://www.veritas.com/support/en_US/article.000128049 Office® 365 connection using MAPI/HTTP Microsoft is deprecating support for RPC over HTTP on October 31st 2017. With 8.3 CHF2, the Veritas eDiscovery Platform will now use MAPI/HTTP to connect to Office 365 in support of this change. After the 8.3 Cumulative Hotfix 2 is installed, Administrators who want to collect data from Office® 365 mailboxes must also download and install the KB3114941 updates for Outlook 2013 32-Bit Edition that enables Office® 365 connection using MAPI/HTTP to the eDiscovery Platform servers connecting to Office 365. Administrators can download the KB3114941 Outlook update from https://www.microsoft.com/en-us/download/details.aspx?id=51720 and then manually install it. See technical article for details and troubleshooting steps: https://www.veritas.com/support/en_US/article.000128048 You can apply the hotfix by downloading from the aforementioned link and installing from the exe file. As with any upgrade, please first refer tothe upgrade support documents: Supported upgrade paths for eDiscovery Platform https://www.veritas.com/support/en_US/article.000095769 eDiscovery Platform Compatibility Matrix https://www.veritas.com/support/en_US/article.000019811 Attached are the eDiscovery Platform 8.3Cumulative Hotfix 2Release Notes for your review.1.4KViews2likes0CommentsEnterprise Vault Exchange archiving
Requirements as follows, ALL Exchange messages are retrievable (either not deleted (legal hold) and/or journaled)), AND Individual Users can search and retrieve their own messages AND An Administrator with designated permissionscan search and retrieve all messages. Based on my limitedunderstanding, Item 1 and 3 can be achieved with either legal hold orjournaling plus e-discoverybut achieving Item 2 is difficult. Any feedback appreciated.Solved1.3KViews0likes7CommentsDefensible Deletion: The Cornerstone of Intelligent Information Governance
The struggle to stay above the rising tide of information is a constant battle for organizations. Not only are the costs and logistics associated with data storage more troubling than ever, but so are the potential legal consequences. Indeed, the news headlines are constantly filled with horror stories of jury verdicts, court judgments and unreasonable settlements involving organizations that failed to effectively address their data stockpiles. While there are no quick or easy solutions to these problems, an ever increasing method for effectively dealing with these issues is through an organizational strategy referred to as defensible deletion. A defensible deletion strategy could refer to many items. But at its core, defensible deletion is a comprehensive approach that companies implement to reduce the storage costs and legal risks associated with the retention of electronically stored information (ESI). Organizations that have done so have been successful in avoiding court sanctions while at the same time eliminating ESI that has little or no business value. The first step to implementing a defensible deletion strategy is for organizations to ensure that they have a top-down plan for addressing data retention. This typically requires that their information governance principals – legal and IT – are cooperating with each other. These departments must also work jointly with records managers and business units to decide what data must be kept and for what length of time. All such stakeholders in information retention must be engaged and collaborate if the organization is to create a workable defensible deletion strategy. Cooperation between legal and IT naturally leads the organization to establish records retention policies, which carry out the key players’ decisions on data preservation. Such policies should address the particular needs of an organization while balancing them against litigation requirements. Not only will that enable a company to reduce its costs by decreasing data proliferation, it will minimize a company’s litigation risks by allowing it to limit the amount of potentially relevant information available for current and follow-on litigation. In like manner, legal should work with IT to develop a process for how the organization will address document preservation during litigation. This will likely involve the designation of officials who are responsible for issuing a timely and comprehensive litigation hold to custodians and data sources. This will ultimately help an organization avoid the mistakes that often plague document management during litigation. The Role of Technology in Defensible Deletion In the digital age, an essential aspect of a defensible deletion strategy is technology. Indeed, without innovations such as archiving software and automated legal hold acknowledgements, it will be difficult for an organization to achieve its defensible deletion objectives. On the information management side of defensible deletion, archiving software can help enforce organization retention policies and thereby reduce data volume and related storage costs. This can be accomplished with classification tools, which intelligently analyze and tag data content as it is ingested into the archive. By so doing, organizations may retain information that is significant or that otherwise must be kept for business, legal or regulatory purposes – and nothing else. An archiving solution can also reduce costs through efficient data storage. By expiring data in accordance with organization retention policies and by using single instance storage to eliminate ESI duplicates, archiving software frees up space on company servers for the retention of other materials and ultimately leads to decreased storage costs. Moreover, it also lessens litigation risks as it removes data available for future litigation. On the eDiscovery side of defensible deletion, an eDiscovery platform with the latest in legal hold technology is often essential for enabling a workable litigation hold process. Effective platforms enable automated legal hold acknowledgements on various custodians across multiple cases. This allows organizations to confidently place data on hold through a single user action and eliminates concerns that ESI may slip through the proverbial cracks of manual hold practices. Organizations are experiencing every day the costly mistakes of delaying implementation of a defensible deletion program. This trend can be reversed through a common sense defensible deletion strategy which, when powered by effective, enabling technologies, can help organizations decrease the costs and risks associated with the information explosion.1.1KViews1like10Comments