Control Compliance Suite (CCS) for Microsoft®Exchange v.8.60 Getting Started Guide

Article:TECH115085  |  Created: 2008-01-14  |  Updated: 2008-01-26  |  Article URL http://www.symantec.com/docs/TECH115085
Article Type
Technical Solution


Issue







Solution



The CCS for Microsoft Exchange v.8.6 Getting Started Guide is available online at http://ftp.symantec.com/public/english_us_canada/products/symantec_control_compliance_suite/8.6/manuals/



References
"bv-Control_for_Microsoft_Exchange_Getting_Started_Guide.pdf"



Technical Information

Chapter 1 Overview
bv-Control for Microsoft Exchange architecture ................................... 9
Features and functionality ............................................................. 10
Data sources ................................................................................ 12
Chapter 2 Planning and deployment
Deployment considerations ............................................................ 15
RMS infrastructure considerations .................................................. 16
Infrastructure deployment types ............................................... 16
Console and Information Server deployment considerations ........... 18
Selecting an Information Server computer .................................. 23
System requirements .................................................................... 25
Hardware requirements ........................................................... 25
Software requirements ............................................................ 26
Trust relationships ....................................................................... 27
User and credential account rights ............................................ 28
Permission requirements for Exchange environment .......................... 28
Windows account(s) usage ........................................................ 29
Permissions to bv-Control for Microsoft Exchange system .............. 29
Permissions to Windows servers running Exchange ...................... 30
Access to mailbox specified in the configuration .......................... 31
Permissions requirements for Tracking Log Database .......................... 32
General requirements ............................................................. 32
Permissions on SQL server database .......................................... 32
CredDB credentials ................................................................. 33
Tracking Log Database sizing guidelines ........................................... 34
Performance parameters ......................................................... 34
Configuration sizing guidelines ................................................. 36
Upgrading from previous version .................................................... 40
Contents
Chapter 3 Installing and uninstalling the product
Installing bv-Control for Microsoft Exchange ..................................... 41
Uninstalling bv-Control for Microsoft Exchange ................................. 42
Chapter 4 Configuring the product
Configuring the RMS Console ......................................................... 43
Configuring bv-Control for Microsoft Exchange .................................. 43
Configuring bv-Control for Microsoft Exchange ............................ 43
Setting up the installation configurations ................................... 45
Configuring the Tracking Log Database ............................................ 47
Configuring the tracking log database ........................................ 48
Adding or modifying a server group ........................................... 51
Marking the bridgehead servers ................................................ 52
Importing recipient information ............................................... 53
Chapter 5 Evaluating the product
About evaluation scenarios ............................................................ 55
Automating labor-intensive tasks .................................................... 56
Identifying stale Exchange objects ............................................. 56
Responding to compliance and legal requests .............................. 57
Managing mailbox moves ........................................................ 60
Messaging security management ..................................................... 61
Assessing who has access to sensitive information in public folder
and mailbox contents ........................................................ 62
Security and configuration best practices .................................... 66
Auditing configurations against the mandated standards ............... 67
Managing service level agreement and capacity ................................. 69
Storage analysis report ............................................................ 70
Determining message traffic patterns ........................................ 70
Measuring compliance with service level agreements .................... 71



Legacy ID



2008111417281753


Article URL http://www.symantec.com/docs/TECH115085


Terms of use for this information are found in Legal Notices