Security Model for Compliance Accelerator 8.0
This paper will give readers a better understanding of how the Enterprise Vault (EV) solution integrates with security features already built into Active Directory and Internet Explorer. It will also provide insight as to how to configure Compliance department roles to be configured in line with organizational preferences. This whitepaper is intended to train the reader the concepts behind security for Compliance Accelerator 8.0. This whitepaper discusses the security aspects of the permissions required on the Compliance Accelerator server, SQL server hosting the databases, and client-server communications.