Last updated: 26-Apr-2011

ReadMeFirst for Symantec Enterprise Vault Discovery Collector

This document provides important information about Discovery Collector, which you should read before you install or upgrade the software.

For the most up-to-date version of this document, see the following article on the Symantec Enterprise Support site:

http://www.symantec.com/docs/TECH126994

The documentation that accompanies Discovery Collector provides extensive information on installation and configuration processes.

Contents

Known issues and limitations

Discovery Accelerator file location field

Based on the data source, the file location field in Discovery Accelerator Review will have the following format for objects archived by Enterprise Vault Discovery Collector:

CIFS \\server/folder/ ...
NFS server:/folder/ ...
Desktop host:desktop/drive/folder/ ...
Exchange 2003, 2007, 2010 server[:port]/mailbox/folder/ ...
SharePoint 2003, 2007, 2010 http://server/[site path]/folder/ ...
Domino server:share/folder ...

Supported data sources

Please refer to the table below in lieu of the supported data sources and protocols listed in Tables 6-2 and 6-3 at pages 73-76 of the Discovery Collector User Guide. These are the only data sources and protocols tested and supported by Discovery Collector Version 9.0.

Data source Protocol System version Supported?
File servers
Windows servers CIFS v. 1.0 Windows NT, Windows 2000, Windows 2003, Windows 2008 Yes
UNIX servers NFS v. 2/v. 3 All Yes (but not tested)
NetWare servers NCP over TCP/IP NetWare 6.5 No
EMC Celerra CIFS v. 1.0 DART 5.5 or later No
NFS v. 2/v. 3 DART 5.5 or later No
NetApp Filer CIFS v. 1.0 ONTAP 7.0.0 or later Yes
NFS v. 2/v. 3 ONTAP 7.0.0 or later Yes
Other CIFS v. 1.0 All No
NFS v. 2/v. 3 All No
Email servers
Exchange WebDav Exchange 2003 Yes
Exchange Web Services (Soap XML-RPC) Exchange 2007 and 2010 Yes
Domino NRPC over TCP/IP Lotus Domino 6.x, 7.x, and 8.x Yes
Email archives
Symantec Enterprise Vault/Discovery Accelerator Discovery Accelerator Web Services (Soap XML-RPC) 8.0.4 and 9.0.0 Yes
Email Extender     No
Iron Mountain VFS CIFS (Windows platforms), NFS v. 2/v. 3   No
Desktops
Windows CIFS v. 1.0 Windows XP, Vista Yes
Macintosh CIFS v. 1.0   No
NFS v. 2/v. 3   No
Unix/Linux NFS v. 2/v. 3   No
Document management
Documentum TCP/IP 5.3, 6.0, 6.5 No
SharePoint SharePoint Web Services (Soap XML-RPC) SharePoint 2003 Yes
SharePoint 2007 and 2010 Yes
Retention servers
Centera TCP/IP CentraStar 3.1 No
EMC Celerra w/FLR CIFS v. 1.0 DART 5.5 No
NFS v. 2/v. 3 DART 5.5 No
Enterprise Vault DCOM/RPC 8.0.4, 9.0.0 Yes
NetApp SnapLock CIFS v. 1.0 ONTAP 7.2.1 and later No
NFS v. 2/v. 3 ONTAP 7.2.1 and later No
IBM DR550 TCP/IP TSM Client 5.3.4.0, TSM Server 5.3.4.0 No
Hitachi HCAP HTTP/HTTPS 1.1 HCA 1.8 No
Iron Mountain VFS CIFS (Windows platforms), NFS v. 2/v. 3   No

SharePoint alternate access mappings

SharePoint 2007 and 2010 require the configuration of alternate access mappings to map Enterprise Vault Discovery Collector requests to the correct web sites.

Alternate access mappings map URLs presented by Enterprise Vault Discovery Collector to internal URLs received by Windows SharePoint Services. An alternate access mapping is required between the server name and optional port defined in the SharePoint volume definition and the internal URL of the web application containing the web site being accessed is required.

Refer to Microsoft SharePoint 2007 or 2010 documentation to configure alternate access mappings based on the public URL configured by the local SharePoint administrator and the mapping used by the Enterprise Vault Discovery Collector SharePoint volume definitions.

Example:

You are accessing a SharePoint volume with the fully qualified domain name http://itweb.symantecexample.com from the Intranet zone. An alternate access mapping for the public URL http://itweb.symantecexample.com for the Intranet zone must be configured for the SharePoint 2007 or 2010 web application hosting the site to be accessed by the volume definition.

Documentation

The following documentation is supplied with Discovery Collector.

Document Comments
Symantec Enterprise Vault Discovery Collector Installation and Planning Guide Guides you through the process of planning, sizing, and installing Discovery Collector for use on virtual machines.
Installation and Planning Template Helps you to complete planning, configuration, and operational readiness tasks before you use Discovery Collector. This template should be used in conjunction with the Enterprise Vault Discovery Collector Installation and Planning Guide and the Enterprise Vault Discovery Collector User Guide.
Symantec Enterprise Vault Discovery Collector User Guide Provides detailed information on how to configure and use Discovery Collector.
Operational Readiness Template This Microsoft Excel template designed to help you complete operational readiness tasks prior to using Discovery Collector. Excel 2007 or later is required.
Symantec Enterprise Vault Discovery Collector Third-Party Software Guide A document enumerating all software licensing attributions.

Some manuals are in Adobe Acrobat format. If you have yet to install the free Adobe Reader, you can download it from the Adobe Web site at http://www.adobe.com.

For the latest information on supported devices and versions of software, see the Enterprise Vault Compatibility Charts (http://www.symantec.com/docs/TECH38537).

Legal notice

Copyright 2011 Symantec Corporation. All rights reserved.

Symantec, the Symantec Logo, Veritas, Enterprise Vault, Compliance Accelerator, and Discovery Accelerator are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Software file accompanying this Symantec product for more information on the Third Party Programs.

The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.

THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.

Symantec Corporation
350 Ellis Street
Mountain View, CA 94043

http://www.symantec.com