Technical Brief Enterprise Vault Privileged Delete

Similar documents
Technical Brief Veritas Technical Education Services

Technical Brief Enterprise Vault SMTP Enhancements

Technical Brief Veritas Technical Education Services

Enterprise Vault 12 Feature Briefing Classification

Technical Brief Veritas Technical Education Services

Enterprise Vault Whitepaper Enterprise Vault Integration with Veritas Products

Technical White Paper Information Map. Taking Action on Information Map Insights

Enterprise Vault 12.4 OData Reporting for Auditing

USER GUIDE. Veritas NetBackup CloudFormation Template

NetBackup Collection Quick Start Guide

Technical White Paper NetBackup 8.1 and later. NetBackup in the AWS Cloud: Required setup to use Amazon EFS as the NetBackup CloudCatalyst cache

Enterprise Vault Versions of FSA Agent and Enterprise Vault Reporting or later

Doubling Performance in Amazon Web Services Cloud Using InfoScale Enterprise

Data Insight Feature Briefing Box Cloud Storage Support

Veritas Access. Installing Veritas Access in VMWare ESx environment. Who should read this paper? Veritas Pre-Sales, Partner Pre-Sales

Enterprise Vault Using SQL Database Roles in Enterprise Vault, Compliance Accelerator, and Discovery Accelerator

Before Searching for Solutions It s All About the Data

Enterprise Vault Requesting and Applying an SSL Certificate and later

Enterprise Vault 11 Whitepaper Deploying IMAP Access to Enterprise Vault

Enterprise Vault Guide for Outlook Users

Backup Exec Subscription Licensing Guide

In-Guest High Availability Configuration in OpenStack Using InfoScale Availability Agents

Enterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator or later

Enterprise Vault Overview Nedeljko Štefančić

Enterprise Vault Whitepaper Enterprise Vault Discovery Accelerator Effective Reviewing

Veritas Enterprise Vault Guide for Mac OS X Users 12.2

Veritas Enterprise Vault Managing Retention 12.1

Veritas InfoScale Enterprise for Oracle Real Application Clusters (RAC)

Veritas Enterprise Vault Setting up SharePoint Server Archiving 12.2

Hitachi Data Systems and Veritas Empower smarter decisions

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Symantec Document Retention and Discovery

Symantec Enterprise Vault

Enterprise Vault Configuring Internal and External WebApp URLs for OWA SP4 and later

Veritas Enterprise Vault PST Migration 12.2

Veritas Data Insight Software Compatibility List 6.1.1

W H I T E P A P E R : T E C H N I C A L. Enterprise Vault 8.0 Security Model for Microsoft SharePoint Archiving

Veritas Enterprise Vault Setting up SMTP Archiving 12.2

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW

Veritas Enterprise Vault Setting up SMTP Archiving 12.1

Enterprise Vault.cloud Archive Migrator Guide. Archive Migrator versions 1.2 and 1.3

Symantec Enterprise Vault

Enterprise Vault Best Practices

Veritas Data Insight 6.1 Software Compatibility List 6.1

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Veritas Desktop and Laptop Option Mobile Application Getting Started Guide

Veritas NetBackup Copilot for Oracle Configuration Guide. Release 2.7.3

Enterprise Vault Whitepaper

For the latest news about this release, including any hotfixes, subscribe to

NetBackup Self Service Release Notes

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

In-Guest High Availability (HA) Configuration in Red Hat OpenStack Cloud using Veritas InfoScale Availability (VCS)

For the latest news about this release, including any hotfixes, subscribe to

Veritas Backup Exec Migration Assistant

GDPR Workflow White Paper

Veritas NetBackup Copilot for Oracle Configuration Guide. Release 3.1 and 3.1.1

Oracle Database Security Assessment Tool

Veritas SaaS Backup for Salesforce

Enterprise Vault Whitepaper High Availability Options for Enterprise Vault

Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and

Backup-as-a-Service Powered by Veritas

Veritas Access Enterprise Vault Solutions Guide

Enterprise Vault.cloud Feature Briefing

Fabrizio Patriarca. Come creare valore dalla GDPR

Veritas ediscovery Platform

Enterprise Vault Auditing 12.3

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide

Veritas NetBackup Vault Operator's Guide

Oracle Intelligent Policy

Veritas Desktop and Laptop Option Mac Getting Started Guide

Veritas Desktop Agent for Mac Getting Started Guide

Protecting Miscrosoft Hyper-V Environments

Veritas NetBackup for Lotus Notes Administrator's Guide

Veritas SaaS Backup for Office 365

Veritas NetBackup for Microsoft SQL Server Administrator's Guide

Veritas NetBackup Copilot for Oracle Configuration Guide. Release 2.7.2

Enterprise Vault Setting up SMTP Archiving 12.3

Veritas Enterprise Vault. NSF Migration

Cluster Server Generic Application Agent Configuration Guide - AIX, Linux, Solaris

Overview. Business value

Veritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2

Veritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios

Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2013

Netwrix Auditor for SQL Server

Clearwell ediscovery Platform Feature Briefing

Veritas NetBackup OpsCenter Reporting Guide. Release 8.0

Veritas NetBackup for Enterprise Vault Agent Administrator's Guide

Enterprise Vault.cloud Journaling Guide

Veritas ediscovery Platform. Compatibility Charts

Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services)

Oracle Database Vault

Veritas Desktop and Laptop Option 9.2. High Availability (HA) with DLO

Symantec Enterprise Vault

IPv6 Classification. PacketShaper 11.8

Symantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.

Plug-in for VMware vcenter

Governance, Risk, and Compliance Controls Suite. Hardware and Sizing Recommendations. Software Version 7.2

Veritas Enterprise Vault Administrator's Guide 12.1

Veritas System Recovery 18 Linux Edition: Quick Installation Guide

Veritas Deployment Manager User's Guide

Transcription:

1

Feature Description Enterprise Vault 12.3 and Discovery Accelerator 12.3 offer a new feature called. The feature has the following benefits: This feature will help customers to comply with regulations, such as GDPR, by enabling action on Subject Access Requests for deletion. The ability to perform bulk delete from Discovery Accelerator is protected by Role Based Access (RBA). Only users having the Perform Privileged delete permission can delete items permanently from Enterprise Vault archives. Prior to Enterprise Vault 12.3, there was no way to delete items in bulk in Enterprise Vault while preserving rich auditing and history of activities such as review before deletion. Other use cases include: o Deleting unintentional emails o Bulk emails o Newsletters o Reducing risk by deleting items o Complying with regulations around Personally Identifiable Information (PII) o Removing potential malicious content o Removing illegal content like movies and MP3 Business Value extends Discovery Accelerator s abilities to take Administrative actions against content within Enterprise Vault. Customers who have tasks to complete such as deletion of specific content in bulk would be the target users of this feature. Regulatory compliance requirements, such as those included in the GDPR regulation, require customers to remove content based on specific search criteria and business usage. Discovery Accelerator provides an audited, compliant workflow to help customers fulfil these requirements. Underlying Principles This feature requires that both Enterprise Vault and Discovery Accelerator be upgraded to the 12.3 version in order to use the feature. The upgrade procedure for both products is similar to previous releases. The Discovery Accelerator client application will also need to be upgraded. All operations for occur in the Discovery Accelerator client. A Discovery Accelerator user must have the Regulatory Reviewer role assigned on each defined case in Discovery Accelerator in order to perform privileged delete functions. This role must be assigned by a case owner and is not automatically granted. A search in the Case must be already configured and accepted before items can be deleted. The delete function is part of the review process. There are several different options for deleting items: By selecting one or more items in review and then clicking on Actions Delete Right-clicking on any item in the review and selecting Delete all xx items in the set where xx is the number of items If wanting to remove items from a particular author in the review, right-click on an item sent by the author and then selecting Delete all archived items in this set from <author> It should be noted that items cannot be deleted if the Case has Legal Hold enabled. 2

Guided Tour Assigning Roles A Discovery Accelerator user cannot delete items without first being assigned the Regulatory Reviewer role. This role is visible by clicking on Application in the Discovery Accelerator client and then selecting Roles as shown in Figure 1. A case owner would then need to assign the Regulatory Reviewer role within the case itself to a user as shown in Figure 2. 3

Figure 1 Regulatory Reviewer Role Figure 2 Assigning the Regulatory Reviewer role to a user for a Discovery Accelerator case 4

Reviewing and Deleting Items A Discovery Accelerator user can delete items from the Review section for a Case in the Discovery Accelerator Client. There are several ways that a user can delete items from archives: Selecting one or more items in review and clicking on Actions Delete as shown in Figure 3. The user will then need to confirm the delete. Figure 3 Selecting one or more items in review for delete 5

A user can delete all items in the review set by right-clicking on one item and then selecting Delete all xx archived items from the set as shown in Figure 4. The user will need to confirm the delete. Figure 4 Deleting all items in the review set 6

A user can delete all items in the review set sent by a particular author. The user would need to right-click on an item from the author and then select Delete all archived items in the set from <author> as shown in Figure 5. The user will need to confirm the delete. Figure 5 Deleting items from a particular author If the Case is on legal hold and the user attempts to delete items, the user will see the message as shown in Figure 6. 7

Figure 6 Attempting to delete items from a Case on Legal Hold Auditing and Reporting Discovery Accelerator will record the privileged delete event on each item that has been deleted. Figure 7 shows the delete history for an item (from the Review pane). Figure 7 Item history A Case History report will also show privileged delete history as shown in Figure 8. 8

Figure 8 Case History Report Licensing and Support Considerations is included with any Archive Discovery or Discovery Accelerator license. 9

About Veritas Technologies LLC. Veritas Technologies LLC enables organizations to harness the power of their information, with solutions designed to serve the world s largest and most complex heterogeneous environments. Veritas works with 86 percent of Fortune 500 companies today, improving data availability and revealing insights to drive competitive advantage. 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Visit our website http://www.veritas.com Veritas World Headquarters 500 East Middlefield Road Mountain View, CA 94043 +1 (650) 933 1000 www.veritas.com This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 10