11.0 - Administrators - Guide
11.0 - Administrators - Guide
11.0 - Administrators - Guide
Administrator's Guide
11.0
Symantec Enterprise Vault: Administrator's Guide
The software described in this book is furnished under a license agreement and may be used
only in accordance with the terms of the agreement.
Legal Notice
Copyright © 2014 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, the Checkmark Logo, Enterprise Vault, Compliance Accelerator,
and Discovery Accelerator are trademarks or registered trademarks of Symantec Corporation
or its affiliates in the U.S. and other countries. Other names may be trademarks of their
respective owners.
This Symantec product may contain third party software for which Symantec is required to
provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs
are available under open source or free software licenses. The License Agreement
accompanying the Software does not alter any rights or obligations you may have under those
open source or free software licenses. Please see the Third Party Software file accompanying
this Symantec product for more information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Symantec
Corporation and its licensors, if any.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S.
Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street, Mountain View, CA 94043
http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical Support’s
primary role is to help you resolve specific problems with a Symantec product. The
Technical Support group also creates content for our online Knowledge Base. The
Technical Support group works collaboratively with the other functional areas within
Symantec to answer your questions in a timely fashion. For example, the Technical
Support group works with Product Engineering and Symantec Security Response
to provide alerting services and virus definition updates.
Symantec’s support offerings include the following:
■ A range of support options that give you the flexibility to select the right amount
of service for any size organization
■ Telephone and/or web-based support that provides rapid response and
up-to-the-minute information
■ Upgrade assurance that delivers software upgrades
■ Global support purchased on a regional business hours or 24 hours a day, 7
days a week basis
■ Premium service offerings that include Account Management Services
For information about Symantec’s support offerings, you can visit our website at
the following URL:
http://support.symantec.com
All support services will be delivered in accordance with your support agreement
and the then-current enterprise technical support policy.
Customer service
Customer service information is available at the following URL:
http://support.symantec.com
Customer Service is available to assist with non-technical questions, such as the
following types of issues:
■ Questions regarding product licensing or serialization
■ Product registration updates, such as address or name changes
■ General product information (features, language availability, local dealers)
■ Latest information about product updates and upgrades
■ Information about upgrade assurance and support contracts
■ Information about the Symantec Buying Programs
■ Advice about Symantec's technical support options
■ Nontechnical presales questions
■ Issues that are related to CD-ROMs, DVDs, or manuals
Support agreement resources
If you want to contact Symantec regarding an existing support agreement, please
contact the support agreement administration team for your region as follows:
■ Prerequisite knowledge
Prerequisite knowledge
To administer Enterprise Vault, you need a working knowledge of the following:
■ Windows Server administrative tasks
■ Microsoft SQL Server
■ Microsoft Message Queue Server
■ Internet Information Services (IIS)
■ Your archive storage hardware and software
If you intend to use Enterprise Vault with Domino server, Microsoft Exchange, or
Microsoft SharePoint, you also require a working knowledge of these products.
Document Comments
Symantec Enterprise Vault Includes all the following documents in Windows Help (.chm)
Documentation Library format so that you can search across them all. It also includes
links to the guides in Acrobat (.pdf) format.
You can access the library in several ways, including the
following:
Deployment Scanner Describes how to check the prerequisite software and settings
before you install Enterprise Vault.
Setting up Exchange Server Describes how to archive items from Microsoft Exchange
Archiving user mailboxes, journal mailboxes, and public folders.
Setting up Domino Server Describes how to archive items from Domino mail files and
Archiving journal databases.
Setting up File System Describes how to archive the files that are held on network
Archiving file servers.
Setting up SharePoint Server Describes how to archive content from Microsoft SharePoint
Archiving servers.
Setting up SMTP Archiving Describes how to archive SMTP messages from other
messaging servers.
Document Comments
Registry Values A reference document that lists the registry values with which
you can modify many aspects of Enterprise Vault behavior.
Help for Administration The online Help for the Enterprise Vault Administration
Console Console.
Help for Enterprise Vault The online Help for Enterprise Vault Operations Manager.
Operations Manager
For the latest information on supported devices and versions of software, see the
Enterprise Vault Compatibility Charts book, which is available from this address:
http://www.symantec.com/docs/TECH38537
■ Roles-based administration
Roles-based Many administrative tasks do not require all the permissions that are
administration associated with the Vault Service account. Roles-based administration
enables you provide individual Enterprise Vault administrators with
exactly the permissions that are required to perform their individual
administrative tasks.
Admin permissions You can grant or deny access to the following containers in the
Administration Console tree:
■ File Servers
■ Exchange
■ Domino
■ SharePoint
■ Enterprise Vault Servers
Roles-based administration
Use Windows Authorization Manager to configure roles for Enterprise Vault
roles-based administration. All such configuration is performed using the Vault
Service account.
Managing administrator security 25
Roles-based administration
See the Installing and Configuring guide for details of the prerequisite software that
is needed to run Authorization Manager.
For an introduction to using Authorization Manager, see the following article:
http://msdn.microsoft.com/en-us/library/bb897401.aspx
Within Authorization Manager, roles are built up using operations and tasks, as
follows:
■ An operation is a low-level permission that represents a privileged action or
capability. When the Administration Console determines whether a role has
access to perform a task, it is the operations associated with the role that are
checked.
Operations with names prefixed by "{STO}" or "{DIR}" are internal operations
that do not affect the Administration Console display. Other, external operations
control the view of the Administration Console that an administrator sees.
■ A task is a group of operations that collectively provide sufficient permissions
to do a particular job.
A role is a collection of tasks and, possibly, operations and other roles.
Role Description
■ IMAP Administrator
■ NSF Administrator
■ Search Administrator
Managing administrator security 26
Roles-based administration
Role Description
■ IMAP Administrator
■ Search Administrator
Extension Content Provider Has a view of the Administration Console interface that
Administrator concentrates on those components that are required for the
day-to-day administration of extension content providers.
File Server Administrator Responsible for the day-to-day administration of File System
Archiving.
By default, users who are assigned to this role also acquire
the permissions that are associated with the following role:
■ Search Administrator
■ Search Administrator
■ Domino Administrator
■ Exchange Administrator
Managing administrator security 27
Roles-based administration
Role Description
Power Administrator Can perform all the tasks in the other predefined administrator
roles. Cannot perform reconfiguration tasks such as changing
the Vault Service account or Directory SQL server.
By default, users who are assigned to this role also acquire
the permissions that are associated with the following roles:
■ Exchange Administrator
■ Extension Content Provider Administrator
■ Indexing Administrator
■ Search Administrator
■ Indexing Administrator
Managing administrator security 28
Roles-based administration
Role Description
Role Description
Extension Content Provider This role allows a third-party application to act as an extension
Application content provider. The role allows the application to create,
delete, read, and update extension content provider entries
and to store items into any archive.
This role does not enable full update access to all extension
content provider properties. For example, an extension
content provider application cannot enable or disable itself
and cannot modify or override its own schedule.
Placeholder Application Able to run the FSAUndelete utility. This role enables the
undeletion of items from archives.
Note: The predefined Placeholder Application role does not allow access to the
Administration Console.
■ IMAP Administrator
■ NSF Administrator
■ Search Administrator
■ IMAP Administrator
■ Search Administrator
Managing administrator security 30
Roles-based administration
■ Search Administrator
■ Search Administrator
■ Domino Administrator
■ Exchange Administrator
■ Exchange Administrator
■ Extension Content Provider Administrator
■ Indexing Administrator
Managing administrator security 32
Roles-based administration
PST Admin ■ Policies: PST Migration; Retention ■ Site Property tabs: General; Site
Categories Schedule
■ Services: Task Controller ■ Import Archive
■ Tasks: Mailbox Archiving; PST ■ Export Archive
Locator; PST Collector; PST ■ Advanced Features
Migrator
■ Personal Store Management: All
functions
■ Search Administrator
■ Indexing Administrator
Managing administrator security 33
Roles-based administration
Note: If you have configured Enterprise Vault Reporting, you must enable the
synchronization of Enterprise Vault Reporting roles-based security.
See "Enabling the synchronization of Enterprise Vault Reporting roles-based
security" in the Reporting guide.
3 Right-click the role to which you want to assign users and then, on the shortcut
menu, click Assign Application Groups or Assign Windows Users and
Groups.
4 If you chose Assign Application Groups, check the users or groups you want
to add to the role, and then click OK.
5 If you chose Assign Windows Users and Groups, the standard Windows
Select Users, Computers or Groups dialog appears. Select the required
users or groups and then click OK to close the dialog box.
6 In the Authorization Manager File menu, click Exit. Click Yes to confirm that
you want to save your changes to the Directory database.
The changes take approximately one minute to be replicated to all Enterprise
Vault servers, and to any SQL Server Reporting Services servers on which
Enterprise Vault Reporting is configured. Wait a minute if you want to start
Authorization Manager again to make further changes.
Administration Consoles do not reflect the assignment changes until they are
restarted. After you perform role assignments, administrators may receive
role-related error messages until they restart the Administration Console.
■ Click Add.
■ The Add Definition window appears.
■ To add roles to the definition, check each role to add.
■ To add tasks to the definition, click the Task tab and then check each task
to add.
■ To add operations, click the Operations tab and then check each operation
to add.
Instead of adding individual operations to a role, we recommend that you
use tasks to create custom roles. The tasks contain the correct combination
of internal and external operations.
■ Click OK to close the Add Definition window.
4 If you want to add an entry to the list, click Add and then proceed as follows:
■ If you are adding the first entry on the list, there is a warning that adding
an entry to the list restricts access to those users with Grant access. Click
OK.
■ In the Add Users and Groups window, add the users or groups to whom
you want to grant or deny access to the container. Click OK.
The Admin Permissions list now shows the users and groups you have
added, with a Grant and Deny option next to each.
5 If you want to remove an entry from the list, click the entry to select it and then
click Remove.
6 For each user and group, select Grant to grant access to this container, or
Deny to deny access to this container, as required.
7 If you need to delete an entry from the list
8 Click OK to close Admin Properties.
If you have removed all entries from the list there is a warning that all
administrators in a role that allows access to this container now have access.
Click OK.
Note: You are recommended not to change the account name if possible, because
of the amount of work involved, and the potential for introducing mistakes that take
time to rectify.
Before you change the account, ensure that the following apply:
■ The new Vault Service account is part of the Administrators group, with
permission Full Control (All), on each Enterprise Vault computer in the Enterprise
Vault Site.
■ If Exchange Server archiving is implemented, the new account has full
permissions on the Microsoft Exchange Server.
■ The Microsoft Message Queue security has been set up to grant the
Administrators group access to the Enterprise Vault queues.
■ The new account has database creator access on the SQL server.
Managing administrator security 39
Changing the Vault Service account
■ If you use File System Archiving, you must ensure that the new account has
the required permissions and privileges on the following:
■ All target Windows file servers.
■ Other Windows servers on which the FSA Agent is installed: any proxy
servers for FSA Reporting and File Blocking agent servers for NetApp filers.
If you do not make the Vault Service account a member of the local
Administrators group on the file server, you must grant the account a set of
minimum permissions and privileges. See the appendix “Permissions and
privileges required for the Vault Service account on Windows file servers” in
Setting up File System Archiving.
For servers on which the FSA Agent is installed, you can use the
EVFSASetRightsAndPermissions utility to help you set the required permissions
and privileges. See “EVFSASetRightsAndPermissions” in the Utilities guide.
■ If SharePoint Server archiving is implemented, add the new Vault Service account
to the SharePoint sites, or to the group that contains the old Vault Service
account. The new account must be a local administrator on the SharePoint
Servers.
For instructions on how to set permissions for the Vault Service account, see
Enterprise Vault prerequisite software and settings in Installing and Configuring.
Note the following:
■ Always use the Administration Console to specify a new password for the Vault
Service account or to change the Vault Service account itself. Do not use the
Windows Services MMC snap-in to edit the logon credentials for an Enterprise
Vault service unless you are instructed to do so.
■ If you change only the password of the Vault Service account, and you have
installed the FSA Agent on any computers, you must update the logon credentials
that the FSA Agent services use.
See “Updating the logon credentials of the FSA Agent services” in Setting up
File System Archiving.
To change the Vault Service account
1 Start the Administration Console as the existing Vault Service account.
2 In the Administration Console, open Directory Properties and click the Service
Account tab.
3 Change the Vault Service account details to reference the new account.
4 On SharePoint servers, run the Enterprise Vault SharePoint Configuration
wizard and specify the new Vault Service account credentials.
Managing administrator security 40
Changing the Vault Service account
5 If you have installed any Enterprise Vault add-ons, you may need to change
the Vault Service account credentials in the add-on. See the documentation
that accompanies the add-on for information on how to do this.
6 Restart all Enterprise Vault services on all Enterprise Vault servers in the
Enterprise Vault Site.
7 Restart the Enterprise Vault services on any other computers that have
Enterprise Vault services installed. This includes the FSA Agent services on
any computers that have the FSA Agent installed.
See the following technical note for a summary of the various accounts and
permissions that are required by Enterprise Vault:
http://www.symantec.com/docs/TECH76700
Chapter 3
Day-to-day administration
This chapter includes the following topics:
■ Deleting an archive
Table 3-1 shows the event logs that Enterprise Vault uses.
Application Log The Application log includes Enterprise Vault events that show that
components have started or stopped, or that require you to take
some corrective action.
Symantec Enterprise All Enterprise Vault events, except for those from document
Vault conversion or from the Symantec Enterprise Vault CryptoModule.
Events that are placed in the Application Log also appear in here.
Symantec Enterprise Events that the Symantec Enterprise Vault CryptoModule generates.
Vault CryptoModule
For more information about Enterprise Vault and FIPS 140-2, see
the following article on the Symantec Support website:
http://www.symantec.com/docs/DOC4820
Note: This determines both the number of reports kept for scheduled archiving
runs, and the number kept for run-now archiving runs.
http://evsrv/EnterpriseVault/ExchangeArchivingReports.aspx?ExchSvr=exsrv
where:
■ evsrv is the Enterprise Vault server that hosts the Exchange mailbox archiving
task.
■ exsrv is the Exchange server that the Exchange mailbox archiving task targets.
The Exchange mailbox archiving reports web page contains links to the following
reports:
■ An HTML progress report for the Exchange mailbox archiving task, if the task
is still archiving.
■ A brief HTML report for each completed run of the Exchange mailbox archiving
task. Note that each brief HTML report contains a link to a detailed HTML version
of the report.
■ A detailed CSV report for each completed run of the Exchange mailbox archiving
task.
If the Enterprise Vault servers in your site target more than one Exchange server,
you can use the Exchange mailbox archiving reports site summary page at the
following URL:
http://evsrv/EnterpriseVault/ExchangeArchivingReports.aspx
In this case, evsrv can be any of the Enterprise Vault servers in your site.
This page lists all the Exchange servers targeted in your site, and provides a link
to the individual Exchange mailbox archiving reports web page on the Enterprise
Vault server that targets each Exchange server.
■ Scheduled, which contains reports from scheduled runs of the mailbox archiving
task.
Day-to-day administration 46
Monitoring MSMQ queues
Each of these folders contains a subfolder for each report. The individual report
folders are named using the following convention:
RunType_yyyymmdd_hhmmss
where:
■ RunType is “RunNow” or “Scheduled”.
■ yyyymmdd_hhmmss is the date and time the report was created.
Each report folder contains brief reports and detailed reports in HTML format, and
detailed reports in CSV format.
Note: The progress report for an Exchange mailbox archiving task that is still
archiving, is generated when it is requested from the Exchange mailbox archiving
reports web page. It is not stored on disk on the Enterprise Vault server.
■ Changing tasks, policies, or service settings. For many of the service settings
you must stop and restart one or more services before the new settings come
into effect. For details of which settings require a restart to take effect, see the
help for the property pages of each service and task.
■ Changing hardware configurations.
■ Reconfiguring a service.
■ Troubleshooting.
To stop a task
1 In the left pane of the Administration Console, expand Enterprise Vault
Servers.
2 Expand the name of the computer that runs the task you want to stop.
3 Click Tasks.
The results pane shows the tasks on that computer.
4 In the right pane, click the task you want to stop.
5 Do one of the following:
■ Click Stop the Task on the toolbar.
■ Right-click the name of the task and, on the shortcut menu, click Stop.
Day-to-day administration 48
About starting or stopping tasks or services
To stop a service
1 In the left pane of the Administration Console, expand Enterprise Vault
Servers.
2 Expand the name of the computer that runs the service you want to stop.
3 Click Services.
The results pane shows the services on that computer.
4 In the right pane, click the service you want to stop.
5 Do one of the following:
■ Click the Stop the Service button on the toolbar.
■ Right-click the name of the service and then, on the shortcut menu, click
Stop.
Day-to-day administration 49
Checking logs with the Windows Event Viewer
The Exchange Journaling task runs continuously, checking for items in journal
mailboxes and immediately archiving them. These items are deleted from the
mailbox as they are archived and no shortcuts are created.
It is important that you monitor journal mailboxes to make sure that items are
archived promptly. It is especially important that you do this if you have suffered
some sort of system failure which required a system restart.
If you are running an Exchange Journaling task, messages in the journal mailbox
should be archived soon after they arrive in the mailbox.
To check a journal mailbox
1 Run Microsoft Exchange Client or Microsoft Outlook.
2 Log on to a profile that has access to the journal mailbox.
3 Check that there are no messages in the Inbox folder that are older than one
day. If there are any messages older than one day, then there is likely to be a
problem.
4 Look in the following folders, which are under the Enterprise Vault Exchange
Journaling Task folder:
Above maximum size Contains messages that exceed the maximum size that is set
in the Exchange journaling policy.
Failed DL Expansion Contains the items that cannot be archived because Enterprise
Vault is unable to expand their distribution lists.
Failed External Filter Contains the messages that cannot be processed by a custom
filter.
Also check that the rule set file references the correct XML
schema.
Day-to-day administration 51
Monitoring journal mailboxes
Failed to copy Contains the messages that are probably corrupt. Try dragging
them to your desktop and then, when they are on the desktop,
double-clicking them.
You may find that the messages are now not corrupt. If you
drag them from your Desktop to the Inbox folder, the Exchange
Journaling task tries to archive them again. Remember to
delete the corrupt versions from the Failed to copy folder.
Failed to store Contains the messages that cannot be archived. They probably
failed because of a problem with the Storage service. You can
move all these items back to the Inbox folder and the
Exchange Journaling task tries again to archive them.
Invalid Journal Report Contains messages whose journal report (P1 envelope
message) does not conform to Microsoft’s specification.
You can force Enterprise Vault to use the default ANSI codepage (ACP codepage)
by deleting the appropriate codepage entry from the file. If you find that the ACP
codepage does not give you good conversions, replace the entry in Codepages.txt
and install the missing codepage.
To delete a codepage entry
1 Edit CodePages.txt on the Exchange Journaling task computer to remove the
entry for the codepage that caused the problem.
2 To prevent a similar problem happening on Exchange Mailbox task computers,
make the same change to CodePages.txt on each Exchange Mailbox task
computer.
3 If you use a building blocks configuration, repeat the change on every Enterprise
Vault server in your site.
Day-to-day administration 52
About monitoring disks
Note: Do not stop the Admin service unnecessarily. Enterprise Vault requires the
Admin service to be present at all times. If you do stop the Admin service, all the
other Enterprise Vault services on the same computer stop as well. Also, if you
start one of the other services and the Admin service is not running, the Admin
service automatically starts.
Day-to-day administration 54
About monitoring disks
To specify the disks that the Admin Type the following start parameter:
service should monitor. By default, the
/DISKS[=list]
service monitors all local hard disks.
where list specifies one or more disks to
monitor. Do not include any spaces or tabs
in the list. The colon (:) in the disk name is
optional.
/DISKS=C:E:F:
/DISKS=CEF
/DISKS=C:E:F: /SAVE
/DISKS=CEF /SAVE
/DISKS
To turn off monitoring for the instance Type the following start parameter:
of the Admin service that will start when
/NOMONITOR
you click Start in the Services control
panel.
Day-to-day administration 55
About maintaining the SQL databases
To turn off monitoring every time the Type the following start parameter:
Admin service starts.
/NOMONITOR /SAVE
To turn on monitoring for the instance Type the following start parameter:
of the Admin service that will start when
/MONITOR
you click Start in the Services control
panel.
To turn on monitoring every time the Type the following start parameter:
Admin service starts.
/MONITOR /SAVE
To apply the changes every time the Type the following start parameter:
Admin service starts.
/SAVE
/DISKS=EF /SAVE
Transaction log 80 MB
Total 180 MB
Data device 10 MB
Day-to-day administration 57
About maintaining the SQL databases
Transaction log 25 MB
Total 35 MB
Transaction log 80 MB
Day-to-day administration 58
About maintaining the SQL databases
Total 212 MB
Transaction log 80 MB
Total 180 MB
See "Maintaining the FSA Reporting databases" in the Enterprise Vault Reporting
guide.
Note: For information on how to create vault store groups and vault stores, and how
to set up a sharing regime that is suitable for your organization, see "Setting up
Storage" in Installing and Configuring.
■ Backup Mode: If the vault store is in backup mode, "Yes" appears in this
column. To place a vault store in backup mode, or to clear it from backup
mode, right-click the vault store and select Set backup mode or Clear
backup mode.
■ Sharing Type: Indicates the vault store's sharing level. You can change a
vault store's sharing level from the Sharing tab of its parent Vault Store
GroupSymantecs properties.
See “Changing the sharing level of a vault store” on page 60.
■ Computer: The computer whose Enterprise Vault Storage service the vault
store uses.
■ Safety Copy: The safety copy setting. This setting determines when
Enterprise Vault deletes safety copies. You can change the safety copy
setting from the Safety Copies tab of the vault store's properties.
■ Journal Safety Copy: The journal safety copy setting. This setting
determines when Enterprise Vault deletes journal safety copies. You can
change the safety copy setting from the Safety Copies tab of the vault
store's properties.
To see more details for a particular vault store, right-click the vault store and
select Properties.
Note: You can rerun the Configure Sharing wizard at any time, but changes you
make to the vault store sharing levels do not act retrospectively.
Day-to-day administration 61
About managing vault store groups and sharing
You can move a vault store to a different vault store group only if all of the following
circumstances apply:
■ You previously upgraded to Enterprise Vault 8.0.
■ The vault store is one that Enterprise Vault upgraded to Enterprise Vault 8.0,
or one that you created in the Default Upgrade Group.
■ The vault store's sharing level is "No sharing" and has never been changed.
Note that when you move a vault store, it retains the sharing level "No sharing".
To move a vault store to another vault store group
1 Right-click the vault store and select Change Vault Store Group from the
shortcut menu.
The Change Vault Store Group wizard starts.
2 Work through the Change Vault Store Group wizard.
For more information, see the help that is provided with the wizard.
Note: If you delete a vault store group, you cannot stop or undo the process. The
action overrides any form of deletion protection that is applied to items or Retention
Categories, other than legal hold.
Note: Enterprise Vault removes safety copies when the Storage service is started
or when backup mode is cleared from the vault store.
For more information about the configuration of safety copies, see “About Enterprise
Vault safety copies” in Installing and Configuring.
Day-to-day administration 65
About managing safety copies
Note: This option is available only if Default behavior is set to Yes, in the
original location. If you require different settings for journaling you can use a
separate vault store.
5 If you selected the Check for a trigger file option, you can also set a partition
scan interval, which determines how often Enterprise Vault checks the partition
for a trigger file. Select the Scan partition every option and set a scan interval
in minutes.
6 Click OK.
Note: Centera partitions cannot be rollover enabled, which means Enterprise Vault
cannot roll over from a Centera partition. However, Centera partitions can be rollover
ready.
You can enable and configure partition rollover for each partition when you create
it using the New Partition wizard. For more information on creating a new vault
store partition, see the Setting up storage chapter of the Installing and Configuring
manual. You can also configure partition rollover for existing vault store partitions,
using the Vault Store Partition Properties page.
Each partition can be configured to roll over using any of the following options:
■ Enabled based on volume. Partition rollover is enabled for this partition, and
occurs according to the amount of free space on the volume that hosts the
partition.
■ Enabled based on time. Partition rollover is enabled for this partition, and
occurs according to the time criteria you specify.
■ Enabled based on time or volume. Partition rollover is enabled and occurs
according to whichever of the volume criteria or time criteria are met first. For
example, you can configure the partition to roll over when its host volume falls
below 5% free space, or on a specific date, whichever comes first.
Depending on the choice you make, you can then set appropriate rollover criteria.
If you choose either Enabled based on volume or Enabled based on time or
volume, you can make appropriate settings to trigger partition rollover according
to the remaining free space on partition’s host volume. Set one of the following
criteria to trigger rollover:
■ A percentage of free space.
■ A specific amount of free space in MB, GB, or TB.
If you chose either Enabled based on time or Enabled based on time or volume,
you can make appropriate settings to trigger partition rollover. Set one of the
following criteria to trigger rollover:
Day-to-day administration 68
About managing partition rollover
Note: When you use date-based partition rollover, you must ensure that each
partition has sufficient storage capacity for period it is open.
Enterprise Vault also lets you use a mixture of volume and time criteria.
To enable and configure partition rollover on an existing partition
1 In the left pane of the administration console, expand the Vault Store Groups
container and select the vault store in which you want to configure partition
rollover.
2 In the right pane, right-click a partition and click Properties.
3 Click the Rollover tab.
4 From the Partition Rollover list, select one of the following options:
■ Enabled based on volume
■ Enabled based on time
■ Enabled based on time or volume
5 Use the options that are available to you to set appropriate rollover criteria for
this partition.
You can change partition rollover order using the Partition Rollover tab on the
Vault Store Properties page.
Note: You can place the partitions that are configured for volume-based rollover in
any order. However, you cannot break the rollover order for any partitions that are
configured for time-based rollover. For example, you cannot move a partition that
is configured to roll over on 10 October before one that is configured to roll over on
3 October.
where:
server is the Enterprise Vault server that runs the storage service for the vault
store in which you want to force partition rollover.
vault_store is the name or ID of the vault store in which you want to force
partition rollover.
For example:
Start-PartitionRollover EV1 VS1
This connects to the Enterprise Vault server EV1 and verifies that vault store VS1
uses the storage service on this server. If it does, Start-PartitionRollover forces
partition rollover in vault store VS1.
Storage expiry Delete items from archives when the items' retention periods have
expired.
Shortcut deletion Delete shortcuts from users’ Exchange mailbox folders and Exchange
public folders. You can configure Enterprise Vault to delete shortcuts
over a certain age, or shortcuts to items that have been deleted from
an archive.
If storage expiry for Exchange Server Archiving is based on archived date, and you
have configured Enterprise Vault to archive unexpired calendar, meeting, and task
items (that is, items with an end date in the future), then we recommend that you
use the advanced Exchange Mailbox policy setting, Future item retention category.
Day-to-day administration 72
About expiry and deletion
This ensures that storage expiry does not delete any archived calendar, meeting,
or task items before their end date.
See “Future item retention category (Exchange Archiving General setting)”
on page 143.
To set up storage expiry
1 In the left pane of the Administration Console expand the hierarchy until the
appropriate vault site is visible.
2 Right-click the vault site and then, on the shortcut menu, click Properties.
3 In the Site Properties dialog box, click the Storage Expiry tab.
4 Select the settings to use, and then click OK.
5 You do not need to configure shortcut deletion in the Exchange Mailbox policy
or Exchange Public Folder policy. The Exchange Mailbox task and Exchange
Public Folder task automatically delete expired item shortcuts when they next
run.
Note: If you plan to store items indefinitely on a WORM storage device, then ensure
that the retention settings on the device are correctly configured. For details, refer
to Enterprise Vault hardware requirements in the manual, Installing and Configuring.
Note: If you choose to use the inherited vault store or inherited Indexing service,
and the provisioning group includes mailboxes from more than one server, different
vault stores or Indexing services may be used for mailboxes that are enabled
according to this provisioning group. Depending on the configuration options that
you have chosen, it is also possible that mailboxes on a particular server cannot
be enabled because no vault store or Indexing service is defined for them.
■ You can manually enable archiving for specific Microsoft Exchange Server
mailboxes. If you have not set up Enterprise Vault to enable archiving for
mailboxes automatically, you must use this method to enable archiving for
mailboxes.
Making Enterprise Vault enable archiving for new mailboxes automatically means
that you do not need to enable each mailbox manually whenever there is a new
Microsoft Exchange Server mailbox.
The advantage of enabling archiving manually is that you can select a specific vault
store as the location for each archive that is created.
Note that, if you make Enterprise Vault automatically enable archiving for new
mailboxes, the new archives are created the next time an Exchange Mailbox task
runs. If there is a new mailbox that you want to be archived somewhere other than
the default vault store, you must manually enable archiving for that mailbox before
the Exchange Mailbox task runs. If you do not enable the mailbox yourself, Enterprise
Vault automatically enables archiving for it and creates an archive in the default
location.
If you want all the new archives to be in the same vault store, making Enterprise
Vault automatically create archives is the option that means the least work on your
part. It is easy to turn this option on or off. For example, you can make Enterprise
Vault automatically create archives on the first run of the Exchange Mailbox task,
and then turn off the option and enable new mailboxes manually.
When Enterprise Vault automatically enables archiving for a mailbox, the new
archive is stored in the default location.
To make Enterprise Vault enable archiving for new mailboxes automatically
1 In the left pane of the Administration Console, expand the vault site hierarchy
until the name of the vault site is visible.
2 Expand the vault site and then expand Archiving Targets.
3 Expand Exchange.
4 Expand the required domain.
5 Click Provisioning Group.
If no provisioning groups are listed, create a new one as follows:
■ Right-click Provisioning Group and, on the shortcut menu, click New and
then Provisioning Group.
■ Work through the New Provisioning Group wizard.
6 In the right pane, double-click the provisioning group that will contain the
mailboxes that will be enabled automatically.
Day-to-day administration 76
Enabling archiving for new mailboxes
■ You can select an existing archive to use for a mailbox that is being enabled.
This is useful when a mailbox has been migrated to a different Exchange
Server in the same Enterprise Vault site and needs to be enabled for
archiving to the same archive as before.
following PowerShell cmdlets to view and change the legal hold status of the
archives:
You run the cmdlets directly in the Enterprise Vault Management Shell on the
Enterprise Vault server.
To run one of the Enterprise Vault PowerShell cmdlets
1 Start the Enterprise Vault Management Shell.
PowerShell opens and loads the Enterprise Vault snap-in. The cmdlets are
now available in the shell.
2 At the PowerShell command prompt, type the required command.
Help is available for all the cmdlets. For example, the following command shows
the detailed Help for the Get-EVArchive cmdlet:
Get-Help Get-EVArchive -detailed
Synopsis
Returns a list of the Enterprise Vault archives to which a specified user has access.
Syntax
Get-EVArchive -Server <string> -User <string> [-DeleteProtected
<Boolean>] [-DeleteExpiredItems <Boolean>] [-OnHold <Boolean>]
[-Permissions <string>]
Description
Get-EVArchive returns a list of the Enterprise Vault archives in which a specified
user has various permissions, either directly or through membership of an Active
Directory group. You can filter the list by a number of archive properties. For
example, you can choose to list only those archives in which the user has permission
to delete the archived items, or only those archives that are on legal hold.
Day-to-day administration 79
About applying or removing legal holds on selected archives
Parameters
-Server Mandatory. Identifies the Enterprise Vault server for which to
retrieve the archive list.
-User Mandatory. Identifies the user for which to retrieve the archive
list. Type the user's Windows logon name, user principal name,
or Domino user ID.
-DeleteProtected Optional. Filters the archive list according to whether the user
can manually delete the items in the archives. Set to $false to
list the archives in which the user can manually delete items,
or $true to list the archives in which the user cannot delete
items.
-OnHold Optional. Filters the archive list according to the legal hold status
of the archives. Set to $false to list the archives in which either
the user or Enterprise Vault (or both) can delete items, or $true
to list the archives that are on legal hold. (Legal hold is
equivalent to DeleteProtected set to $true and
DeleteExpiredItems set to $false.)
Examples
Get-EVArchive MyEVServer Domain\User
Lists the archives on the Enterprise Vault server "MyEVServer" in which the user
"Domain\User" has delete permissions.
Get-EVArchive localhost [email protected] -DeleteProtected $false
-DeleteExpiredItems $false -Permissions rw
Lists the archives on the local server in which the user "[email protected]" has
both read and write permissions. Get-EVArchive filters the list to show only those
archives in which the user can manually delete items but in which Enterprise Vault
cannot automatically delete expired items.
Day-to-day administration 80
About applying or removing legal holds on selected archives
Lists the archives on the local server in which the user "Domain\User" has delete
permissions. Get-EVArchive excludes from the list all the archives that are on legal
hold.
Synopsis
Sets the properties of the nominated archive.
Syntax
Set-EVArchive -ArchiveID <string> [-DeleteProtected <Boolean>]
[-DeleteExpiredItems <Boolean>] [-Description <string>] [-AdminNote
<string>]
Description
Set-EVArchive sets a number of properties of the nominated archive, including
whether users can manually delete the items in the archive and whether Enterprise
Vault can automatically delete the archived items when their retention period has
expired. You can also specify a description and administrative note for the archive
for display in the Administration Console.
Parameters
-ArchiveID Mandatory. Specifies the ID of the archive for which to set the
properties. You can obtain the required ID with the
Get-EVArchive cmdlet.
Examples
Set-EVArchive 14BC45D9EE238494DAB7B94DBA90BB3401110000EVSERVER.LOCAL
-DeleteProtected $true -DeleteExpiredItems $false
Stops both users and Enterprise Vault from deleting the items in the nominated
archive, and so places it on legal hold.
Set-EVArchive 14BC45D9EE238494DAB7B94DBA90BB3401110000EVSERVER.LOCAL
-DeleteProtected $false -AdminNote "Item deletion allowed $(get-date)
by $(gc env:username)"
Allows users manually to delete the items in the nominated archive, and modifies
its administrative note.
Get-EVArchive localhost Domain\User -OnHold $false | Set-EVArchive
-DeleteProtected $true -DeleteExpiredItems $false -Description
"Archive placed on hold $(get-date) by $(gc env:username) from $(gc
env:computername)"
With Get-EVArchive, generates a list of the archives on the local Enterprise Vault
server which are not on legal hold and in which the user "Domain\User" has delete
permissions. Get-EVArchive passes the list to Set-EVArchive, which places the
archives on hold and sets the archive description accordingly.
Note: Move Archive supports the move of archives to destination servers that run
Enterprise Vault 10.0 or later.
Day-to-day administration 82
About moving archives
Move Archive handles each move operation differently, depending whether the
source and destination archives are associated with a mailbox at the time of the
move. Move Archive considers an archive to be:
■ Active if it is associated with a mailbox, regardless of whether the mailbox is
enabled for archiving
■ Inactive if it is not associated with a mailbox
Move Archive does not support move operations for the following archive types:
■ File System Archiving (FSA) archives
■ SharePoint archives
■ Shared archives
■ Exchange public folder archives
Move Archive also prevents moves in the following circumstances:
■ The source archive exceeds its archive usage limit and the destination is a new
archive.
■ The destination archive exceeds its archive usage limit.
In these cases you should increase the appropriate archive’s usage limit on the
Archive Properties: Archive Usage Limit tab in the Administration Console.
Note: During a move operation, Move Archive does not copy these deleted items
from the source archive to the destination. As a result, the deleted items are not
available for recovery from the destination archive.
From this point, Enterprise Vault archives new content to the destination archive.
■ The mailbox archiving task on the destination server points all the shortcuts in
the user’s mailbox to the content in the new archive in the destination site.
Move Archive completes this step even if you do not use mailbox shortcuts in
your environment.
■ Move Archive waits for the destination vault store to be backed up.
■ Move Archive verifies that all the data is present in the destination archive.
The move operation is now complete and you may delete the source archive.
■ Move Archive copies the data from the source archive to the destination.
■ Move Archive waits for the destination vault store to be backed up.
■ Move Archive verifies that all the data is present in the destination archive.
The move operation is now complete and you may delete the source archive.
Note: When move operations cross two Active Directory domains, a one-way trust
is required for the moves to proceed. The destination domain must trust the source
domain.
Between Enterprise Vault sites, Move Archive supports the following move:
■ Moving an inactive archive to an active archive
Note: Ensure that you run the provisioning task before running the Enable Mailbox
wizard to remove association of the mailbox with the original Site.
The user’s mailbox is now enabled for archiving in the destination site, but the
existing shortcuts in the user’s mailbox still point to the source archive. New content
is archived to the newly created destination archive.
When you have moved the user’s mailbox and enabled it for archiving in the
destination site, you can move the inactive source archive. In this case, the move
operation includes the following steps:
■ Move Archive closes the source archive. However, the source archive is still
accessible in read-only mode.
■ Move Archive renames the source archive. It appends the archive’s creation
date, and the date of the move operation to the archive’s name.
■ Move Archive copies the data from the source archive to the destination.
■ The mailbox archiving task on the destination server points all the shortcuts in
the user’s mailbox to the content in the newly created archive in the destination
site.
Move Archive completes this step even if you do not use mailbox shortcuts in
your environment.
■ Move Archive waits for the destination vault store to be backed up.
■ Move Archive verifies that all the data is present in the destination archive.
The move operation is now complete and you may delete the source archive.
■ Move Archive closes the source archive to prevent Enterprise Vault from
archiving any further content to it. However, the source archive is still accessible
in read-only mode.
■ Move Archive renames the source archive. It appends the archive’s creation
date, and the date of the move operation to the archive’s name.
■ Move Archive copies the data from the source archive to the destination.
■ If the destination archive is associated with a user mailbox, Enterprise Vault
synchronizes the permissions from the user’s Domino or Exchange mailbox to
the new archive.
■ If the destination archive is associated with a user mailbox, the mailbox archiving
task on the destination server points all the shortcuts in the user’s mailbox to
the content in the destination archive.
Move Archive completes this step even if you do not use mailbox shortcuts in
your environment.
■ Move Archive waits for the destination vault store to be backed up.
■ Move Archive verifies that all the data is present in the destination archive.
The move operation is now complete and you may delete the source archive.
A basic version of this file exists in the Enterprise Vault installation folder, for example
C:\Program Files (x86)\Enterprise Vault. The installation folder also contains
another file which is called Example EvMoveArchiveTask.exe.config. This file
contains examples of the additional settings you can change to control the Move
Archive task.
To change the default behavior of the Move Archive task
1 Rename EvMoveArchiveTask.exe.config in case you need to revert to it
later.
2 Edit the settings in Example EvMoveArchiveTask.exe.config, as described
in the following sections.
3 Rename the file to EvMoveArchiveTask.exe.config.
4 Restart the Move Archive task.
Default value: 5
Minimum value: 1
Default value: 30
Minimum value: 5
Day-to-day administration 90
About moving archives
Note: All the items in one vault store must have a unique transaction ID. Move
Archive considers two items in one vault store to be duplicates when they both have
the same transaction ID.
Default value: 0
Default value: 30
Minimum value: 5
Note: Move Archive supports the move of archives to destination servers that run
Enterprise Vault 10.0 or later.
Move Archive does not support move operations for the following archive types:
■ Closed archives
■ File System Archiving (FSA) archives
■ SharePoint archives
■ Shared archives
■ Exchange public folder archives
Move Archive also prevents moves in the following circumstances:
■ The source archive exceeds its archive usage limit and the destination is a new
archive.
■ The destination archive exceeds its archive usage limit.
In these cases you should increase the appropriate archive’s usage limit on the
Archive Properties: Archive Usage Limit tab in the Administration Console.
Selecting a site
If you have chosen to move archives to a destination that contains more than one
site, this page lets you select a destination site.
To select a destination site
◆ Select a site from the Destination Site list.
Selecting archives
Use this page to select the archives you want to move, and to select destination
archives.
Note: Move Archive does not let you move ineligible archives. You cannot move
closed archives, FSA archives, SharePoint archives, shared archives, Exchange
public folder archives, or archives that contain items placed on legal hold by
Discovery Accelerator.
To add archives
1 Click Add.
2 Use the Select Source dialog box to add the archives you want to move.
When you move an archive that is currently in use by an archiving-enabled user,
you can only move it to a new archive. In this case, <New archive> is selected
automatically in the Destination Archive column next to the archive, and you
cannot change it. You can only move active archives within a site.
When you move an inactive archive, you can select an existing archive as the
destination, either in the current site or in another site.
To select a destination archive
1 Select the source archive for which you want to select a destination archive.
2 Click Move To and click Select Destination.
3 Use the Select Destination dialog box to select a destination archive.
Day-to-day administration 94
About moving archives
Select destination
Use this dialog box to search for the archive you want to set as the destination.
To search for a specific archive
1 Enter all or part of the name of an archive in the search box.
2 Click the search icon.
The archives whose names contain the string you entered appear in the list.
You can display the properties of any of the archives in the list.
To show an archive’s properties
1 Select the archive whose properties you want to see.
2 Click Properties.
To set an archive as the destination
◆ Select the archive and click OK.
For each source retention category where there is no match, you must select a
destination retention category.
To select or change a destination retention category
1 Find the source retention category whose destination retention category you
want to change.
2 Under the Destination Retention Category column, use the drop-down list
by each source retention category to select a destination retention category.
You can also display more information about any pair of source and destination
retention categories on this page.
To display the properties of a pair of source and destination retention categories
1 Select the row whose properties you want to display.
2 Click Properties.
If you do not find a suitable retention category in the destination site, you can use
the Administration Console at the destination site to create one. When you have
done this, click Refresh on this page to make the new retention category available
for selection.
to start automatically each time the task controller service starts. If you want to start
the task straight away, select the Start the new tasks now option. Enterprise Vault
shows this option only once for each storage server.
Note: You cannot stop a move operation during the shortcut processing stage.
You can use Restart when the move status is either Completed or Completed
with errors.
You can use Continue or Retry failed items when the move status shows Failed
or Error.
You can wait for the task to run to its schedule, or right-click the task and click
Run Now.
Note: Shortcut processing for disabled archives occurs only when you run the
mailbox archiving task for all mailboxes.
During this stage, Move Archive checks whether shortcut processing has
completed and enters a sleep state if it has not completed. By default, the length
of the sleep state is 30 minutes. When the sleep state ends, Move Archive again
checks to see if the shortcut processing has completed.
Move Archive completes this step even if you do not use mailbox shortcuts in
your environment.
■ Step 3 of 5 - Updating shortcuts. The Domino or Exchange mailbox archiving
task is updating the shortcuts in the user’s mailbox.
■ Step 4 of 5 - Waiting for destination backup. Move Archive is waiting for the
vault store that contains the destination archive to be backed up. During this
stage, Move Archive checks whether the destination archive has been backed
up and enters a sleep state if it has not been backed up. By default, the length
of the sleep state is 30 minutes. When the sleep state ends, Move Archive again
checks to see if the destination archive has been backed up.
■ Step 5 of 5 - Verifying moved items (x%). Move Archive is checking that the
destination contains all the items that it moved from the source archive. This
does not include items that users have deleted, and items that Enterprise Vault
has expired.
■ Error. When Move Archive encounters an error on an archive, it tries to move
the archive five times before it changes the status to Failed. In between retries,
Move Archive sets the archive’s status to Error.
Move operations whose status is Error appear in red and require your
intervention to proceed.
■ Completed. Move Archive has completed all processing for this archive.
■ Completed with errors. Move Archive has completed all processing but there
were some errors.
For more information on move operations that have completed with errors, see
the following technical note on the Enterprise Vault Support website:
http://www.symantec.com/docs/TECH77475
■ Failed. Move Archive has failed to process the archive.
Move operations whose status is Failed appear in red and require your
intervention to proceed.
Day-to-day administration 100
About moving archives
To find why a Move Archive operation has failed, check the Move Archive report
files in the Reports\Move Archive subfolder of the Enterprise Vault installation
folder (for example C:\Program Files (x86)\Enterprise Vault).
See “Move Archive reporting and monitoring” on page 102.
Move Archive lets you use Continue or Retry failed items on move operations
that have a status of Failed or Error, unless the failure occurred during the
verification stage. You can use Restart when the move status is either Completed
or Completed with errors.
See “Managing Move Archive operations with Failed and Error statuses” on page 101.
See “How Compliance Accelerator and Discovery Accelerator affect Move Archive”
on page 83.
At the end of a move operation, an archive’s status can be Completed with errors.
This happens when Move Archive records errors during the move, but does not
consider the errors to be serious enough to terminate the move operation. Before
you remove archives that have completed with errors, you should check the Move
Archive log files for the archive to ensure the errors are not serious or unexpected.
For example, you might expect some items to be absent following the failure of a
storage device.
For more information on move operations that have completed with errors, see the
following technical note on the Enterprise Vault Support website:
http://www.symantec.com/docs/TECH77475
To remove completed archives
1 Select the completed archives you want to remove from the Move Archive
Status page.
2 Click the Delete button on the toolbar.
3 At the prompt Do you want to delete the source archives as well?, click
Yes if you want to delete the associated source archives, or No if you do not.
Day-to-day administration 101
About moving archives
If you choose not to delete source archives when you remove them from the Move
Archive Status page, you can remove them subsequently from the Administration
Console.
MoveArchive_archive_yyyymmddhhmmss.txt
MoveArchive_archive_yyyymmddhhmmss_Errors.txt
MoveArchive_archive_yyyymmddhhmmss_Verification_nnnn.txt
where:
■ archive is the name of the archive.
■ yyyymmddhhmmss is the date and time when the report was generated.
■ nnnn represents a sequential number. To produce verification files of a
manageable size, Move Archive rolls over the verification report to a new file
each time the maximum file size is reached. This sequential number shows the
order of the files.
MoveArchive_archive_yyyymmddhhmmss.txt contains a summary report for the
move operation. The report shows the start and end time for the move operation,
including the times for the start and end of each phase. It also shows counts of the
items processed.
MoveArchive_archive_yyyymmddhhmmss_Errors.txt reports errors that occurred
during the move operation.
MoveArchive_archive_yyyymmddhhmmss_Verification_nnnn.txt contains a
report of any differences between source items and their corresponding items in
the destination archive.
For information on how to troubleshoot Move Archive verification errors, see the
following technical note on the Enterprise Vault Support website:
http://www.symantec.com/docs/TECH77475
Deleting an archive
You can delete an archive, provided that the Administration Console shows a status
of Available or Closed.
Note the following:
■ There is no undo when you delete an archive, and you cannot stop the deletion
process.
Day-to-day administration 103
Deleting a vault store
■ Be careful about deleting an archive that still has an associated mailbox. There
will be many errors from the Exchange Mailbox task when it tries to archive to
a deleted archive. Make a note of those users who have access to the archive
and then get them to change their archiving settings, so that they do not try to
archive to the archive you are about to delete. Use the Permissions tab on the
archive's property page to find out who has access to the archive.
To delete an archive
1 In the Administration Console, with the archive displayed in the listing, press
F5 to refresh the view. This shows you the archive's current status.
2 Right-click the archive that you want to delete and, on the shortcut menu, click
Delete.
3 When prompted, confirm that you do want to delete the archive.
The archive's status changes to Marked for deletion. You can no longer view
the properties of the archive and shortcuts to items within the archive no longer
work.
Note: If you delete a vault store, you cannot stop or undo the process. The action
overrides any form of deletion protection that is applied to items or Retention
Categories, other than legal hold.
■ Event 4257 whenever the event filtering configuration is changed or when the
Admin service starts. This event summarizes the event filtering configuration.
■ Event 4254 (Critical Error), 4255 (Critical Warning), or 4256 (Informational). This
event is generated every 15 minutes to summarize the events that have been
filtered in the previous 15 minutes. The severity of the event is the same as that
of the highest-severity event that has been suppressed. The event is not logged
if no events have been suppressed.
■ Event 4258 (Critical Informational) or 4259 (Critical Informational). This event
is generated when the event filter is disabled and when the Admin service shuts
down. The event summarizes the events that have been suppressed.
HKEY_LOCAL_MACHINE
\SOFTWARE
\Wow6432Node
\KVS
\Enterprise Vault
\Event Filter
Table 4-1 lists the registry values that you can create to control event filtering.
MaxEventsInSequence The maximum number of events that a process can ■ Type: DWORD
generate in succession before events are suppressed. ■ Default: 12
■ Values: 2 to 100
MaxSecsBetweenEventsInSequence The maximum time difference between events for them to ■ Type: DWORD
be treated as part of the same sequence. Events that occur ■ Default: 180
more frequently can be suppressed. (seconds)
■ Values: 1 to 86400
(1 day)
NeverSuppressEventIDs A semicolon-delimited list of the IDs of those events that ■ Type: String
Enterprise Vault must not suppress no matter how many ■ Default: None
times they are generated.
ReportConfigPeriodMinutes A time interval in minutes that determines the following: ■ Type: DWORD
1234;5678;4133
Chapter 5
Managing indexes
This chapter includes the following topics:
Verify wizard Use the Verify wizard to check that index volumes
are accessible, healthy, and up to date.
Change Location wizard Use the Change Location wizard to help you to
move index volumes to a new location.
In situations where you cannot wait for a task or subtasks to complete, you must
first stop then delete the relevant existing tasks. Use the Monitor Indexing Tasks
page, including its subtask view to stop and delete tasks.
Note that you must also delete failed tasks before you can submit new tasks for
affected archives, index volumes and index locations.
Note: The Upgrade wizard is absent from the Manage Indexes Wizard if there are
no 32-bit index volumes, such as in a new installation of Enterprise Vault.
Archives that were created by Enterprise Vault 9 or earlier have one or more 32-bit
index volumes. Journal archives typically have multiple index volumes. Other types
of archive such as mailbox archives usually have only one index volume.
For all archive types, the Enterprise Vault upgrade closes the old 32-bit index
volumes and creates a new, live 64-bit index volume for each archive. Subsequently
when users search their archives, Enterprise Vault uses the content from both the
32-bit and 64-bit index volumes.
When you use the Upgrade wizard to upgrade 32-bit index volumes to 64-bit, it
consolidates 32-bit index volumes if it can to create fewer 64-bit index volumes. In
Managing indexes 115
About the indexing wizards
the case of journal archives, this consolidation excludes the new 64-bit index volume
that was created during the upgrade to Enterprise Vault 10.0. For all other archive
types however, the upgrade includes the new 64-bit volume in the consolidation.
By default, complete verification does not log individual items that are missing
content, such as attachments that have not been indexed because they are
encrypted. Only the total number of items that are missing content is listed in the
log file. If you want each item that is missing content to be logged individually, select
the Include content missing details option when you initiate a complete verification
task.
During complete verification, users can search their archives but no new entries
are added to the index volumes.
Each time you run the Verify wizard, you can choose to create a synchronization
task automatically for each index volume in which it encounters missing items and
orphaned index entries.
Note: This wizard replaces the Repair Index Volume feature in versions of Enterprise
Vault before version 10.0.
wizard to rebuild index volumes after you have changed indexing level. In this case,
the index volumes are rebuilt with the new indexing level you have set.
When you use the Rebuild wizard to rebuild all the index volumes associated with
an archive, the rebuild consolidates the index volumes if possible to create a smaller
number of rebuilt index volumes. For all archive types, this consolidation includes
the archive’s live index volume.
If you choose to copy the index volumes after you run the Change Location wizard,
it creates a change location task which sets the index volumes offline then pauses
while you copy the files. When you have copied the files, you can use the Monitor
Indexing Tasks page to indicate that you have copied the files for the relevant
change location task. The task then completes the configuration of the new location.
You can also click Clear All to clear existing search criteria before you start a new
search.
For each task, the search results show the following information:
■ Task. The name of the task.
■ Type. The type of the task.
■ Created Date. The date and time the task was created.
■ Not Active. The number of inactive subtasks associated with the task. This
number includes the numbers of subtasks whose status is Inactive, Queued,
Waiting, or Stopped.
■ Active. The number of active subtasks associated with the task. This is the
number of subtasks whose status is Processing.
■ Successful. The number of successful subtasks associated with the task. This
is the number of subtasks whose status is No errors.
■ Unsuccessful. The number of unsuccessful subtasks associated with the task.
This number includes the numbers of subtasks whose status is Warnings, Will
retry, or Failed.
■ Successful Subtasks. The bar shows progress through the subtasks associated
with the task.
If all the statuses of the subtasks are all in Active or Successful categories,
the bar is green. If any of the subtasks have statuses in the Not Active category,
the bar is yellow. If any of the subtasks have statuses in the Unsuccessful
category, the bar is red.
Select tasks from the list and use the buttons on the button bar or the items on the
Actions menu to initiate the following actions:
■ Start. Click to start stopped tasks.
■ Stop. Click to stop running tasks.
■ Restart. Click to restart tasks.
■ Retry. Click to retry failed tasks.
■ Delete. Click to delete tasks.
■ I have copied the files or Process waiting subtasks.
For change location tasks, click I have copied the files when you have copied
the files associated with the task to their new location.
For all other tasks, click Process waiting subtasks to process the waiting
subtasks.
Managing indexes 121
About the indexing wizards
■ Show all subtasks for the current task (button bar only). Click to show the
subtasks associated with the selected parent task.
You can also click the name of a task to show its associated subtasks.
See “Using the Monitor Indexing Tasks page (subtask view)” on page 121.
■ Copy selection to clipboard (Actions menu only). Click to copy details of the
selected tasks to the clipboard.
■ Refresh view. Click to refresh the current view.
Archive Name The name of the archive that the subtasks are
associated with.
Index Volume Range The range of sequence numbers of the items indexed
in the index volume.
Items Added For upgrade and rebuild subtasks, this shows the total
number of items successfully processed.
Original Location For change location subtasks, this shows the original
location of the index volume.
Select subtasks from the list and use the buttons on the button bar or the items on
the Actions menu to initiate the following actions:
■ Switch back to parent task summary view (button bar only). Click to show
the task view.
■ Start. Click to start stopped subtasks.
■ Stop. Click to stop running subtasks.
■ Restart. Click to restart subtasks.
■ Retry. Click to retry failed subtasks.
■ Delete. Click to delete subtasks.
■ I have copied the files or Process waiting subtasks.
Managing indexes 123
About the indexing wizards
For change location tasks, click I have copied the files when you have copied
the files associated with the subtask to their new location.
For all other subtasks, click Process waiting subtasks to process the waiting
subtasks.
■ Open report. Click to open the report file associated with the subtask.
■ Save report. Click to save the report file associated with the subtask.
■ Details. Click to display details about the selected subtask.
■ Copy selection to clipboard (Actions menu only). Click to copy details of the
selected subtasks to the clipboard.
■ Refresh view. Click to refresh the current view.
Subtask statuses
Table 5-1 Subtask statuses
Not active Inactive The subtask is inactive. This can happen in the following
cases:
Will retry Change location and verify subtasks can have this status
when errors occur. The Index Administration Task tries a
subtask up to five times when it encounters errors, in case
the errors are transient. After five tries, if the errors persist
the subtask is marked as Failed.
If you can ascertain and rectify the cause of the failure, use
the Retry action in the Monitor Indexing Tasks page to retry
the subtask.
ascertain and rectify the cause of the failure, use the Retry action in the Monitor
Indexing Tasks page to retry the subtask.
If any of your verification subtasks fail, or complete with warnings about missing
items and orphaned index entries, consider submitting a synchronization task for
the same archive, index volume or index location. You do not need to do this if you
selected the Auto Synchronize option when you originally added the verification
task because Enterprise Vault automatically creates synchronization tasks in this
case.
Note: Indexes that were created before you add a new indexing exclusion are not
affected. Content that matches the new exclusion remains in the existing indexes
unless you rebuild them.
For each Enterprise Vault site, you can add as many indexing exclusions as you
need. Enterprise Vault accepts plain text exclusion content, which it then normalizes
by removing leading and trailing white space, and by replacing consecutive white
space characters with a single space.
During subsequent indexing, Enterprise Vault makes case-sensitive comparisons
between the exclusion text and email content, and excludes from indexes any
matches that occur.
When you delete an existing indexing exclusion, archived content that matches the
deleted exclusion is not reinstated in indexes unless you rebuild them.
Note that it can take two hours from the time you add, edit or remove an indexing
exclusion before the changes fully take effect.
Cmdlet Description
Using Get-IndexServerForIndexLocation
Use the following syntax when you run Get-IndexServerForIndexLocation:
Get-IndexServerForIndexLocation -Location <String>
[<CommonParameters>]
Using Set-IndexMetadataSyncLevel
Use the following syntax when you run Set-IndexMetadataSyncLevel:
Set-IndexMetadataSyncLevel -EntryId <String> -SyncLevel <String>
[<CommonParameters>]
■ Indexes items that are present in archives but have not been
indexed, and removes orphaned index entries for items that
do not exist in the archives
■ Checks that all the index locations stored in the Directory
database are correctly referenced in the index metadata
■ About the advanced policy settings for Domino mailbox and desktop policy
■ Editing the advanced settings for Domino mailbox and desktop policy
How to apply the new settings for Domino mailbox and desktop policy
Modified mailbox and desktop policy settings are applied to users' mailboxes during
the next synchronization run of the Domino Provisioning task. If you want to apply
the changes before the next synchronization, run Synchronize Individual Mailboxes,
which is on the Synchronization tab of the Domino Provisioning task’s properties.
Supported values ■ Reprocess. Items that have failed repeatedly are reprocessed on
each archiving run.
■ Do not reprocess (default). Items that have failed repeatedly are not
reprocessed on later archiving runs.
Supported values ■ Off (default). Items in the Deleted Items folder are not archived.
■ On. Items in the Deleted Items folder are archived.
Advanced Exchange mailbox and desktop policy settings 139
Exchange mailbox policy advanced settings
Supported values ■ Off. Enterprise Vault does not archive items from managed folders.
Additionally, users are not allowed to archive items manually from
managed folders.
■ Normal. Enterprise Vault treats managed folders as normal mailbox
folders.
The value Normal lets users modify the contents of managed folders
in Virtual Vault, provided the Virtual Vault policy settings allow such
operations. For example, users can move items as follows:
■ From the mailbox to a managed folder in Virtual Vault
■ From a managed folder in Virtual Vault to another Virtual Vault
folder
■ Managed (default). Enterprise Vault archives items from managed
folders and uses retention settings that are synchronized from
Exchange Server.
The Archive naming convention setting lets you select the naming
convention to use for archives. You can use this setting to ensure that
the name given to an archive is unique within the organization. This
setting is particularly useful if you use Symantec Discovery Accelerator
to search multiple Exchange mailbox archives.
If you modify the value of this setting, check that the value of the
advanced policy setting, Reset archive names, is On. This setting is
in the Archiving general list of settings.
Supported values The following list describes the valid values for the setting. In the
examples given, the resultant archive names assume that the user,
John Doe, has the following account and mailbox details:
Domain: "EXAMPLE"
Supported values ■ Off (default). Unexpired calendar items are not archived.
■ On. Unexpired calendar items are archived.
Supported values ■ Off. Items that have pending reminders are archived.
■ On (default). Items that have pending reminders within the next five
years are not archived.
Supported values ■ Off. Use Unicode when encoding the bodies of customized
Enterprise Vault shortcuts.
■ On. Always use ANSI code pages when encoding the bodies of
customized Enterprise Vault shortcuts.
If Enterprise Vault storage expiry for your site is based on the archived
date of an item, then archived calendar, meeting, or task items with an
end date in the future could be deleted by Enterprise Vault storage
expiry before the end date of the item. To prevent this, you can create
a retention category that Enterprise Vault will apply automatically to
such items when they are archived, and specify this retention category
in this policy setting. In the retention category properties, we recommend
that you set the value of Base expiry on to Modified date, and
configure the retention period as Retain items forever.
Note: The retention category will not be applied retrospectively to items
that have already been archived.
Supported values ■ The name of an existing retention category that you have set up to
be used for these items. For example, Future Calendar Items.
■ Leave blank to use the default retention category for the provisioning
group. This is the default value.
Supported values ■ Off. During synchronization archive names are never changed.
■ On (default). During synchronization, archive names are
automatically changed if necessary to match mailbox names.
This setting enables you to change the behavior so items that fail
archiving are marked as Do Not Archive and thus are not reprocessed
on the next archiving run.
Supported values ■ Off (default). Failed items are not marked as Do Not Archive.
■ On. Failed items are marked as Do Not Archive.
Description:
Supported values ■ Off. Do not warn when a folder has Default or Anonymous
permissions set.
■ On (default). Warn when a folder has Default or Anonymous
permissions set.
Supported values ■ Off. Never log a warning if too few items were available to reduce
the mailbox to the required usage level.
■ On (default). Log a warning if too few items were available to reduce
the mailbox to the required usage level.
Supported values ■ OWA 2013 only. In Outlook 2013, Enterprise Vault displays a
message to indicate that the Office Mail App is not available. You
may find this setting useful if you do not want to confuse Outlook
users by providing two methods for accessing their archives (both
the Enterprise Vault toolbar and the Office Mail App).
■ Outlook 2013 only. In OWA 2013, Enterprise Vault displays a
message to indicate that the Office Mail App is not available.
■ OWA and Outlook 2013 (default).
Supported values ■ Full. Users can choose a retention category for each item that they
manually archive.
■ Light (default). Users cannot choose a retention category for each
item that they manually archive. Instead, Enterprise Vault archives
the item with the default retention category for the mailbox folder
that contains the item.
This setting does not apply to users for whom you enable Enterprise
Vault Search rather than the legacy search applications (Archive
Explorer, Integrated Search, and Browser Search).
Supported values ■ Browser search (default). Users can perform complex searches,
using a wide range of search criteria, on one or more vaults at a
time.
■ Integrated search (IE only). Users can perform similar searches to
those available in Browser search, but they can search one vault at
a time only. If you choose this value, the Search button is hidden
from users who do not use Internet Explorer.
If you use this setting, users are not prompted for their logon details
when they search their archives or view or restore archived items.
The change applies to the current user only, so other users of the same
computer are unaffected.
If the user does not have permission to modify Internet Explorer, the
security settings are not changed and no error is generated.
You cannot use this setting if you have applied United States
Government Configuration Baseline (USGCB) group policy objects
(GPO) to Windows computers in your organization. On
USGCB-compliant desktops, users cannot change settings in the local
intranet zone on their computers. For instructions on how you can
configure Internet Explorer for these users, see the section "Publishing
Enterprise Vault server details to USGCB-compliant computers" in the
Installing and Configuring guide.
Advanced Exchange mailbox and desktop policy settings 152
Exchange desktop policy advanced settings
Supported values ■ A text string. Defines the computers to be added to the Internet
Explorer local intranet zone. The string can contain wildcard
characters, domain names, DNS aliases, or IP addresses.
To specify multiple computers, separate the names using a
semicolon (;).
The syntax is as follows:
computer1[;computer2][;computer3]...
Some examples of text strings are as follows:
webserver.mycorp.com
*.mycorp.com
mywebserver;*.mycorp.com
Supported values ■ Force off. The Outlook Add-In cannot open shortcuts that are in
public folders.
■ Force on (default). The Outlook Add-In can open shortcuts that are
in public folders.
■ Keep user’s setting. The user’s Outlook setting of Allow Script In
Public Folders is not changed.
Supported values ■ Force off. The Outlook Add-In cannot open shortcuts that are in
shared folders.
■ Force on (default). The Outlook Add-In can open shortcuts that are
in shared folders.
■ Keep user’s setting. The user’s Outlook setting of Allow Script In
shared Folders is not changed.
Advanced Exchange mailbox and desktop policy settings 153
Exchange desktop policy advanced settings
Supported values ■ Off (default). When a user tries to copy a shortcut, a message is
displayed explaining that the item cannot be copied, but it can be
copied after the item is restored.
■ On. The user is allowed to copy the shortcut. (This is the same
behavior as in Enterprise Vault versions before 6.0.)
If the user later deletes the shortcut and the corresponding archived
item, any copies of the shortcut will no longer work.
Supported values ■ Do not delete files (default). Temporary Internet files are never
deleted.
■ Delete files and tell user. The Temporary Internet files are deleted
and a message informs the user that they have been deleted.
■ Delete files silently. The Temporary Internet files are deleted and
the user is not informed.
■ Ask user. The user is asked whether the Temporary Internet files
should be deleted.
Enterprise Vault hides this setting when you upgrade your site to use
Enterprise Vault Search rather than the legacy search applications
(Archive Explorer, Browser Search, and Integrated Search).
Supported values ■ Never. Never deploy the Enterprise Vault Exchange forms to users’
Personal Form Libraries.
■ When no Org Forms. Deploy to users’ Personal Form Libraries when
there is no Organization Forms Library.
■ Always (default). Always deploy forms locally.
■ Delete. Delete locally-deployed forms. This may be useful if, for
example, your Exchange Server environment changes so that an
Organizational Forms Library becomes available. This setting
enables you to remove all locally-deployed forms from users’
computers.
When upgrading to a later Enterprise Vault version, you do not need
to use this option to delete existing local forms. The forms are
automatically upgraded.
Supported values ■ Off (default). Disables Enterprise Vault Outlook Add-In user
notifications.
■ On. Enables Enterprise Vault Outlook Add-In user notifications.
Supported values ■ Off. The Office Mail App does not appear in the original content of
opened archived items.
■ On (default). The Office Mail App does appear in the original content
of opened archived items.
If you have locked all the Enterprise Vault settings, you may want to
hide the property tab too.
By hiding the property tab, you are in effect locking all the settings,
because users cannot get to the tab page to change them.
Supported values ■ Hide tab. Enterprise Vault folder properties are hidden.
■ Show tab (default). Enterprise Vault folder properties are shown.
Note that this registry entry applies to all Outlook forms, so changing
this setting may affect other applications.
See the following Microsoft articles for more information:
Supported values ■ Remove entry. Remove the registry entry. This means that Outlook
does not reload forms on error.
■ Write entry (default). Write the registry entry. This forces Outlook to
reload forms on error.
Enterprise Vault hides this setting when you upgrade your site to use
Enterprise Vault Search rather than the legacy search applications
(Archive Explorer, Browser Search, and Integrated Search).
Note that there is also an equivalent registry value that you can set on
individual computers.
HKEY_CURRENT_USER\SOFTWARE\KVS\Enterprise
Vault\Client
Supported values ■ In Outlook (default). Archive Explorer appears integrated with the
Outlook window.
■ Separate browser. Archive Explorer appears in a separate web
browser window.
Supported values ■ An integer specify the maximum number of times that the Outlook
Add-In can re-enable itself in any seven-day period. The default is
3.
If you have locked all the Enterprise Vault settings, you may want to
hide the property tab too.
By hiding the property tab, you are in effect locking all the settings,
because users cannot get to the tab page to change them.
Supported values ■ Hide tab. Mailboxes hide the Enterprise Vault property tab.
■ Show tab (default). Mailboxes show the Enterprise Vault property
tab.
When PST file marking is switched on, the Enterprise Vault Outlook
Add-In tries to open every PST that is listed in the user's Outlook profile.
Users are prompted for passwords to password-protected PSTs and
receive error messages for any PSTs that are inaccessible.
Note: To avoid migration failures due to incorrect passwords or missing
passwords, you may edit the General tab of the site properties to allow
Enterprise Vault to override passwords and migrate the files.
Advanced Exchange mailbox and desktop policy settings 159
Exchange desktop policy advanced settings
Supported values ■ Off. The Enterprise Vault client does not mark PST files
■ On (default). The Enterprise Vault client marks PST files with details
of the owning account.
Supported values ■ Hide tab. Messages hide the Enterprise Vault property tab.
■ Show tab (default). Messages show the Enterprise Vault property
tab.
If the Outlook Add-In version is earlier than Enterprise Vault 10.0.1, the
Outlook Add-In behavior setting controls whether the Outlook Add-In
behaves in exactly the same way as the HTTP-Only Outlook Add-In.
In this case, the values have the following meanings:
Policy lookup locations lets you control the use of registry values on
users' computers to override the Exchange desktop policy. You can
specify the following types of policy lookup:
For information about the Outlook Add-In registry values, see the
Registry Values guide.
Advanced Exchange mailbox and desktop policy settings 161
Exchange desktop policy advanced settings
Supported values ■ Policy only. The Outlook Add-In looks only in the Exchange desktop
policy.
■ Policy, registry HKLM. The Outlook Add-In looks in the following
registry key:
HKEY_LOCAL_MACHINE
\SOFTWARE
\KVS
\Enterprise Vault
\Client
If the policy value is not in this registry key, the Outlook Add-In uses
the policy value in the Exchange desktop policy. If there is no
equivalent policy value in the Exchange desktop policy, the Outlook
Add-In uses the registry value default.
■ Policy, registry HKLM, registry HKCU (default). The Outlook Add-In
looks in the following registry keys, in this order. Only the Vault
Cache and Virtual Vault registry values can be located in the second
of these registry keys.
HKEY_LOCAL_MACHINE
\SOFTWARE
\KVS
\Enterprise Vault
\Client
HKEY_CURRENT_USER
\SOFTWARE
\KVS
\Enterprise Vault
\Client
\VaultCacheStoreID
HKEY_CURRENT_USER
\SOFTWARE
\KVS
\Enterprise Vault
\Client
If the policy value is not in these registry keys, the Outlook Add-In
uses the policy value in the Exchange desktop policy. If there is no
equivalent policy value in the Exchange desktop policy, the Outlook
Add-In uses the registry value default.
Supported values ■ Add to list (default). Stops Outlook from disabling the Enterprise
Vault Outlook Add-In by adding it to each user's "Do not disable
Add-in" list.
■ Keep user's setting. Neither add the Enterprise Vault Outlook Add-In
to each user's "Do not disable Add-in" list nor remove it from the
list.
■ Remove from list. Remove the Enterprise Vault Outlook Add-In from
each user's "Do not disable Add-in" list, if it appears in the list.
This setting has no effect in Outlook 2010 and later, where the behavior
is always to print the contents of the shortcut. Therefore, users must
first restore an archived item when they want to print its entire contents.
This is also the time that the Outlook Add-In waits after Outlook is started
before continuing with PST file import.
Supported values ■ Integer. When importing PST files, the number of minutes to wait
between PST files and the number of minutes to wait after Outlook
starts before continuing PST file import.
The default is 1 (minute).
Advanced Exchange mailbox and desktop policy settings 163
Exchange desktop policy advanced settings
Supported values ■ Integer. An integer value specifying the number of minutes to wait
before checking for more work.
The default is 60.
Supported values ■ Integer. Indicates the number of days to wait between searches.
The default is 7 (days).
Supported values ■ Off (default). Users can archive, restore, or delete in public folders.
Users must be enabled for mailbox archiving and must have Editor,
Publishing Editor, or Owner permissions on the folders that they
want to modify.
■ On. Users cannot archive, restore, and delete in public folders.
You can combine the values as required. For example, to remove PST
entries for PST files that are hidden (4) or read-only (2), you would set
Remove PST Entries to 6.
Supported values ■ 0 (default). Do not remove the profile entry after migrating a PST
file.
■ 1. Remove the profile entry if the PST file has been deleted from
the user’s computer.
■ 2. Remove the PST entry if the PST file is read-only.
■ 4. Remove the PST entry if the PST file has the Hidden file attribute
set.
The effect of this is that, unless you set up appropriate access, users
are prompted for their user names and passwords when they search
their archives or view or restore archived items.
The change applies to the current user only, so other users of the same
computer are unaffected.
If the user does not have permission to modify Internet Explorer the
security settings are not changed and no error is generated.
Supported values ■ A text string. Defines the computers to be removed from the Internet
Explorer local intranet zone. The string can contain wildcard
characters, domain names, DNS aliases, or IP addresses.
To specify multiple computers, separate the names using semicolons
(;).
The syntax is as follows:
computer1[;computer2][;computer3]...
Some examples of text strings are as follows:
webserver.mycorp.com
*.mycorp.com
mywebserver;*.mycorp.com
Advanced Exchange mailbox and desktop policy settings 165
Exchange desktop policy advanced settings
Supported values ■ Shortcut. Include the contents of the shortcut in the reply. (This is
the same behavior as in Enterprise Vault versions before 6.0.)
■ Original (default). Include the contents of the archived item.
Supported values ■ Use proxy (default). With Exchange Server 2003, clients connect
to the web server on the Exchange RPC proxy server. In an
Exchange Server 2007 or later environment, Outlook Anywhere
clients connect to the Enterprise Vault Web Access application on
the Enterprise Vault proxy server.
■ Direct. Connect directly to the Enterprise Vault Web Access
application on the Enterprise Vault server that hosts the archive.
If you change the name of the virtual directory, then you can use this
setting to specify the alternative URL. For example, if you change the
virtual directory name to EVProxy, then you use the RPC over HTTP
Proxy URL setting to specify the URL
HTTP://web_server/EVProxy
Supported values ■ A URL. Alternative URL for Enterprise Vault clients to contact when
Outlook is configured to use RPC over HTTP.
Supported values ■ None. All Enterprise Vault Outlook Add-In functionality is available
when Outlook is configured to use RPC over HTTP.
■ Disable Outlook Add-In (default). Connecting to Enterprise Vault
using RPC over HTTP is not enabled in the Enterprise Vault Outlook
Add-In.
■ Disable Vault Cache. Vault Cache is disabled when Outlook is
configured to use RPC over HTTP.
■ Disable PST Import. Client-side PST migration is disabled when
Outlook is configured to use RPC over HTTP.
■ Disable Vault Cache and PST Import. Both Vault Cache and
client-side PST migration are disabled when Outlook is configured
to use RPC over HTTP.
This setting affects users of the Enterprise Vault Outlook Add-In only.
For users of the Enterprise Vault Client for Mac OS X, the search
functionality always opens in a separate browser window.
For example, you need to use this setting in the following cases:
Supported values ■ The URLs of Web Access applications in other vault sites. Enter
one or more addresses in the following format:
[site1_dns_alias]=URL;[site2_dns_alias]=URL
where:
■ site1_dns_alias and site2_dns_alias are the DNS
aliases of other vault sites.
■ URL is the address of the Web Access application in the vault
site.
If you specify multiple addresses, separate them with semicolons
(;). The overall length of the string cannot exceed 255 characters.
For example:
[site1.server.com]=http://site1.server.com/
EnterpriseVault;[site2...
■ OWA 'Archive Policy' context menu option (Exchange OWA versions before
2013 setting)
■ Premium archive function (Exchange OWA versions before 2013 setting)
■ Premium restore function (Exchange OWA versions before 2013 setting)
■ Reply mode (Exchange OWA versions before 2013 setting)
■ 'Reply To All' mode (Exchange OWA versions before 2013 setting)
■ Restore confirmation (Exchange OWA versions before 2013 setting)
■ 'Search Vaults' in Basic OWA client (Exchange OWA versions before 2013
setting)
■ 'Search Vaults' in Premium OWA client (Exchange OWA versions before 2013
setting)
■ View mode (Exchange OWA versions before 2013 setting)
■ Web Application alias (Exchange OWA versions before 2013 setting)
Enterprise Vault hides this setting when you upgrade your site to use
Enterprise Vault Search rather than the legacy search applications
(Archive Explorer, Browser Search, and Integrated Search).
Enterprise Vault hides this setting when you upgrade your site to use
Enterprise Vault Search rather than the legacy search applications
(Archive Explorer, Browser Search, and Integrated Search).
Supported values ■ Basic (default). Users cannot change settings when archiving. The
archive settings on Outlook folders are used, which may be set by
the user in Outlook or by the administrator.
■ Enhanced. Users can select archiving settings when they perform
manual archives.
Supported values ■ Basic (default). There is no Restore option on the context menu.
■ Enhanced. There is a Restore option on the context menu.
■ OWA 2003 clients connect directly to the Enterprise Vault web server
URL for archive search requests.
■ Outlook clients in RPC over HTTP mode connect to the Enterprise
Vault server directly for all Enterprise Vault requests.
Supported values ■ Retain. The shortcut is not deleted when the archived item is
restored.
■ Delete (default). The shortcut is deleted when the archived item is
restored.
For more information on the use of this setting, see the following
technical note on the Symantec Support website:
http://www.symantec.com/docs/TECH63250
Supported values ■ A text string. The external URL for Enterprise Vault.
The URL can be either a fully qualified URL to the Web Access
application virtual directory, or a relative URL.
An example of a fully qualified URL is:
http://evserver1.external.name/enterprisevault
An example of a relative URL is:
/enterprisevault
The default value of this setting is:
<https>/enterprisevault
The optional component <https> at the start of the relative URL
indicates that the HTTPS protocol should be used. If the optional
component is not present, then the HTTP protocol is used.
Supported values ■ Current location (default). Restore to the same folder as the shortcut.
■ Restored items. Restore to the Restored Items folder.
Supported values ■ Basic. Users cannot change settings when archiving. The archive
settings on Outlook folders are used, which may be set by the user
in Outlook or by the administrator.
■ Enhanced (default). Users can select archiving settings when they
perform manual archives.
Supported values ■ Basic. Users cannot change settings when archiving. The archive
settings on Outlook folders are used, which may be set by the user
in Outlook or by the administrator.
■ Enhanced (default). Users can select archiving settings when they
perform manual archives.
Supported values ■ Off. The item is restored without asking the user for confirmation.
■ On (default). There is a confirmation prompt before an item is
restored.
Supported values ■ Enterprise Vault. Enterprise Vault renders the original item.
■ OWA (default). OWA renders the original item.
Supported values ■ A text string. The name of the virtual directory to use for anonymous
connections.
Enterprise Vault hides this setting when you upgrade your site to use
Enterprise Vault Search rather than the legacy search applications
(Archive Explorer, Browser Search, and Integrated Search).
Supported values ■ Respect connection (default). Archive Explorer checks the Outlook
connection state each time Archive Explorer starts. If a connection
is available, online Archive Explorer is used; if there is no connection,
offline Archive Explorer is used.
■ Always offline. Offline Archive Explorer is always used.
Advanced Exchange mailbox and desktop policy settings 180
Exchange desktop policy advanced settings
Supported values ■ On (default). Automatically add manually archived items to the Vault
Cache.
■ Off. Do not add to the Vault Cache.
Users have offline store (OST) files if Outlook Cached Exchange Mode
is enabled. If a user does not have an OST file, Enterprise Vault cannot
perform preemptive caching.
Supported values ■ Yes (default). An offline store is required for Vault Cache to be
enabled.
■ No. An offline store is not required for Vault Cache to be enabled.
Supported values ■ Integer. The number of milliseconds to use between items when
updating the Vault Cache Default is 100 (milliseconds).
Supported values ■ Path. A path to a folder that Enterprise Vault can create on the user's
local computer. If you do not specify Root Folder, Enterprise Vault
uses an Enterprise Vault subfolder in the user's Application Data
folder.
If none of the locations is valid, the one specified by Root folder is used,
if possible.
Supported values ■ A text string. A semicolon-separated list of possible locations for the
Vault Cache.
Supported values ■ Off (default). Do not allow a search across all indexes.
■ On. Allow a search across all indexes.
If the wizard is turned off, Vault Cache waits for the amount of time that
is specified in Pause interval and then automatically begins looking
for items to download.
This plug-in, which is installed with the Outlook Add-In, enables users
to search their Vault Cache using Windows Desktop Search.
No limit or a high value can increase the time that is required to complete
a Vault Cache synchronization. This effect is a consideration if the
additional load affects the Enterprise Vault server.
Also, until the items that a user has stored in Virtual Vault are archived
in the online archive, moved and copied items exist only on the user's
computer. You can set two thresholds that trigger automatic Vault Cache
synchronization based on the number or total size of pending archive
items in Virtual Vault.
The archive operation is tried this number of times before the item is
listed in the Virtual Vault Search folder named Could Not Archive.
No limit or a high value can increase the time that is required to complete
a Vault Cache synchronization. This effect is a consideration if the
additional load affects the Enterprise Vault server.
Also, until the items that the user stores in Virtual Vault have been
archived in the online archive, moved and copied items exist only on
the user's computer. You can set two thresholds that trigger automatic
Vault Cache synchronization based on the number or total size of
pending archive items in Virtual Vault.
The value of this setting must be greater than or equal to the value of
Max item size to archive. If not, the value of Max item size to archive
is used.
Supported values ■ An integer value. The default is 512 (MB). The value 0 specifies no
limit.
If this value is similar to the value of Max total size of items to archive,
a full synchronization can consist of one item.
The Max item size to archive value may be used automatically for
Max data archived per synchronization or Max total size of items
to archive. It is used if the value of those settings is less than the Max
item size to archive value.
You can set two thresholds that trigger automatic Vault Cache
synchronization based on the number or total size of pending archive
items in Virtual Vault.
Supported values ■ An integer value. The default is 256 (MB). The value 0 specifies no
limit.
This setting only applies when two or more items with no content are
involved in the operation. Retrieval of one item is allowed regardless
of its size.
Supported values ■ An integer value. The default is 64 (MB). The value 0 specifies no
limit.
Pending archive data consists of items that the user has moved or
copied into Virtual Vault. These items are pending archive until Vault
Cache synchronization has successfully uploaded and archived them.
The value of this setting must be greater than or equal to the value of
Max item size to archive. If not, the value of Max item size to archive
is used.
You can set two thresholds that trigger automatic Vault Cache
synchronization based on the number or total size of pending archive
items in Virtual Vault.
Supported values ■ An integer value. The default is 512 (MB). The value 0 specifies no
limit.
Supported values ■ Never show content. The Reading Pane always shows only the
selected item's header. A banner provides a link to open the original
item.
■ When in Vault Cache (default). The Reading Pane shows the
selected item's header. If the item is in Vault Cache, it also shows
the content. If the content is not shown, a banner provides a link to
open the original item. When the Vault Cache content strategy is
Store only items that user opens, the effect of this value is that
the Reading Pane only shows the content of previously opened
items.
■ Always show content. The Reading Pane always shows the header
and content of the item that is selected in Virtual Vault.
Show content in Reading Pane can only have the value Always show
content if the following conditions apply:
Pending archive data consists of items that the user has moved or
copied into Virtual Vault. These items are pending archive until Vault
Cache synchronization has successfully uploaded and archived them.
If you enable this setting, consider how it interacts with other settings,
as follows:
■ Max item size to archive and Max total size of items to archive
can prevent the user from adding items to Virtual Vault, so that the
threshold is never reached.
■ Max archive requests per synchronization may have a value that
is lower than the value of Threshold number of items to trigger
synchronization. In this case, automatic synchronization may occur
but not all the pending archive items are archived.
Pending archive data consists of items that the user has moved or
copied into Virtual Vault. These items are pending archive until Vault
Cache synchronization has successfully uploaded and archived them.
If you enable this setting, consider how it interacts with other settings,
as follows:
■ Max item size to archive and Max total size of items to archive
can prevent the user from adding items to Virtual Vault, so that the
threshold is never reached.
■ Max data archived per synchronization may have a value that is
lower than the value of Threshold total size of items to trigger
synchronization. In this case, automatic synchronization may occur
but not all the pending archive items are archived.
Advanced Exchange mailbox and desktop policy settings 192
Exchange desktop policy advanced settings
If you disable this setting, users can still create folders if Users can
reorganize items is enabled.
If you enable this setting, consider setting the thresholds that trigger
automatic Vault Cache synchronization.
Supported values ■ Yes (default). Users can archive items manually in Virtual Vault.
■ No. Users cannot archive items manually in Virtual Vault.
If users can copy or move items out of Virtual Vault and the content is
available in Vault Cache, the items are retrieved from Vault Cache.
If the Vault Cache content strategy is Do not store any items in cache,
the items are retrieved from the online archive. In this case, use the
Virtual Vault advanced setting Max total size of contentless
operations to control the maximum total size of view, copy, and move
operations.
Supported values ■ Yes (default). Users can copy and move items to another message
store.
■ No. Users cannot copy and move items to another message store.
If users can copy items within their archive and the content is available
in Vault Cache, the items are retrieved from Vault Cache.
If the Vault Cache content strategy is Do not store any items in cache,
the items are retrieved from the online archive. In this case, use the
Virtual Vault advanced setting Max total size of contentless
operations to control the maximum total size of view, copy, and move
operations.
If you enable this setting, consider setting the thresholds that trigger
automatic Vault Cache synchronization.
Supported values ■ Yes. Users can copy items within their archive.
■ No (default). Users cannot copy items within their archive.
For this setting to take effect, the option Users can delete items from
their archives must be enabled on the Archive Settings tab in the
Site Properties dialog box.
If you disable this setting, users can still move items to the Deleted
Items folder if Users can reorganize items is enabled.
Supported values ■ Yes (default). Users can hard delete items from Virtual Vault.
■ No. Users cannot hard delete items from Virtual Vault.
This setting can enable users to move items between folders and to
create, move, rename, or delete folders.
If folders still exist in the mailbox, users cannot move, rename, or delete
them.
Users can hard delete only empty folders, unless Users can hard
delete items is enabled.
Supported values ■ Yes (default). Users can reorganize items in Virtual Vault.
■ No. Users cannot reorganize items in Virtual Vault.
Enterprise Vault stores both versions of the message and the journal
report in the message saveset. However, Enterprise Vault does not
currently support the retrieval of the secondary message or the journal
report from the archive.
Advanced Exchange journal policy settings 197
Archiving General (Exchange journal policy advanced settings)
■ Treat as Secondary
■ The RMS-protected message is returned in response to retrieval
requests from Enterprise Vault clients and Symantec Discovery
Accelerator.
Enterprise Vault cannot preview these messages unless an
application is used to decrypt them.
■ Information available for indexing is restricted to Subject,
Recipients, and other message metadata.
The item can be shared between Exchange mailbox and journal
archiving.
The message content and attachments are not indexed unless
an application is used to decrypt them.
■ Custom filters that do not decrypt RMS-protected messages
cannot read the message content.
Supported values ■ Move to ‘Failed DL Expansion’ folder. Move the item without
archiving it.
■ Archive item (default). Archive the item.
Supported values ■ Integer. An integer value that specifies the journal delay in minutes.
Set Journal delay to 0 to disable journal grouping for this policy.
Default is 5.
Supported values ■ Integer. An integer value specifying the maximum size of messages
that can be archived, in megabytes.
Default is 250.
Supported values ■ All single threaded. Use if all your tasks are single threaded.
■ Multiple threads (default). Improves performance if any Journaling
Task uses multiple threads.
Supported values ■ Off. During synchronization archive names are never changed.
■ On (default). During synchronization, archive names are
automatically changed if necessary to match mailbox names.
Supported values ■ Off (default). Do not move items in the failed folders to the Inbox
when the task starts.
■ On. Move items the failed folders to the Inbox when the task starts.
Supported values ■ Off (default). Unexpired calendar items are not archived.
■ On. Unexpired calendar items are archived.
Supported values ■ Off. Items that have pending reminders are archived.
■ On (default). Items that have pending reminders within the next five
years are not archived.
This setting enables you to change the behavior so items that fail
archiving are marked as Do Not Archive and thus are not reprocessed
on the next archiving run.
Supported values ■ Off (default). Failed items are not marked as Do Not Archive.
■ On. Failed items are marked as Do Not Archive.
Supported values ■ An integer that sets the folder limit. The default is 10000.
Note: Do not change the Indexing settings unless your technical support provider
advises you to do so.
If any locations were closed during the current validation, the Indexing
service is stopped. An error is written to the Enterprise Vault event log.
The error says that open index locations contained invalid characters,
and that the Indexing service will stop.
This allocation method distributes the index volumes amongst all the
available Index Servers, which is suitable for large archives such as
journal archives. By default, Enterprise Vault does not use this allocation
method for the index volumes for mailbox archives. Instead, it keeps
these index volumes together on the same Index Server.
This setting lets you override the default so that index volumes for
mailbox archives are distributed amongst all the available Index Servers.
Supported values ■ Local server (default). The index volumes for mailbox archives are
kept together on the Index Server that is local to the associated
storage server.
■ None. Index volumes for mailbox archives are distributed amongst
all the available Index Servers.
Supported values ■ On (default). User permissions are cached in the Index Query
Server.
■ Off. User permissions are not cached in the Index Query Server.
Supported values ■ On (default). The Index Query Server allows the Vault Service
account to search all archives.
■ Off. The Index Query Server does not allow the Vault Service
account to search all archives.
Transaction history records are held in the SQL Server, so you need
to ensure that the database can accommodate this data.
Supported values ■ An integer that specifies the number of days to retain the transaction
history of each archive. The default is 32
Chapter 11
Advanced computer
properties settings
This chapter includes the following topics:
Enterprise Vault deletes transcript files when you stop the IMAP server.
Note: IMAP transcripts contain sensitive information from users’ email.
Supported values ■ An integer in the range 5000 to 100000. The default is 15000.
Supported values ■ Hardware (default). Use the physical properties of the computer to
determine the maximum number of threads. Note however, that the
maximum is still constrained by the value in Thread pool maximum
size if that is lower than the computer would otherwise allow.
■ Setting. Use the value in Thread pool maximum size, irrespective
of the computer’s physical properties.
Note that the actual number of threads can be further constrained if the
Thread pool algorithm is set to Hardware, and the computer’s physical
thread pool size is lower than the limit you set.
Note: Do not change the Indexing settings unless your technical support provider
advises you to do so.
On the Index Locations tab in the Indexing service properties, you can
add a folder that is used for index storage. By default, Enterprise Vault
automatically creates eight index location subfolders beneath the folder
that you add.
This setting lets you specify that Enterprise Vault creates only one index
location subfolder.
Supported values ■ Yes (default). Enterprise Vault creates eight index location
subfolders.
■ No. Enterprise Vault creates one index location subfolder.
By default, the Indexing service checks for empty index volumes every
10 hours. The frequency of these checks is defined by the setting
Frequency of full checks for index volumes to process.
Supported values ■ A text value specifying the maximum memory usage ratio. The
default is 1.5.
Advanced computer properties settings 220
Computer properties advanced settings
Supported values ■ An integer specifying a number of index volumes and subtasks. The
default is 30.
These logs are only written if the Search Log Queries setting or the
Search Log Results setting is turned on.
Supported values ■ A text value specifying a local folder. The default is that no folder is
specified and the Vault Service account TEMP folder is used.
Supported values ■ An integer value specifying a number of threads. The default is 200.
The value must be greater than the Search Minimum Threads
value.
See “Search Minimum Threads (Computer Properties Indexing
setting)” on page 226.
If you are using the storage queue to store safety copies this option
can save a significant amount of disk space. The compression overhead
can cause a performance reduction.
Supported values ■ An integer specifying the maximum number of pending items that
are allowed on the queue. The default is 50000.
Supported values ■ An integer specifying the minimum percentage of free disk space.
The default is 10.
Chapter 12
Managing the Storage
queue
This chapter includes the following topics:
For performance information about the Storage queue see the Enterprise Vault
Performance Guide at the following location:
http://www.symantec.com/docs/TECH125795
Applications may use the storage queue for safety copies regardless of the vault
store properties settings in the Administration Console. Therefore it is not safe to
assume that the storage queue is never used for safety copies.
If you use a building blocks environment the Storage queue location must be shared
with the associated servers.
There is one Storage queue on each server that runs an Enterprise Vault Storage
service.
Note: The storage queue location should be on a fault tolerant device (RAID 1 or
higher). The device must have sufficient space for all items on the queue. If you
intend to use the storage queue for safety copies then there must be enough space
to keep them until after the next backup.
You may want to close the Storage queue before you change its location. When
the Storage queue is closed Enterprise Vault cannot add new items but can still
process those items that are already on the queue.
See “Closing or opening a Storage queue location” on page 233.
To change the Storage queue location
1 In the left pane of the Administration Console, expand the vault site.
2 Expand Enterprise Vault Servers.
3 Expand the server whose Storage queue you want to modify.
4 Click Services.
5 In the right pane check that the Enterprise Vault Storage service is stopped. If
the service is not stopped, right-click the service and on the shortcut menu
click Stop.
6 When you have ensured that the Storage service is stopped, double-click the
Storage service.
7 Click the Storage Queue tab.
Managing the Storage queue 233
Closing or opening a Storage queue location
8 Click OK.
Chapter 13
Customizing the legacy
search applications
This chapter includes the following topics:
setting = value
where setting is the name of the setting and value is the value that you want to
assign to it.
Note the following:
■ Entries in this file are case-sensitive.
■ The file must be saved with ANSI encoding.
Customizing the legacy search applications 235
General configuration settings for the legacy search applications
AllowNonAsciiFilenames
Description Determines whether, when you open an archived message attachment
whose file name contains non-ASCII characters, those characters are
removed or preserved.
Supported values ■ 0 (default). Removes any non-ASCII characters from the file names
of message attachments. When all the characters are non-ASCII,
the file name is replaced with "EnterpriseVault".
■ 1. Preserves any non-ASCII characters in the file names of message
attachments.
DefaultFormatCodepage
Description Specifies the code page to use if you have set DefaultFormatType to
ANSI.
If you do not specify a code page, Enterprise Vault sends items to the
client in the code page in which they were stored.
Supported values ■ Code page number. The number that identifies the code page. For
a list of the available code pages, see the following article on the
Microsoft MSDN site:
http://msdn.microsoft.com/en-us/library/ms537500(VS.85).aspx
Customizing the legacy search applications 236
General configuration settings for the legacy search applications
DefaultFormatType
Description Specifies the format in which to return items that are stored as Unicode
to the client.
Supported values ■ Unicode (default). Returns archived Unicode items to the client as
Unicode.
■ ANSI. Returns archived Unicode items to the client as ANSI.
HTMLNotNotes
Description Specifies how to display the contents of archived Notes items when
users find them with the Browser Search facilities and then, in the
Search Results page, click View whole item to open the items. You
can choose to display the items using Notes, or you can display an
HTML preview of them.
Supported values ■ 0 (default). Display the contents of archived items in Notes. Users
who do not have the client installed receive the message "Page
cannot be displayed" when trying to open these items.
■ 1. Display an HTML preview of the contents of archived Notes items.
MaxPreviewSize
Description Specifies the maximum size of archived files that can be displayed in
the Archive Explorer preview pane.
Supported values ■ An integer. The maximum size in kilobytes of archived files that can
be displayed in the Archive Explorer preview pane. The default is
512.
Customizing the legacy search applications 237
General configuration settings for the legacy search applications
Noclient
Description Controls whether items are downloaded in their native format, rather
than as .MSG format files.
Supported values ■ Any integer. Items are downloaded in their native format.
If you want to turn off Noclient, remove the entry from the file.
URLEncodeFilenames
Description Determines whether, when you open an archived message attachment
whose file name contains non-ASCII characters, those characters are
rendered in URL-encoded form.
When the client and server use the same code page, assigning a value
of 1 to AllowNonAsciiFilenames should suffice.
Supported values ■ 0 (default). Leaves the non-ASCII characters in the file names of
message attachments in their original form.
■ 1. Renders the non-ASCII characters in the file names of message
attachments in URL-encoded form. Note that, because of Internet
Explorer limits on the number of characters in a file name string,
multi-byte file names may be truncated to 15 characters when
URL-encoded.
UseRestrictedSecurity
Description Determines the level of protection against security vulnerabilities to
implement in the legacy search applications. Note that, when enabled,
the security restrictions offer protection in Internet Explorer 9.0 and
earlier only; later versions of Internet Explorer employ a different
protection mechanism.
Supported values ■ 0. Relaxes the security restrictions so that affected users can access
the legacy search applications.
■ 1 (default). Enforces the security restrictions.
ViewMessage_Format
Description Controls the display format that is used when the user's browser does
not allow cookies or the user has never chosen a format to use.
This affects the following:
The user can use the Settings dialog box to override the behavior you
specify with ViewMessage_Format.
DefaultRankResults
Description Controls the default sort order of results that are returned from Integrated
Search.
For example, to make Integrated Search list the newest items first, enter
the following:
DefaultRankResults = –date
Supported values Use the following values to sort the items by the required criteria.
FederatedSearchMaxItems
Description Specifies the maximum number of items to obtain from each index
volume. This number also determines the maximum number of results
to display in response to a user query. This is because the most relevant
results for the query may come from one index volume only.
Supported values ■ An integer. The maximum number of items to obtain from each index
volume. The default is 1000.
Customizing the legacy search applications 240
Configuring the search results
FederatedSearchMaxVolSets
Description Specifies the maximum number of index volumes to search
simultaneously.
Supported values ■ An integer. The maximum number of index volumes. The default is
5.
FederatedSearchTimeout
Description Sets a time limit on how long a federated search can take before it
should be ended.
Supported values ■ An integer. The time limit in seconds. The default is 60.
SearchRSS
Description Specifies the maximum number of search results to display initially.
Users can click a Show All or Click Here link to view more results.
Supported values ■ An integer. The number of search results to display initially. The
default is 100.
ShowAllMaxResults
Description Specifies the maximum number of results that can be displayed when
the user clicks the Show All or Click Here link.
Supported values ■ An integer. The maximum number of search results to display. The
default is 500.
UseFederatedSearch
Description Controls whether to allow federated searching for everyone who uses
the Enterprise Vault web applications. For configuration or performance
reasons, you may want to turn off this functionality.
BSDeleteButton
Description Controls whether Browser Search displays options that are related to
deleting archived items. This setting applies to Browser Search for both
Exchange Server users and Domino Server users.
BSRestoreButton
Description Controls whether Browser Search displays options that are related to
restoring archived items. This setting applies to Browser Search for
both Exchange Server users and Domino Server users.
ISDeleteButton
Description Controls whether the properties of an item that is found by Integrated
Search show the Delete this item from the Vault option. This setting
applies to Integrated Search in both Outlook and Notes.
ISRestoreButton
Description Controls whether the Restore Whole Item icon is displayed in Integrated
Search results so that users can restore items that are found by
searches. This setting applies to Integrated Search in both Outlook and
Notes.
ISShowRetention
Description Controls whether the properties of an item that is found by Integrated
Search show the item’s retention category. This setting applies to
Integrated Search in both Outlook and Notes.
RestoreToPSTOption
Description Gives users the option to export items found by a search to PST files.
This setting applies to Exchange Server users only.
This option is intended to be used by just a few users. Local paths refer
to the Exchange Mailbox task computer and must already exist. If the
user specifies a local path when setting the output destination the PST
is saved with that path name on the Exchange Mailbox task computer.
ArchiveExplorerDelete
Description Controls whether the following are available to a user in Archive
Explorer:
ArchiveExplorerForward
Description Controls whether the Forward option is available when a user
right-clicks a message in Archive Explorer.
ArchiveExplorerHelp
Description Controls whether the Help button and right-click Help menu option are
available in Archive Explorer.
Supported values ■ 0. The button and right-click menu option are not available.
■ 1 (Default). The button and right-click menu option are shown.
ArchiveExplorerReply
Description Controls whether the Reply option is available when a user right-clicks
an item in Archive Explorer.
ArchiveExplorerReplyAll
Description Controls whether the Reply to All option is available when a user
right-clicks an item in Archive Explorer.
ArchiveExplorerRestore
Description Controls whether Archive Explorer shows the following:
Supported values ■ 0. The button and the menu options are not displayed.
■ 1 (Default). The button and the menu options are shown
Customizing the legacy search applications 245
User interface tweaks for Archive Explorer
ArchiveExplorerSaveAs
Description Controls whether the Save As option is available when a user
right-clicks an item in Archive Explorer.
ArchiveExplorerSearch
Description Controls whether Archive Explorer shows the Search button and
right-click Search menu option are available. These options enable
users to search from within Archive Explorer.
Supported values ■ 0. The button and the menu option are not available.
■ 1 (Default). The button and the menu option are shown.
ArchiveExplorerSettings
Description Controls whether Archive Explorer shows the Settings button, which
enables users to specify the following:
■ If you have Microsoft System Center Operations Manager (SCOM), you can
use the supplied Enterprise Vault Management Pack, to monitor Enterprise
Vault operations and performance.
Frequency This is how often Enterprise Vault checks this item. In the case of
performance-related items, this is the frequency with which
Enterprise Vault writes the associated performance counter.
Start At The time at which measuring starts. If you do not select a time,
the statistics are collected when the monitoring process starts and
then at the interval that is defined in the Frequency column.
4 Click OK.
Automatic monitoring 248
About monitoring using Enterprise Vault Operations Manager
http://host_ipaddress/MonitoringWebApp/default.aspx
http://localhost/MonitoringWebApp/default.aspx
2 In the Connect to IP Address dialog box, enter the user name and password
of an account in the host computer’s domain. Then click OK.
Note: Any user other than the Vault Service account must be assigned to a
suitable role to access Operations Manager. Users can view only the tabs and
tables in Operations Manager that are applicable to the role to which they are
assigned.
See “Roles-based administration” on page 24.
If the user credentials are valid, Operations Manager displays its site Summary
page.
Caution: You must already have a working Microsoft MOM installation before you
can install the Enterprise Vault Management Pack. If you experience monitoring
issues, contact Microsoft Support for assistance.
Installing MOM
The Enterprise Vault installation copies the MOM Management Pack to the MOM
subfolder of the Enterprise Vault program folder (for example C:\Program Files
(x86)\Enterprise Vault\MOM).
Configuring MOM
You must do the following:
■ Import the Enterprise Vault Management Pack.
■ Add operators to the Enterprise Vault Notifications Group, Enterprise Vault
Administrators.
■ Enabled monitoring in the Enterprise Vault Administration Console.
To import the Enterprise Vault Management Pack
1 Start the MOM Administrator Console.
2 In the left pane, right-click Processing Rule Groups and, on the shortcut
menu, click Import Management Pack.
3 Select the Enterprise Vault Management Pack, EnterpriseVault.akm, and
work through the rest of the Import Options wizard.
To add operators to the Enterprise Vault notifications group
1 In the left pane of the MOM Administrator Console, expand Rule Groups.
2 Click Notification Groups.
3 In the right pane, double-click Enterprise Vault Administrators.
4 Add the operators who should receive alerts.
5 Click OK.
When you have configured your Enterprise Vault MOM management pack, you
may need to configure some of the rules before you can use them.
For example, if you want to use the following rule you must configure it to specify
which SQL server to monitor:
Sample value of the performance counter SQL Server - Checkpoint pages
/ sec is greater than the defined threshold
Note that some MOM rules concern events that are themselves enabled by the
Enterprise Vault Administration Console. In the case of these events, they must be
enabled in the Administration Console.
Table 14-1 lists the events that can by enabled from the Administration Console
that have corresponding MOM rules.
By default, all the events in this table are enabled.
41011 Vault Store database backup Backup overdue for vault store
SQL database.
41012 Vault Store transaction log backup Backup overdue for vault store
SQL database transaction log.
41013 Vault Store transaction log size Space allocation warning for
vault store SQL database.
41203 Vault Store fingerprint database backup Backup overdue for Vault Store
Group SQL database.
41204 Vault Store fingerprint database log Backup overdue for Vault Store
backup Group SQL database
transaction log.
41205 Vault Store fingerprint database log size Space allocation warning for
Vault Store Group Log size.
41258 Vault Store partition backup scan Partition(s) not scanned (All)
Caution: You must already have a working Microsoft SCOM installation before you
can install the Enterprise Vault Management Pack. If you experience monitoring
issues, contact Microsoft Support for assistance.
4 In the Accounts list, right-click the Run As account that you intend to use for
Enterprise Vault monitoring and then click Properties.
5 Click the Distribution tab.
6 Click More secure.
7 Click Add then select each Enterprise Vault server that you intend to monitor.
8 Click Apply.
8 Read the displayed license and click Yes to agree to the terms.
9 Specify the folder where you want the place the management pack and click
OK.
10 In System Center Operations Manager select Administration.
11 In the left pane, right-click Administration and click Import Management
Packs.
12 In the Import Management Packs Wizard, click Add and then click Add from
disk.
Automatic monitoring 256
About monitoring using SCOM
13 If there is a prompt that asks whether you want to search the online catalog
for dependencies, click No.
14 Navigate to the folder that contains the management pack that you extracted.
15 Click Symantec.EnterpriseVault.mp and then click Open. The wizard adds
the management pack to the Import list.
16 Click Install. The wizard imports the management pack.
17 Click Close.
The new SCOM pack includes the functionality of the older SCOM packs. You can
continue to use a SCOM pack from an Enterprise Vault version earlier than 10.0.3,
if required.
The SCOM pack provides more monitoring functionality than the older SCOM pack
does.
■ Content Provider Ingest History. This report shows the number and total size
of the items that a single content provider or content provider instance has
presented to Enterprise Vault for archiving over a chosen time period.
To view the Content Providers Licensing and Usage Summary report
1 In the left pane of the Administration Console, expand Directory.
2 Expand Extensions.
3 Right-click Content Providers and on the shortcut menu click Content
Providers Licensing and Usage Summary report.
To view the Content Provider Ingest History report
1 In the left pane of the Administration Console, expand Directory.
2 Expand Extensions.
3 Click Content Providers.
4 In the right pane, right-click the extension for which you want a report and on
the shortcut menu click Content Provider Ingest History Report.
You can also run the reports from the Common Tasks section in the Administration
Console.
Managing extension content providers 263
Viewing the content provider reports
■ Archives to their original mailboxes. This is useful when the following apply:
■ You are transferring mailboxes and want to send the users' archived items
too.
Exporting archives 265
Importing (migrating) exported files
■ You have been running a pilot installation of Enterprise Vault and now want
to copy everything that has been archived back to the original mailboxes.
■ A single archive to a chosen mailbox. This could be useful when the following
apply:
■ A person takes over an existing role within the company. For example, You
could export to the new mailbox everything that was archived from the old
mailbox with a particular retention category.
■ There is a legal investigation. You may want to copy everything that has
been archived from a particular mailbox to a new mailbox, ready for
subsequent investigation.
When you export, you can filter the output by date and by retention category. For
example, you can export items less than a year old that were archived with a
particular retention category.
When you export to PST files, the wizard lets you control the maximum size of the
output files. The default maximum of 600 MB is ideal for writing to CD. If a file
reaches the maximum size, the wizard automatically creates a numbered sequence
of files, none of which exceeds the maximum size.
Folders in PST files can contain a maximum of 16,383 items. This is a PST file
limitation. If a folder reaches this limit the Export Archive wizard automatically
creates a new folder of the same name but with a number suffix. For example, if
folder 'Inbox' is full, the Export Archive wizard automatically creates 'Inbox 1' to hold
further items.
For each PST file, the wizard creates a configuration file that you may need if you
intend to import the PST file contents back into Enterprise Vault. You can import
files that have been exported, so it is possible to move someone's archived items
to another Enterprise Vault system.
The following video demonstrates how to export an archive to a number of PST
files.
Enterprise Vault - Export Archive.
To migrate PST files to an archive on the same vault store as the original archive
1 After you have exported the archive to PST files using the Export Archive
wizard, ensure that the export was successful.
2 If the destination archive is to be associated with the same mailbox, then disable
the mailbox using the Enterprise Vault Administration Console.
3 In the Enterprise Vault Administration Console, delete the original archive.
4 To create the destination archive, enable the associated mailbox.
5 Use PST Migration to import the PST files into the new archive. To fix any
broken shortcuts in the mailbox, configure PST migration as follows:
■ Do not create shortcuts to newly-archived items.
■ Import items to the root folder .
■ Merge the folder structures.
[PST]
FILENAME = JohnSmith_Export_0001.pst
DESCRIPTION = John Smith
CREATED = 22Aug2002 10:01 AM
Exporting archives 267
Starting the export with the Export Archive wizard
ORIGIN = EXPORT_ARCHIVE
[MAILBOX]
NAME = John Smith
MAILBOXDN = /O=ACME/OU=LEGAL/CN=RECIPIENTS/CN=JOHNS
EXCHANGESERVER = EXCH01
[USER]
FIRSTNAME = John
LASTNAME = Smith
DEPT = Legal
TITLE = Audit Manager
[VAULT]
NAME = John Smith
DESCRIPTION = Created by Enable Mailbox Wizard
VAULTID =
19A33926632EA274B9822FDBCA82CA09B1110000laguna3.win.kvsinc.com
VAULTSTORENAME = CCV4VS
[RETENTION_CATEGORY]
NAME = Personal
DESCRIPTION = Personal items
PERIOD = 60
PERIODUNITS = MONTHS
It is possible that the retention category does not match any retention category in
your Enterprise Vault site. In this case you must decide on a suitable action, as
follows:
■ You can use an existing retention category that most closely matches the
retention category in the configuration file.
■ You can create a new retention category to match the one in the configuration
file. However, this new retention category is then available to all users and you
may find that its name is likely to confuse existing users.
PST files to migrate, Locate and Migrate is likely to require least effort on your
part.
See “About Locate and Migrate” on page 293.
■ Client-driven PST migration. This tool lets you configure users’ computers to
locate PST files automatically and copy them to a central PST holding folder.
Enterprise Vault then migrates the PST file contents from the holding folder to
Enterprise Vault archives.
You can also decide whether you want to give users control over migrating their
PST files.
Client-driven PST migration is useful in the following situations:
■ Users' computers are available on the network only occasionally.
■ You do not have permission to access PST files on the users' computers.
■ Users need continual access to their PST files.
See “About client-driven PST migration” on page 320.
■ Does not update the PST file marker again except when a different mail profile
is used that lists the PST file. This means that Policy Manager assumes that
the owner of the PST file is the last profile that was used to access it.
■ Marks any further PST files that are subsequently added to the mail profile. The
marking happens when Outlook is started, so merely opening a PST file and
then closing it again is not sufficient to mark that PST.
Note: This node includes only those PST files that are searched and migrated to
Enterprise Vault by the Locate and Migrate method or obtained by client-driven
migration. This node does not include the files that have been migrated to Enterprise
Vault using the wizard-assisted migration or the scripted migration.
For more information about each node, see the Administration Console help.
Introduction to PST migration 272
About the Personal Store Management node
If the Personal Store Management is taking a long time to load, it could be because
your Enterprise Vault server does not have a connection to the Internet. Refer to
the following Enterprise Vault TechNote for a possible workaround:
http://www.symantec.com/docs/HOWTO32057
Creating filters
The parent nodes - Files, Computers, and Mailboxes - each have a Filters node.
The Filters node includes the predefined filters and the filter criteria that you have
created and saved for future reference. When you click a filter node, the filter is run
and the display is updated dynamically.
Note the following:
■ You can create up to 100 filters within each Filters node. You can configure
this number by creating a new DWORD registry value that is called
MaxFilterCount under the following registry key:
HKEY_LOCAL_MACHINE
\SOFTWARE
\Wow6432Node
\KVS
\Enterprise Vault
\Admin
Note: We recommend that you limit the filter count to 100. Exceeding this value
may affect the performance of Enterprise Vault.
■ The Filters node of each parent node includes predefined filters that you can
use.
■ You can rename or delete any of the filters created, including the predefined
filters.
■ To filter the list on the basis of multiple keywords, use commas to separate the
keywords.
To create and save filters
1 Select the filter criteria you want to use to refine the list. You may select multiple
criteria by clicking the + button. Use the - button to remove filter criteria.
For example, to filter the list to see only those files that have failed to migrate,
do the following:
■ In the first drop-down menu, select Migration Status.
Introduction to PST migration 273
Improving performance when archiving PST file contents
2 Click Apply. The display changes according to the filter criteria applied, and
the Apply button changes to Save.
3 Click Save.
4 In the Save dialog, do one of the following:
■ Click Save filter and enter a name and description for the filter.
■ Click Save results and enter a name and description for the saved results
folder. Alternatively, you may choose to add the displayed items to an
existing saved results folder.
5 Click Save. Saved filters are listed as separate nodes within the Filters node.
When you click the saved filter, the filter is run and the display is dynamically
updated. Saved results are listed as separate nodes within the Saved Results
node, and displays static data.
HKEY_LOCAL_MACHINE
\SOFTWARE
\Wow6432Node
\KVS
\Enterprise Vault
Note: This change to the conversion timeout also affects normal archiving, so
remember to return it to the original value when you have migrated the PSTs.
You can also improve performance by making Enterprise Vault create text versions
rather than HTML versions of certain document types.
See “How to control content conversion” on page 371.
HKEY_LOCAL_MACHINE
\SOFTWARE
\Wow6432Node
\KVS
\Enterprise Vault
\Storage
2 Set BypassAddressLookups to 1.
3 Restart the Storage service.
This setting allows PST migrations to use only the sender information and recipient
information that it finds in each mail item that it archives. Enterprise Vault does not
attempt to establish an Active Directory connection to resolve addresses.
Chapter 18
PST migration: scripted
This chapter includes the following topics:
settings that apply to all PST files and you can override the default settings for
individual PST files.
It is possible for you to make Enterprise Vault clients save details of the owner's
default archive in each PST file (PST marking). Policy Manager can then use this
information to determine the correct archive and mailbox to use for each PST file.
If you prefer to not to use this mechanism, or to override it for some PST files, then
for individual PST files you can override these values.
When you migrate PSTs using Policy Manager you can use report mode to check
all the PST files listed in your initialization file. This mode generates a new copy of
the initialization file, with lines that identify any problems. Entries for PST files that
cannot be processed are marked so that PST migrator ignores these files.
You can then do either of the following:
■ Fix any problems and run the Policy Manager in report mode again to see
whether there are any more problems. When the file is error free, you can run
it in process mode to process all the files. You can run in report mode as many
times as needed. Each time, Policy Manager creates a new initialization file that
you can then run normally or use to fix problems.
■ Run in process mode immediately. Files that could cause problems have been
marked so that Policy Manager ignores them. You can then decide later what
to do with these problem files.
Note the following:
■ Policy Manager uses only message class and shortcut content settings from
the Exchange PST Migration policy. The rest of the settings in the policy are
ignored.
■ Policy Manager can use the information written into the PST file by PST marking
to identify the mailbox and archive associated with the PST file.
■ Symantec recommend that you do not use Policy Manager to perform other
tasks at the same time as performing PST migrations.
■ If you have only a few PST files to migrate, you may find it easier to use the
wizard-assisted PST migration tool instead.
See “About the PST Migrator wizard” on page 285.
■ Creates a log file with the same name as the original initialization file and
a file type of .log. For example, if the original script was called
PSTMigration.ini then the log would be called PSTMigration.log.
4 You can fix problems that are listed in the new initialization file, or you can
leave them for later.
5 Run Policy Manager with the new initialization file. Policy Manager migrates
the file contents and writes a log file with the same name as the initialization
file and a file type of .log
If any PST files fail the migration process, Policy Manager automatically writes
a new script that you can run to process just those failed files.
If necessary, fix any problems and then run the new script to migrate the
contents of just those PST files that were not processed before.
■ Enterprise Vault archives only the classes of items that are defined as eligible
for archiving on the Message Classes tab in Exchange PST Migration
properties.
■ The migration obeys the registry settings that are set for the Storage service.
■ If you have configured customized shortcuts on the Shortcut Content tab
of the Exchange PST Migration policy, then the PST Migrator uses these
settings. Otherwise the shortcut content settings that are configured in the
Exchange Mailbox policy are used.
■ Items can be assigned a specific retention category during PST migration. You
may want such items to retain this retention category if they are moved later to
a folder with a different retention category. To prevent Enterprise Vault from
changing the retention category, ensure that the policy option, Include items
with Retention Category selected by the user, set by a custom filter, or set
by PST migration is not selected. This option is on the Moved items tab of the
Exchange mailbox policy properties.
■ The PST files must not be in use at the time of migration, so make sure that
users do not have them open. You may find that it is better to move the PST
files.
■ The best procedure may be to gather all the PST files into the same place and
then to migrate them from there. This makes it easier to generate the initialization
file, assign permissions, and to manage files. Note though, that you may have
some file name conflicts if there are PST files with the same name. Also, if any
PST files are likely to be unmarked ensure that you know the owners because
there may be no identifying information in the PST.
■ The Vault Service account must have Full Control access to the PST file.
■ The Storage service for the destination vault store must be running.
■ PST files that are password protected cannot be processed. You must remove
such protection before migrating their contents.
Alternatively, you may allow Enterprise Vault to override PST passwords during
PST migration. To override passwords, enable Override passwords for
password-protected PST files in the General tab of the site properties.
■ If you intend to use the automatic PST compaction feature at the end of
migrations, you may need some spare disk capacity for the compaction to take
place. You can need as much as the size of the largest PST file, plus
approximately 5% of its size. You may choose to ignore compaction if you plan
to delete the PST files after migration.
■ Policy Manager migration checks the mailbox storage limit when a mailbox has
either Prohibit Send or Prohibit Send & Receive mailbox limits set. If both these
limits are set, Policy Manager does not move any item to the mailbox that
PST migration: scripted 280
Output from PST migration
exceeds the lower limit. If only one of the limits is set, then Policy Manager obeys
that limit.
Note that, even if the storage limit prevents items from being moved to the
mailbox, the items are still archived in the appropriate archive. In this case you
can increase the mailbox quota and then migrate the PST file again to move
the items to the mailbox.
[PSTCHECKPOINT]
GENERATION = 1
CREATED = 02Oct2008 10:58:02 AM
SOURCE = E:\EV\pstmigration\pstlist.ini
PSTPROCESSEDCOUNT = 118
PSTNOTREADYCOUNT = 3
PSTWARNINGCOUNT = 2
■ PSTPROCESSEDCOUNT = 118 shows that the file contains references to 118 PST
files.
■ PSTNOTREADYCOUNT = 3 shows that there are three files with problems. The
Report_Error entries in the individual [PST] sections give you more information.
Policy Manager automatically adds DONOTPROCESS = TRUE to each of these
[PST] sections.
■ PSTWARNINGCOUNT = 2 shows that there are two files with warnings. In this case,
these are both marked PST files whose markings are intentionally being
overridden. The Report_Error entries in the individual [PST] sections gives more
information.
Because Policy Manager has added the DONOTPROCESS = TRUE entries to each of
the problem PST files, you could run this new initialization file in process mode
immediately, leaving the problem PSTs to be addressed later. Alternatively, you
could fix the problems, remove the DONOTPROCESS = TRUE entries, and then run
the file again in either report mode or process mode.
[PSTCHECKPOINT]
GENERATION = 2
CREATED = 02Oct2008 10:59:36 AM
SOURCE = E:\EV\pstmigration\pstlist.ini
PSTPROCESSEDCOUNT = 115
PSTFAILEDCOUNT = 0
PSTUNPROCESSEDCOUNT = 3
PSTINCOMPLETECOUNT = 0
PSTPARTIALCOUNT = 0
There is a summary log entry for each PST file that is migrated. The entry lists the
number of items that have been archived and also the number of items that have
been moved to the mailbox.
Some items may not be eligible for archiving or moving to the mailbox. This is the
case if they have a message class that you have specifically excluded from being
archived (using the Message Classes tab of the Exchange PST Migration policy
in the Administration Console), or if they were created on a computer that uses a
language incompatible with that of the Storage service computer. For example, if
a PST file contains a mixture of Japanese and English items, and the Storage
Service computer uses Japanese, the English items are not eligible for archiving.
PST migration: scripted 283
Example initialization file for PST scripted migration
CancelMbxAutoArchive = false
RetentionCategory = Business
Chapter 19
PST migration:
wizard-assisted
This chapter includes the following topics:
■ PST Migrator archives only those types of items for which you have enabled
archiving. To view or modify the types of items that are archived, start the
Administration Console and go to the Message Classes tab of the Exchange
PST Migration policy properties.
■ If you have configured customized shortcuts in the Exchange PST Migration
policy, then the PST Migrator uses these settings. Otherwise the shortcut content
settings configured in the Exchange Mailbox policy are used.
■ You specify the required archiving settings as you work through the wizard.
PST migrator does not use any other settings from the Exchange PST Migration
policy.
It is impossible to specify a migration process that suits everybody. For example,
you may want to delete PST files after migrating them or you may want to continue
using them. PST Migrator provides great flexibility, but you must think carefully
about how you want to carry out the migration.
7 Each PST file is listed together with the associated mailbox and destination
archive, if known. It is important that you check the list of matches before
beginning the migration. You can select or change the destination archive for
a PST file, or remove PST files from the list, if necessary.
8 Each PST file is listed together with the retention category that will be applied
to the items when they are archived. If required, you can change the retention
category for individual PST files. You can choose an existing retention category
or create a new one.
9 Specify whether PST Migrator is to create shortcuts for the items it archives.
You can configure PST Migrator to do either of the following:
■ Archive the items and delete the original items from the PST without creating
shortcuts.
■ Create shortcuts in the PST files and delete the original items after they
have been archived. You might select this if users will still have access to
the PST files at the end of the migration. The users must move the shortcuts
to their mailboxes before they will work.
■ Create shortcuts in the associated mailboxes and delete the original items
from the PST files after they have been archived.
10 Specify the required folder structure that the PST Migrator is to create in the
mailbox for shortcuts to migrated items. You can specify a mailbox folder that
is to correspond with the root folder in the PST file. Where there are several
PST files to migrate, you can choose to merge the folder structures or keep
them separate.
11 Select the language of the PST files to be migrated.
12 Specify whether PST Migrator is to migrate the Deleted Items folder in the
PST files, or leave it in the PST file.
If calendar items are to be archived, specify whether PST Migrator is to migrate
unexpired calendar items.
13 Specify what to do with each PST file after it has been processed. You can
select the following:
■ Leave the file as it is.
■ Delete the file.
■ Compact the file to free up disk space.
■ Set permission on the file to read-only to prevent users adding items to the
file.
PST migration: wizard-assisted 288
Preparation for the wizard-assisted PST migration process
■ Hide the file. If you are not migrating all the PST files at the same time, this
can help you to see how many PST files are left to migrate. The next time
you run PST Migrator the hidden PST files will not be visible, provided that
you have set your desktop so that it does not show hidden files.
14 Specify whether PST Migrator is to create a report file for the migration. Report
files are created in the Reports subfolder of the Enterprise Vault installation
folder.
15 Start the migration.
During the migration, the PST Migrator writes two events to the Enterprise
Vault event log for each PST file, one when it starts processing the file, and
another when it has finished.
If an item cannot be migrated, it is moved to a folder called PST Migration
Failed Items in the PST file.
by PST migration is not selected. This option is on the Moved items tab of the
Exchange mailbox policy properties.
■ If PST files are scattered in different locations on users' disks, you may find it
easier to move them all to a central location before you run PST Migrator.
■ If you have PST files that must be migrated to different vault stores, the quickest
way to sort them is to use the automatic correlation within PST Migrator and
remove those that do not correlate.
See “Migration tips for the wizard-assisted PST migration process” on page 289.
■ If you intend to use the automatic PST compaction feature at the end of
migrations, you may need some spare disk capacity to provide room for the
compaction to take place. You can need as much as the size of the largest PST
file, plus approximately 5% of its size.
■ PST Migrator checks the mailbox storage limit when a mailbox has either Prohibit
Send or Prohibit Send & Receive mailbox limits set. If both these limits are set,
PST Migrator does not migrate the items that exceed the lower limit. If only one
of the limits is set, then PST Migrator obeys that limit.
If a PST file fails migration because the mailbox is full, you can modify the
appropriate mailbox storage limit and then migrate the PST file again.
process. Enterprise Vault makes three attempts to convert an item, so can take
up to 30 minutes before failing an item and moving on to the next one.
If there are very large, or very complex, items in a PST file, it can take a long
time to migrate them all. If you do not need the content of the items to be indexed,
then you can improve performance by lowering the conversion timeout to just
a few minutes.
This change to the conversion timeout also affects normal archiving, so
remember to return it to the original value when you have migrated the PST
files.
To change the conversion timeout, perform the following steps in the order listed:
■ On the Storage service computer, set the following string registry value to
the timeout, in minutes, that you want to use:
HKEY_LOCAL_MACHINE
\Software
\Wow6432Node
\KVS
\Enterprise Vault
\ConversionTimeout
■ If you have PST files in the same location that you want to go to different vault
stores, the quickest way to do this is as follows:
■ Run PST Migrator and select the first archive store that you want to use.
■ Select all the PST files, including those that should go to other vault stores.
■ Select automatic correlation. PST Migrator will open the vault store and
match PST files to archives within that vault store. All other PST files will not
be matched.
■ Click the Archive heading on the screen to sort by destination archive. This
puts at the top of the list all the PSTs that could not be matched to archives.
■ Drag-select all the PSTs that could not be matched to archives and then
click Remove.
■ On the PST Migrator screen that asks What do you want to do with PSTs
after all items are successfully migrated from each?, select Hide them.
■ At the end of the migration, PST Migrator hides the PST files that were
migrated. The next time you run PST Migrator, these PST files will not appear
in the list of PST files available for migration. The files appear hidden only
if you have set your desktop so that it does not show hidden files.
PST migration: wizard-assisted 291
How the wizard-assisted PST migration process affects users
■ Repeat the process, running PST Migrator again, this time choosing a
different vault store.
■ When you have worked through all the vault stores, you may have some
PST files left that failed to migrate. Run PST Migrator again and manually
select the correct archive for each PST
■ If you run PST Migrator on a computer that is not running the Storage service
for the vault store, then you cannot choose PSTs on a local disk. However, you
can choose PSTs from a mapped network drive or a shared network folder.
■ If users store new items in a PST file that has been migrated, you can run the
migration again at any time, again creating shortcuts to migrated items. PST
Migrator will migrate the new items.
■ You can delete PST files at the end of the migration. If you do this then,
obviously, the files are no longer available to users.
■ If a user has configured Outlook to deliver new mail to a PST file rather than to
the mailbox, there will be errors when Outlook next starts, as follows:
■ If the PST file no longer exists, there is an error as soon as Outlook starts
and the user is then given the option to create a new PST file.
■ If the PST file still exists but is read-only, then there will be an error as soon
as the user tries to access the PST or tries to create a mail message.
The best solution is for users to make sure, before you perform the migration,
that mail is not being delivered to PST files.
■ A PST Locator task. This task searches your network for computers and PST
files. You can configure specific paths to include or exclude during PST
searching. There can be only one PST Locator task in your Enterprise Vault
site.
■ A PST Collector task. This task moves the PST files that the PST Locator task
has found to a central PST holding folder, ready for them to be migrated. This
task uses the migration priority of the file when it collects files. There can be
many PST Collector tasks in your Enterprise Vault site.
■ A PST Migrator task. This task migrates the contents of PST files that are in the
PST holding folder to Enterprise Vault archives. This task uses the migration
priority of the file when it migrates files. There can be many PST Migrator tasks
in your Enterprise Vault site.
Step 1 Decide whether to use PST marking. See “ PST file marking to determine
ownership” on page 270.
Step 2 Decide whether you want to use See “Administrator roles required to
accounts other than the Vault Service manage PST Locate and Migrate”
account to manage PST migration on page 294.
objects in the Administration Console.
Step 3 Create or edit Exchange PST See “How to edit the Exchange PST
Migration policies. Migration policy” on page 295.
Step 4 Configure the network share that is See “Configuring the holding folder for PST
to be used as the central PST holding Locate and Migrate” on page 296.
folder.
Step 5 Create and configure PST Locator, See “Creating and configuring the PST
PST Collector, and PST Migrator Locator, PST Collector, and PST Migrator
tasks. tasks” on page 298.
PST Administrator role or the Power Administrator role. The Vault Service account
has access to all objects and functions in the Administration Console.
The accounts under which the PST Locator, PST Collector, and PST Migrator tasks
run must have appropriate access to the computers to be searched, and the PST
files to be processed. The PST Migrator task requires access to the computers and
original PST files for post-migration operations.
All the tasks also need appropriate access to the PST holding folder.
See “Configuring the holding folder for PST Locate and Migrate” on page 296.
The PST Migrator task account must have full access to its temporary files folder.
See “How to configure the PST Migrator task” on page 303.
Depending on the type of search that has been configured for the PST Locator task,
the account must either be able to scan remotely the registry on each computer or
have access to the drives on each computer.
To ensure that the tasks have adequate access to all the computers in the domain,
you can run the tasks under the accounts that are members of the domain
administrators' group. Use the settings on the Log On page of the task properties
to specify the account.
For details of the permissions that the account needs, see the online Help for the
Log On page. In addition, the account must have either the PST Administrator role
or the Power Administrator role.
Note: It is not advisable to add the Vault Service account to the domain
administrators' group.
■ The migration priority that the PST Collector and PST Migrator should use to
collect and migrate PST files.
■ The classes of items to migrate.
■ Whether to allow users to submit PST files for migration and change the retention
category of files that they choose to migrate.
■ The paths that the Enterprise Vault Outlook Add-In should specifically look in
or ignore when it searches for PST files on users' computers.
■ Whether to migrate the Deleted Items folder and unexpired calendar items.
■ The folder structure to create for shortcuts in users' mailboxes.
■ The Windows code page to use if the PST Migrator creates folders in users'
mailboxes.
■ How to process PST files after successful migration.
■ The notification emails that you want Enterprise Vault to send for various PST
migration events.
When items have been migrated, the original items in the PST files are not deleted.
If you want to delete the PST files after successful migration, choose to do so on
the Post Migration tab of the PST Migration policy.
Account used to configure the PST holding Read. Access can be removed after
folder configuration, if required.
Determining the size of the holding folder for PST Locate and
Migrate
In Enterprise Vault site properties you can specify a maximum size in gigabytes for
the PST holding folder. The size that is specified applies to each PST Collector
task. For example, if you specify the maximum folder size as 5 GB, and there are
two PST Collector tasks configured, then the total maximum size of the PST holding
folder is 10 GB.
The PST Migrator task should empty the PST holding folder during its scheduled
daily run. If PST files remain in the PST holding folder, they are not migrated until
the next scheduled run starts. As PST files are set to read-only during migration,
users cannot access these PST files for an extended period.
You can use one of the following techniques to ensure that the PST Migrator task
empties the PST holding folder:
■ Set a suitable maximum size for the PST holding folder that ensures the PST
Migrator task can empty the folder during its scheduled daily run.
■ Set a small maximum size for the PST holding folder, and then schedule the
PST Collector task so that it keeps the folder full. Set the schedule for the PST
Collector task so that it ends before the end of the PST Migrator task schedule.
This approach ensures that the PST Migrator task has time to empty the folder
during its scheduled run.
■ When the PST Migrator task runs, it generates a report file. You can use the
information in this report to determine the average number of PST files that the
PST migration: Locate and Migrate 298
Setting up PST Locate and Migrate
task can migrate during its scheduled run. In the properties of the PST Collector
task, you can then specify the maximum number of PST files to store in the PST
holding folder.
Creating and configuring the PST Locator, PST Collector, and PST
Migrator tasks
To use the PST Locate and Migrate tool, you create and configure the following
tasks:
■ PST Locator task. This task searches your network for domains, computers,
and PST files. You can configure specific paths to include or exclude during
PST searching. There can be only one PST Locator task in each Enterprise
Vault site. The PST Locator task is not required for client-driven PST migration.
■ PST Collector task. This task moves the PST files that the PST Locator task
has found to a central PST holding folder, ready for them to be migrated. This
task uses the migration priority of the file when it collects files. There can be
many PST Collector tasks in each Enterprise Vault site, but only one PST
Collector task per Enterprise Vault server. You need to configure a PST Collector
task on each Enterprise Vault server that hosts archives to which you intend to
migrate PST files. The PST Collector task is not required for client-driven PST
migration.
■ PST Migrator task. This task migrates the contents of PST files that are in the
PST holding folder to Enterprise Vault archives. This task uses the migration
priority of the file when it migrates files. There can be many PST Migrator tasks
in your Enterprise Vault site. You need to configure a PST Migrator task on each
Enterprise Vault server that hosts archives to which you intend to migrate PST
files.
The Locate and Migrate tasks run according to schedules that you define. However,
there is also the Run Now option for each task so that you can run it immediately,
if required.
To create a PST Locator task
1 In the Administration Console, expand your site until the Enterprise Vault
Servers container is visible.
2 Expand Enterprise Vault Servers and then expand the server on which you
want to add the PST Locator task.
3 Right-click Tasks and then, on the shortcut menu, click New > PST Locator
task.
The New PST Locator task wizard starts.
4 Work through the wizard to create the task.
PST migration: Locate and Migrate 299
Setting up PST Locate and Migrate
Note: Do not change the location of this folder while the PST Migrator task
runs, or while Locate and Migrate processes PST files.
After you have created a PST Locator, PST Collector, or PST Migrator task, you
can configure each task using the task properties. Double-click the task to display
the task properties.
■ Settings. On this page you configure how the task is to search for domains,
computers, and PST files.
■ Select whether the task is to use NetBIOS or Active Directory to find the
domains and computers on which PST files reside.
■ You can configure the task to search computers for PST files using a registry
or hard disk search. A registry search uses remote registry calls to search
the Outlook profile for PST files. If a PST file is found in a profile, the
Exchange mailbox in the profile is noted. If an Exchange mailbox is found,
the task tries to determine the archive and the site that is associated with
the primary mailbox referenced in the profile.
A hard disk search scans all the local hard disks on the designated computer
for files with an extension of .pst. It does not search the PST holding folder
or the temporary migration folder on any computer running a PST Migrator
task. On all computers, the Recycle Bin is not searched.
As there can be very large numbers of PST files on computer hard disks, it
is advisable to perform registry searches initially.
■ With the default settings, the task does not automatically search any
computers for PST files; you need to select the computers to search. If you
select the setting By default search for PSTs on each computer, the task
automatically starts searching every computer it finds. As this process can
take a very long time on a large network, use this setting with caution.
■ Search Paths. Here you can specify the paths that you want the PST Locator
to look in or ignore when looking for PST files.
■ Domains. Domains that the task finds are listed on this page. Only the domains
that are selected on this page are searched for computers and PST files.
■ Schedule. It is advisable to schedule the PST Locator task to run during normal
office hours, so that it finds the maximum possible number of computers and
PST files when users’ computers are switched on and connected to the internal
network. If the site schedule is set to run tasks during non-office hours, you may
want to override the site settings by specifying the schedule for this task.
■ Log On. The account under which the PST Locator task runs must have
appropriate access to the computers that it is to search for PST files. Depending
on the type of search that is configured for the task, the account must either be
able to scan remotely the registry on each computer or have access to the drives
on each computer.
To ensure that the task has adequate access to all the computers in the domain,
you can run the task under an account that is a member of the domain
administrators' group. Use the settings on the Log On page of the task properties
to specify the account.
PST migration: Locate and Migrate 301
Setting up PST Locate and Migrate
Switching off NetApp device identification checks by the PST Locator task
When the PST Locator task finds a computer, it attempts to determine if the computer
is a NetApp device. Performing this check can slow down the search for computers.
This section describes how to switch off the automatic identification of NetApp
devices by the PST Locator task during the search for computers. Later you can
identify NetApp devices manually by editing the computer properties in the
Administration Console.
See “Selecting computers for PST searching” on page 309.
To switch off the automatic identification of NetApp devices you configure a setting
in the file PSTlocatorTask.exe.config. This file and an example version of it are
located in the Enterprise Vault program folder (for example C:\Program Files
(x86)\Enterprise Vault). The example file contains examples of the settings
that can be configured in PstLocatorTask.exe.config.
To switch off the automatic identification of NetApp devices
1 On the Enterprise Vault server that runs the PST Locator task, start Windows
Explorer and navigate to the Enterprise Vault program folder (for example
C:\Program Files (x86)\Enterprise Vault).
■ Schedule. It is advisable to schedule the PST Collector task to run during normal
office hours, so that it can access as many computers and PST files as possible
when users’ computers are switched on and connected to the internal network.
If the site schedule is set to run tasks during non-office hours, you may want to
override the site settings by specifying the schedule for this task.
■ Log On. The account under which the PST Collector task runs must have
appropriate access to the computers and PST files to be migrated. To ensure
that the task has adequate access to all the computers in the domain, you can
run the task under an account that is a member of the domain administrators'
PST migration: Locate and Migrate 303
Setting up PST Locate and Migrate
group. Use the settings on the Log On page of the task properties to specify
the account.
See “Administrator roles required to manage PST Locate and Migrate”
on page 294.
■ Schedule. It is advisable to schedule the PST Migrator task to run during normal
office hours, so that it can access as many computers and PST files as possible
when users’ computers are switched on and connected to the internal network.
Access to the computers and original PST files is required for post-migration
operations, such as unlocking the PST files, creating shortcuts or deleting the
PST files. If the site schedule is set to run tasks during non-office hours, you
may want to override the site settings by specifying the schedule for this task.
■ Log On. The account under which the PST Migrator task runs must have
appropriate access to the PST holding folder, temporary files folder, and
computers and PST files to be migrated. Access to the computers and original
PST files is required for post-migration operations. To ensure that the task has
adequate access to all the computers in the domain, you can run the task under
an account that is a member of the domain administrators' group. Use the
settings on the Log On page of the task properties to specify the account.
See “Administrator roles required to manage PST Locate and Migrate”
on page 294.
PST migration: Locate and Migrate 304
Migrating PST files using PST Locate and Migrate
4 Use Run now or schedule another run of the PST Locator task, this time to
search for PST files on the selected computers. All the PST files that the task
finds are listed in the Administration Console, under Personal Store
Management > Files.
See “Running the PST Locator task to find PST files” on page 311.
You can also use the Add option in the Personal Store Management > Files
context menu to add PST files that you want to migrate to Enterprise Vault.
See “Adding PST files for migration” on page 312.
5 In the Administration Console you can edit the properties of a PST file, provide
passwords for password-protected PST files, change the migration priority,
and change the migration status of a PST file, if required.
The PST Collector task copies PST files with a status of Ready to copy to the
PST holding folder. Depending on the configuration options selected, some
manual intervention may be required to approve PST files for migration. For
example, migration may only be started once the PST files have been backed
up, or the ownership of particular PST files may need to be verified. Additionally,
you may need to provide passwords for password-protected PST files, or you
may want to prevent the migration of particular PST files.
Note that for password-protected PST files you may allow Enterprise Vault to
override the passwords during PST migration. This setting is useful in cases
the password is missing or is incorrectly provided. To override passwords,
enable Override passwords for password-protected PST files in the General
tab of the site properties.
See “Editing PST file properties” on page 313.
6 Use Run now or schedule a run of the PST Collector task to copy the selected
PST files to the central PST holding folder.
The PST Collector task considers the migration priority of the file when it copies
files. The task copies the files that have a higher priority first.
See “Running the PST Collector task” on page 314.
7 Use Run now or schedule a run of the PST Migrator task to archive items from
the PST files to the associated destination archive.
The PST Migrator task considers the migration priority of the file when it archives
files. The task processes the files that have a higher priority first.
See “Running the PST Migrator task” on page 315.
PST migration: Locate and Migrate 306
Migrating PST files using PST Locate and Migrate
2 The task searches for computers in the domains that you selected in the task
properties. Computers that have been found on the network are listed under
Personal Store Management > Computers in the Administration Console.
You can run the task several times to build up a list of computers before
beginning the search for PST files.
3 In the list of computers, select the computers that you want the task to search
for PST files.
See “Selecting computers for PST searching” on page 309.
On a small network, if you want the task to automatically search every computer
that it finds, select By default search for PSTs on each computer on the
Settings page of the PST Locator task properties.
You can also specify paths to include or exclude for PST file searches.
See “Configuring paths to include or exclude for PST searching” on page 310.
4 Next to Associated mailbox, click Browse to select the mailbox from a list of
those available. You can leave Associated mailbox blank if required.
5 Select the Search this computer when PST Locator task runs check box
to enable searches of the computer when the PST Locator task runs.
To add multiple computers to search for PST files
1 Specify details of the computers that you want to add in a CSV file, each on a
separate line, in the following format:
Name,Mailbox,EnableSearch
where:
■ Name (mandatory) is the name of the computer that you want to add. You
can specify the NetBIOS or the fully qualified domain name of the computer.
■ Mailbox (optional) is the display name of the mailbox that you want the
located PST files to be associated with in the archive.
■ EnableSearch (optional) specifies whether the PST Locator task should
look for PST files on this computer.
0 - Do not search for PST files on this computer.
1 - Search for PST files on this computer.
Note the following:
■ If the first line of the CSV file fails to process, Enterprise Vault considers
the line as the header row and ignores it during processing.
■ If the value contains spaces or commas, enclose the value in quotation
marks.
■ Comma separators are required even when you do not specify optional
parameters.
Example:
Name,Mailbox,EnableSearch,DirectoryName,SiteName
abc.xyz.com,"User 1",,,
pqr1.joe.com,,1,Directory1,Site1
xuv23j3.smith.com,,,,
Note: The PST Locator task is unable to perform a hard disk search on a NetApp
MultiStore (also known as "vFiler"). A NetApp Filer must be configured with a
minimum ONTAPI Management API version of 1.4. The ONTAPI interface is the
foundational API for NetApp products. Version 1.4 is provided with the Data ONTAP
7G software release, or later. For the latest information on supported devices and
versions of software, see the Enterprise Vault Compatibility Charts at
http://www.symantec.com/docs/TECH38537.
To exclude a computer from PST searching, edit the properties of the computer.
To select multiple computers to search
1 In the Administration Console, expand Personal Store Management >
Computers to display a list of the computers that have been found on the
network.
2 Hold down Ctrl or Shift and highlight the computers that you want to search.
3 Right-click and select Properties on the menu.
4 A dialog box asks if you want the PST Locator task to search the selected
computers. If the highlighted computers are the ones that you want to search,
click Yes.
In the Search column, Yes is displayed for each computer that you selected.
PST migration: Locate and Migrate 310
Migrating PST files using PST Locate and Migrate
4 To exclude paths from PST searching, in Exclude from search, click Add
Paths to add the paths that you want to exclude.
Note: Paths you specify for exclusion should be subpaths of the paths that you
have included for search.
■ Wait for the scheduled run time for the PST Locator task.
2 The task searches for PST files on the computers that you selected. The PST
files that have been found are listed under Personal Store Management >
Files in the Administration Console. You can filter the PST files with a particular
migration status, or for a certain user.
3 Before the PST Collector task runs to copy the PST files to the PST holding
folder, you must edit the properties of the PST files to provide any missing
information and change the status to "Ready to copy".
See “Editing PST file properties” on page 313.
where:
■ UNCPath (mandatory) is the UNC path along with the file name of the PST
file that you want to add.
■ Mailbox (optional) is the display name of the mailbox that you want this
PST file to be associated with in the archive.
■ Archive (optional) is the name of the archive.
1 - Critical
2 - Important
3 - High
4 - Medium
5 - Low
6 - lowest
■ Language (optional) specifies the language that the PST Migrator is to use
if it needs to create folder names in the mailbox. PST Migrator must use
the same Windows code page that was used when the PST file was created.
Note the following:
■ If the first line of the CSV file fails to process, Enterprise Vault considers
the line to be the header row and ignores it during processing.
■ If a value contains space characters or commas, enclose it in quotation
marks.
■ Comma separators are required even when you do not specify optional
parameters.
The following is a sample CSV file:
UNCPath,Mailbox,Archive,RetentionCategory,Priority,Language,DirectoryServer,SiteName
\\Server\E$\PSTBackup\Backup.pst,User1,Archive,Default,2,"Western European"
\\abc.xyz.com\c$\user1.pst,User1,"Mailbox,Z","Archive 1",RC1,1,Arabic,EVServer1,SiteA
\\Server\D$\PSTs\HR.pst,,,,,
If the PST Locator task cannot determine the ownership of the PST file, the
associated mailbox, and its corresponding archive, then the PST file status is
displayed as “Not ready”. You need to edit the properties of the PST file to provide
the required information, and change the status to “Ready to copy”.
If required, you can use the Settings tab in the PST file properties to specify the
password for a password-protected file.
To edit the properties of a PST file
1 In the Administration Console listing, double-click the PST file name to display
the PST file properties.
2 On the General page, do one of the following:
■ Next to Mailbox, click Browse, and then select the mailbox of the user
who owns the PST file. The corresponding archive is automatically chosen.
■ Next to Destination archive, click Browse, and then select the mailbox
archive of the user who owns the PST file. The corresponding mailbox is
automatically chosen.
4 When you have completed the required details, change the migration status
on the General page to Ready to copy.
See “Administrator roles required to manage PST Locate and Migrate” on page 294.
To run the PST Collector task
1 In the Tasks listing of the Administration Console, right-click the PST Collector
task and then, on the shortcut menu, click Start.
2 Do one of the following:
■ Right-click the task and then, on the shortcut menu, click Run Now.
■ Wait for the scheduled run time for the PST Collector task.
3 When the file contents have been archived, the PST file status is displayed as
"Ready for post-processing".
When the PST Migrator task has successfully finished processing the PST file,
the file status is displayed as "Complete". Depending on how you have set up
email notifications, an email is sent to the end user’s mailbox.
If a problem prevents the task from completing an operation, details are
displayed in the Failure text box of the PST file properties in the Administration
Console. You can also check the report file that is generated during the run.
PST migration: Locate and Migrate 316
Migrating PST files using PST Locate and Migrate
Cmdlet Description
Add-EVPstComputer Adds a computer to the list of Locate and Migrate PST migration
target computers.
You can add computers that belong to individual users, and you
can add file servers that host PST files that belong to many users.
Add-EVPstFile Adds a PST file whose content you want to migrate to Enterprise
Vault.
You can use these cmdlets on their own to add individual computers and files, or
with PowerShell’s Import-Csv cmdlet and CSV data, to add multiple computers or
files in a single operation.
Using Add-EVPstComputer
Use the following syntax when you run Add-EVPstComputer:
Add-EVPstComputer -Name <string> [-Mailbox <string>] [-EnableSearch]
[-SiteName <string>] [-DirectoryServer <string>]
PST migration: Locate and Migrate 317
Migrating PST files using PST Locate and Migrate
For example:
C:\PS>Add-EVPstComputer -Name JohnDoeLaptop -Mailbox "John Doe"
-EnableSearch
This adds John Doe’s laptop as a PST migration target, and also specifies John’s
mailbox, in which Enterprise Vault will place shortcuts for migrated items.
Using Add-EVPstFile
Use the following syntax when you run Add-EVPstFile:
Add-EVPstFile -UNCPath <string> [-Archive <string>] [-Mailbox
<string>] [-RetentionCategory <string>] [-PasswordProtected]
[-Language <string>] [-Priority <string>] [-SiteName <string>]
[-DirectoryServer <string>]
For example:
C:\PS>Add-EVPstFile -UNCPath
\\FileServer1\UserShares\VIPs\JohnDoe\PSTs\2012.pst
This adds the specified PST file for migration to Enterprise Vault.
This reads data from C:\files.csv and pipes it to the Add-EVPstFile cmdlet.
PST migration: Locate and Migrate 318
Excluding network shares from PST migration using the PstLocatorTask.exe.config file
By default, Import-Csv passes each value from the CSV data as a string. However,
when you use the Add-EVPstComputer cmdlet, you must pass the -EnableSearch
as a Boolean.
If you use Add-EVPstComputer with Import-Csv, you must convert the
-EnableSearch value from the CSV data to a Boolean. For example:
For more information about the use of Import-Csv, type the following command in
PowerShell:
Get-Help Import-Csv -detailed
5 Immediately below this heading, add a line to list the network shares that you
do not want to search. The syntax is as follows:
<add key="SharesToAvoid" value="share_1;share_2;share_3..."/>
<add key="SharesToAvoid"
value="\\myComputer\C$;\\yourComputer\G$"/>
These errors are also reported if the Windows firewall is on. If the firewall is on,
then you need to create an exception in Windows firewall for "File and Printer
sharing", TCP port 139 and 445.
Chapter 21
PST migration: client-driven
migration
This chapter includes the following topics:
Depending on whether you want to give users more control over PST file
migration, you may allow users to choose files for migration.
■ An explanatory mail message is immediately sent to the newly enabled
mailboxes.
■ The next time a user starts Outlook, the computer is scanned for PST files.
■ Starting with PST files in the user's profile, each PST file is sent as a series of
approximately 10-MB chunks to the PST holding folder.
■ The PST Migrator task migrates the chunks to the user’s archive.
■ When a PST file has been successfully migrated, checks are made to make
sure that no more items have been added to it. Depending on how you have
set the PST Migration policy, the PST file is removed from the user’s profile after
all the items are migrated.
Note: Client-driven PST migration does not work if the registry value
PSTDisableGrow is enabled on users' computers. For information about how to
override PSTDisableGrow, see the Setting up Exchange Server Archiving guide.
Step 1 For migrating the PST files that are See “Permissions required for migrating
on network shares, the account that PST files stored on network drives”
runs the Directory service requires a on page 323.
set of minimum permissions.
Step 2 Configure the PST holding folder. See “Configuring the PST holding folder
for PST client-driven migration”
on page 323.
Step 3 Set up the PST migration messages. See “Editing the PST migration messages
for client-driven PST migration”
on page 324.
Step 4 Create a PST Migrator task, and See “Creating a PST Migrator task for PST
configure temporary files folder. client-driven migration” on page 325.
PST migration: client-driven migration 323
Preparation for client-driven PST migration
4 In the Browse for Folder dialog box, expand Entire Network > Microsoft
Windows Network. Expand the required domain and then the server on which
the share is located. The list of shares that are displayed contains shared
folders to which the account has access.
5 Select the folder you want to use for the PST holding folder and then click OK.
6 Click OK to close Site Properties.
PSTMigratedMessage Your PST file {0} has been archived by Enterprise Vault
Note: You need to configure a PST Migrator task on every Enterprise Vault server
that hosts a Storage service and manages the archives to which you intend to
migrate PST files. When the migration process migrates a PST file, it runs on the
Enterprise Vault server that manages the destination archive.
Note: Do not change the location of this folder while the PST Migrator task
runs, or while client-driven migration processes PST files.
4 Click Finish to enable the selected mailboxes for client-driven migration and
exit from this wizard.
6 Click Search Paths to specify the paths that you want the Enterprise Vault
Outlook-Add-In to include or exclude when searching for PST files.
7 Click OK.
Chapter 22
NSF migration: scripted
This chapter includes the following topics:
In process mode, Policy Manager migrates items from the NSF files listed in the
initialization file. Policy Manager also writes a new initialization file when you run it
in process mode, and marks the files it has processed successfully. You can use
the new file to migrate any failed files when you have corrected the problems that
prevented their migration.
If you want to migrate only a small number of NSF files, consider using NSF migrator
instead.
See “About NSF migrator” on page 331.
Chapter 23
NSF migration: wizard
assisted
This chapter includes the following topics:
Specify the directory computer When you start NSF migrator from Windows, you
must enter the name of the Enterprise Vault
directory computer that manages the archives to
which you want to migrate NSF file content. You
do not have to specify the directory computer when
you run NSF migrator from within the Administration
Console.
Select a vault store You can specify only one vault store each time you
run NSF migrator. If you want to migrate NSF files
to archives in more than one vault store, you must
run NSF migrator again. If appropriate, you can run
more than one instance of NSF migrator.
Select NSF files Select the NSF files that you want to migrate. You
must use only UNC paths to access the locations
that hold the NSF files you plan to migrate.
Match NSF files to archives Choose which method NSF migrator should use to
match NSF files to archives. You can match NSF
files to archives individually. Alternatively, NSF
migrator can match NSF files to archives
automatically, which it does by matching the mail
file names in its archives with the owner property
stored in each NSF file. This is the quicker option
if you are migrating many NSF files. Even if you
select this option, you can still manually match any
NSF files that fail automatic matching, or change
those that are matched.
NSF migration: wizard assisted 333
About planning for NSF migration
Select a default retention category Choose the default retention category that will be
used when archiving items from the NSF files. Later
in the wizard you can review and change the
retention category for each NSF file if necessary.
If there is no suitable retention category, you can
create one at this point in NSF migrator.
Select retention categories By default, all content from the NSF files is migrated
using the default retention category you selected
earlier in the wizard. However, at this point you can
choose different retention categories for individual
NSF files.
Select a folder structure You can configure the folder structure that is used
to contain the shortcuts in user mail files. For
example, for users who have more that one NSF
file, NSF migrator can either merge their contents
in one folder structure, or create a separate
structure for each.
Configure deleted items and calendar Choose whether or not NSF migrator should
items migrate items from the Trash folder in each NSF
file. If appropriate, you can also select the Archive
calendar items that have not yet expired option.
Post-migration NSF file settings Finally, you can configure what NSF migrator
should do with the NSF files it has migrated. For
example, NSF migrator can automatically delete
the NSF files.
NSFMigratedMessageMailFile Your NSF file ({0}) has been archived. Shortcuts to the
items are in {1}.
NSFMigratedMessageNSF Your NSF file ({0}) has been archived. Shortcuts to the
items are in the NSF file.
In all three messages, {0} represents the name of the NSF file.
These three messages are in a file called EVMessages.nsf. This file is in the
\Languages\Mailbox Messages\lang\ folder in the Enterprise Vault program
folder, for example C:\Program Files (x86)\Enterprise
Vault\Languages\Mailbox Messages\lang\, where lang represents your language.
The three messages contain placeholder text and you can edit this text if necessary.
You should edit the messages in EVMessages.nsf using an account that has the
Access to current database permission, to avoid execution security alerts.
Once you have edited the messages, save EVMessages.nsf and copy it to the
Enterprise Vault program folder, for example C:\Program Files (x86)\Enterprise
Vault, on all the Enterprise Vault servers.
Note: You must use UNC paths to access the locations that hold the NSF files you
plan to migrate. This is because the background server process that migrates the
content of NSF files is not necessarily on the same computer as the one on which
you run the NSF migration wizard.
■ When NSF migrator asks what you want to do with the NSF files that it migrates
successfully, select either the Delete it option, or the Hide it option.
NSF migrator then hides or deletes the NSF files it has migrated successfully. If
your operating system is configured to hide hidden files, they are not visible when
you next run NSF migrator. Once you have repeated this process for all your other
vault stores, any NSF files that are left are only those for which automatic matching
did not work. You can investigate these files individually and select appropriate
archives when you run NSF migrator again.
HKEY_LOCAL_MACHINE
\SOFTWARE
\Wow6432Node
\KVS
\Enterprise Vault
\Agents
Table 23-2 contains the default list of the Domino mail templates that NSF migrator
treats as standard. If you regularly migrate NSF files that are based on templates
that are not in this list, and you do not want to be warned that the files are not based
on standard templates, you can add the template names to the comma separated
list in DominoMailTemplates. You must do this on all the storage servers.
HKEY_LOCAL_MACHINE
\Software
\Wow6432Node
\KVS
\Enterprise Vault
\Agents
HKEY_LOCAL_MACHINE
\Software
\Wow6432Node
\KVS
\Enterprise Vault
\Agents
Both values are set to 0 by default, which means no threshold is set. To set
thresholds, change the DWORD values to a number of days.
When ShortcutMoveRestrictDays is set to a non-zero value, NSF migrator migrates
all eligible items and creates shortcuts. Initially, all the shortcuts are in the NSF file.
NSF migrator does not move the shortcuts to items older than the specified number
of days, from the NSF file to the mail file.
When NotesMoveRestrictDays is set to a non-zero value, other items, such as
those ineligible for migration, are moved to mail files only if they are within the
number of days specified. Otherwise, they remain in the NSF files.
NSF migration: wizard assisted 339
How NSF migration affects users
■ A set of folders, named after each of the NSF files. Each folder contains the
content from just one NSF file.
If you chose to delete NSF files after successful migration, these files are no longer
available to users.
■ Retrieval queues
Enterprise Vault Exchange Mailbox Pending items to update. Also failed operations.
task for server queue A1
Enterprise Vault Exchange Mailbox Individual items to process. Used for manual archive
task for server queue A2 requests and whenever Enterprise Vault cannot directly
communicate with the Storage Archive queue of the
Storage service.
Enterprise Vault Exchange Mailbox Mailboxes to process. Used if you start archiving using
task for server queue A3 the Run Now option in the Administration Console.
Enterprise Vault Exchange Mailbox Individual items to process. Only used for retries when
task for server queue A4 Enterprise Vault cannot directly communicate with the
Storage Archive queue of the Storage service.
Enterprise Vault Exchange Mailbox Mailboxes to process. Used during scheduled archive
task for server queue A5 runs.
Enterprise Vault Exchange Mailbox Requests to update folders with items that have been
task for server queue A6 moved inside a mailbox.
Enterprise Vault Journaling task for Pending items to update. Also failed operations.
server queue J1
Enterprise Vault Journaling task for Instructs the Exchange Journaling task to examine the
server queue J3 journal mailbox for new messages. Up to 500 new
messages are marked as archive pending, and a
message is placed on queue J2 for each such
message.
Enterprise Vault Public Folder task Pending items to update. Also failed operations.
for server queue P1
Enterprise Vault Public Folder task Folders to process. Used if you start archiving using
for server queue P3 the Run Now option in the Administration Console.
Enterprise Vault Public Folder task Folders to process. Used during scheduled archive
for server queue P5 runs.
Enterprise Vault restore spool admin Items that the Storage service has retrieved and that
queue are now ready for the Exchange Mailbox task to
process (for retrieval).
Enterprise Vault storage restore for Items to be retrieved from vault stores.
server
Enterprise Vault Exchange Mailbox Process Mailbox, Process System (Run Now), Check
task for server queue A3 System, Check Mailbox.
Enterprise Vault Exchange Mailbox Only used for retries where Enterprise Vault cannot
task for server queue A4 communicate directly with the Storage Archive queue.
Enterprise Vault Exchange Mailbox Process Mailbox, Process System (Schedule only).
task for server queue A5
Table 24-3 provides more information on the messages that the Exchange Mailbox
task may place in queues A1 through A7.
Message Notes
Operation Failed Informs the Exchange Mailbox task that an error has
occurred and that it should change the message from
archive pending back into a message. The message
is reprocessed later. This message is sent if an error
occurs during archiving and storage.
Process Moved Items in Folder Asks the Exchange Mailbox task to update the items
that have been moved or copied to the specified folder.
Message Notes
Update Shortcut Informs the Exchange Mailbox task that it can turn an
archive pending item into a shortcut. It occurs after a
message has been stored by the Storage service, and
backed up.
the Storage Archive queue of the Storage service for each message to be
archived.
■ After the vault store has been backed up, Update Shortcut messages are placed
on queue A1. The messages are processed immediately because the queue
has a higher priority.
■ Queue A3 performs the same function as queue A5, but for an immediate process
system. This queue also performs shortcut expiry and deletion. Explicit user
archives from the Outlook client extension are placed on queue A2.
■ Queue A5 is only processed during a scheduled period, but queues A1 through
A3, A6, and A7 are always processed. If a queue has not been processed for
more than 10 minutes, and there are no messages in a higher priority queue,
there may be a problem with the task. Check the Enterprise Vault event log on
the Exchange Mailbox task computer for any additional information.
■ Monitoring queue A1 indicates that a backup has correctly updated shortcuts.
However, if A1 is being used during normal use (before a backup), this may
indicate a problem with tasks. Check the Enterprise Vault event log for errors.
Enterprise Vault Journaling task for Post Process Archived Item, Operation Failed.
server queue J1
Table 24-5 provides more information on the messages that the Exchange Journaling
task may place in queues J1 through J4.
Enterprise Vault message queues 348
Exchange Journaling task queues
Message Notes
Operation Failed Informs the Exchange Journaling task that an error has
occurred and that it should do the following:
Post Process Archived Item Informs the Exchange Journaling task to delete an
archive pending item from the journal mailbox. It occurs
after a message has been stored by the Storage
service, and backed-up.
Enterprise Vault Public Folder task Process Folder, Process Folders (Run Now), Check
for server queue P3 Folders, Check Folder.
Enterprise Vault Public Folder task Process Folder, Process Folders (Schedule only).
for server queue P5
Note that Enterprise Vault has not used queues P2 and P4 since version 3.6.
Table 24-7 provides more information on the messages that the Exchange Public
Folder task may place in queues P1, P3, and P5.
Enterprise Vault message queues 350
Exchange Public Folder task queues
Message Notes
Operation Failed Informs the Exchange Public Folder task that an error
has occurred and that it should change the message
from archive pending back into a message. The
message is reprocessed later. This message is sent if
an error occurs during archiving and storage.
However, the P5 queue is a special queue only used during the public folder
archiving schedule. The Exchange Public Folder task processes only messages
on queue P5 during a scheduled archive period. Outside of the schedule, any
messages on these queues are ignored.
■ Queue P3 performs the same function as queue P5, but for an administrator
Run Now. This queue also performs shortcut expiry and deletion.
■ Queue P5 is only processed during a scheduled period, but queues P1 and P3
are always processed. If a queue has not been processed for more than 10
minutes, and there are no messages in a higher priority queue, there may be a
problem with the task. Check the Enterprise Vault event log on the Exchange
Public Folder task computer for any additional information.
■ Monitoring queue P1 will indicate that a backup has correctly updated shortcuts.
However, if P1 is being used during normal use (before a backup), it may indicate
a problem with tasks. Check the Enterprise Vault event log for errors.
Retrieval queues
Table 24-8 describes the queues with which the Exchange Mailbox task carries out
retrieval. Here, server is the name of the server that the Exchange Mailbox task is
processing, whereas queue is a number that uniquely identifies the queue.
Enterprise Vault Storage Spool Message content. The messages on this queue are
items restored from the Storage service. The Exchange
Mailbox task reads the messages as it processes the
queue R1.
Table 24-9 provides more information on the messages that the Exchange Mailbox
task may place in queues R1 and R2 when it carries out retrieval.
Enterprise Vault message queues 352
Retrieval queues
Message Notes
Item Ready This message informs the Exchange Mailbox task that
a previously requested message is now available on
the storage spool queue. The Exchange Mailbox task
collects the message from the storage spool queue
and places it into the mailbox. The Storage service
generates these messages as required.
Operation Failed This message informs the Exchange Mailbox task there
was a problem restoring the message. If the retrieval
was started from the web application, the Exchange
Mailbox task updates the basket to indicate the item
was not restored.
Check the Enterprise Vault event log on the Exchange Mailbox task computer
for any additional information.
Table 24-11 provides more information on the messages that the Storage service
may place in the queues.
Message Notes
■ Age: items are archived when they have not been modified for the time that you
specify.
The age of a mail message is taken from the date when it was received or sent.
The age of a document is taken from the date when it was last modified.
■ Quota: archiving keeps a percentage of each user's Exchange mailbox storage
limit free.
■ Age and quota: Enterprise Vault performs age-based archiving first. If age-based
archiving does not make the required percentage of mailbox storage limit free,
quota-based archiving continues until the required percentage is reached.
Archiving based on age and archiving based on quota or age and quota are the
main strategies for selection of items to archive. You can also configure the policy
so that Enterprise Vault archives large items first. Archiving large items first operates
in addition to the main archiving strategy. Archiving large items first has the following
advantages:
■ Initial archiving performance is improved.
■ Mailbox space is recovered by archiving relatively few items.
You can also select the following options:
■ Items younger than an age that you specify are never archived.
■ Only messages with attachments are archived.
Consider archiving based on age and quota when archiving by age only or quota
only do not give the results you want. When archiving is based only on age, it may
not archive enough items to keep some mailboxes within their quota. When archiving
is based only on quota, some mailboxes may not come close to the Exchange
mailbox storage limit. In this case, Enterprise Vault does not even archive older
items.
Enterprise Vault calculates the amount of data it needs to archive to achieve the
quota percentage target. It bases the calculation on estimates of the size of
shortcuts. The estimates take account of any items that already have a status of
pending archive. For information about how the estimates are calculated, see the
following TechNote on the Enterprise Vault Support website:
http://www.symantec.com/docs/TECH64654
You can use the following registry values to override the values that Enterprise
Vault uses in the shortcut size estimates:
■ ShortcutCalcAverageBodySize
■ ShortcutCalcBannerSize
■ ShortcutCalcBaseItemSize
■ ShortcutCalcBodySizeMultiplier
■ ShortcutCalcOverride
■ ShortcutCalcRecipientSize
See Enterprise Vault Registry Values.
See “Recommendations for quota-based archiving” on page 357.
To find out the average shortcut size, run the Exchange Mailbox Archiving task
in Report run mode.
You specify the settings that determine what information is left in a shortcut on
the mailbox policy Shortcut Content tab.
■ Consider making shortcuts expire earlier. When shortcuts expire earlier, you
save mailbox space and avoid archiving too many items. You set the age at
which Enterprise Vault deletes shortcuts on the mailbox policy Shortcut Deletion
tab.
■ Specify that Enterprise Vault starts by archiving large items. Enterprise Vault
then archives items that use the most mailbox space first.
■ Start with a low quota percentage, and increase it gradually until you get the
results you require.
■ Make sure that there is enough archiving each night so that users have sufficient
space for the following day.
■ Check the mailbox policy Advanced settings Archive deleted items and Archive
Exchange Managed Folders.
Items in the Deleted Items folder are included in the Exchange Server mailbox
storage limit calculation. By default Enterprise Vault does not archive items from
the Deleted Items folder. So items in the Deleted Items folder can prevent
Enterprise Vault from reaching the quota percentage target.
Managed folders are also included in the Exchange Server mailbox storage limit
calculation. By default Enterprise Vault archives from managed folders, but you
can configure it so that it does not archive from managed folders. In this case,
Enterprise Vault may not be able to achieve the quota percentage target.
■ Check the mailbox policy Advanced setting Strip attachments to non-shortcut
items. By default, Enterprise Vault removes attachments from calendar, meeting,
task, and contact items after it archives these items. If attachments are not
removed from these items, then archiving them does not save space in the
mailbox.
Further points to note are as follows:
■ If no Microsoft Exchange storage limit applies to a mailbox, Enterprise Vault
cannot process the mailbox with quota-based archiving.
■ In Exchange, you can specify the maximum space that a mailbox can occupy
before the user is prohibited from sending or receiving messages. If you archive
by quota and this storage limit has been exceeded, then Enterprise Vault cannot
process the mailbox with quota-based archiving.
The solution is to remove or raise the limit, archive until a suitable storage level
is reached, and then reimpose the limit if necessary. Enterprise Vault normally
keeps users within quota, so you may decide to remove the limit.
Customizations and best practice 359
Mailbox archiving strategies
[directory]
directorycomputername=evserver
sitename=evsite
[mailbox]
distinguishedname=/o=First Organization/ou=First Administrative Group/
cn=Recipients/cn=recipient_1
; Quota settings
; Archive to 30% of quota is available
; Start with large items >1MB that are more than 1 day old
UsePercentageQuota=true
PercentageQuota=30
UseInactivityPeriod=true
QMinimumAgeThresholdPeriod=1
QMinimumAgeThresholdUnits=Days
QPrioritizeItemsOver=1024
QPrioritizeLargeItems=true
; Age settings
; Archive all items older than 3 months
; Archive all items >4MB immediately.
UseInactivityPeriod=true
InactivityPeriod=3
InactivityUnits=Months
ALargeItemThresholdPeriod=0
ALargeItemThresholdUnits=Days
APrioritizeItemsOver=4096
APrioritizeLargeItems=true
; Special case zero day folder to override Age & Quota settings
;
[filter]
name=ZeroDaysNoShortcut
DeleteOriginal=true
Unreadmail=true
The Enterprise Vault Exchange Provisioning task performs the synchronization with
Exchange managed content settings. Synchronization is automatic when there is
an Exchange 2013, 2010 or 2007 server in the domain. So the Exchange
Provisioning task performs synchronization and creates managed folder retention
categories even if you have not set Archive Exchange Managed Folders to
Managed.
If synchronization fails, it causes the entire Provisioning task to fail. To prevent
synchronization, you can place a configuration file in the Enterprise Vault server
installation folder.
See “Preventing synchronization with Exchange managed folders” on page 365.
When archiving from managed folders is active, users of the Enterprise Vault Outlook
Add-In in full mode see the following:
■ They cannot specify a retention category or an archive when they archive items
manually from managed folders.
■ The Enterprise Vault tab in the folder properties does not include the Change
option.
■ Enterprise Vault always creates shortcuts and deletes the original items.
Enterprise Vault auditing records details of creation, modification, and deletion of
Exchange managed content settings.
Customizations and best practice 363
Mailbox archiving strategies
$UserList = Get-Mailbox |
where-object{$_.ServerName -like "Exchange_server"}
foreach($Entry in $UserList)
{$Address = $Entry.PrimarySMTPAddress;
Remove-EVExchangeFolderPolicy -PrimarySMTPAddress $Address}
[Folder]
NAME=\Managed Folders\managed_folder
filtername = systemdefault
overridearchivelocks=true
where managed_folder is the name of the managed folder that you want to
use the system default filter.
2 Run Policy Manager with the initialization file.
<appSettings>
<add key="SkipManagedFolderSynch" value="true" />
</appSettings>
Note: If you decide to archive only items with attachments, consider having
occasional archiving runs with it turned off and with an age-based policy of, say,
two years. This ensures that any really old items are eventually archived, even
though they have no attachments. This frees space in the Exchange database. You
could do this using, for example, a simple, scheduled SQL script running once each
month.
Customizations and best practice 367
Mailbox archiving strategies
The following tables list the Enterprise Vault settings that you can change to modify
the behavior of the Exchange Journaling task, together with those that the Exchange
Journaling task ignores.
Setting Comment
Setting Comment
Setting Comment
■ "Default" access permissions are not applied to vaults. Thus, anyone accessing
a shortcut in a Public Folder using the default permission cannot access archived
items.
■ It is best to make Enterprise Vault archive the home server for the public folder
because this reduces complications of replication and bandwidth. However, this
might mean that you need extra Enterprise Vault servers.
■ If there is public folder replication then, when a user opens a shortcut, View
Online goes to the vault server where the item is located.
■ To view items, a user’s mailbox must be enabled for Enterprise Vault archiving.
Consider where users may be when viewing these archived items in Public
Folders. Will those users have Enterprise Vault? Will their mailboxes be enabled?
■ There may not be much space on the system disk. This means that Enterprise
Vault services may stop because they have run out of temporary storage space.
■ Performance may be affected because of the access needed to both system
files and temporary files.
We recommend that, on every computer that is running an Enterprise Vault service,
you move the Windows Temp folder to a disk other than the system disk.
To move the Windows Temp folder
1 Log on as the Vault Service account.
2 Create the new Temp folder that you are going to use.
3 On the Windows desktop, right-click My Computer and then click Properties.
4 Click the Advanced tab and then click Environmental Variables.
5 In the User variables section, click the TEMP variable.
6 Modify the value so that it points to the new folder that you created.
7 In the User variables section, click the TMP variable.
8 Modify the value so that it points to the new folder that you created.
9 Click OK.
10 Restart the computer.
Enterprise Vault provides the following registry values with which you can use
control whether Enterprise Vault converts documents to text instead of HTML:
■ To convert Excel documents to text instead of HTML, set the following registry
key to 1:
HKEY_LOCAL_MACHINE
\SOFTWARE
\Wow6432Node
\KVS
\Enterprise Vault
\ConvertExcelToText
■ To convert Word documents to text instead of HTML, set the following registry
key to 1:
HKEY_LOCAL_MACHINE
\SOFTWARE
\Wow6432Node
\KVS
\Enterprise Vault
\ConvertWordToText
■ To list a number of file types that must be converted to text, edit the following
registry key:
HKEY_LOCAL_MACHINE
\SOFTWARE
\Wow6432Node
\KVS
\Enterprise Vault
\TextConversionFileTypes
This registry key contains a list of file types, separated by periods, of the file
types that are converted to text. The list must end in a period.
For example, if the list is currently .PPT.POT.PPS.ZIP. and you want to add file
type XYZ, you would change the list to the following:
.PPT.POT.PPS.ZIP.XYZ.
Customizations and best practice 373
About performance tuning
How to deal with items that stay a long time on the Archive
Queue
One reason for items to stay on the Microsoft Message Queue Enterprise Vault
Storage Archive queue for a long time is that they really are taking a long time to
be converted. When the maximum time for the conversion is reached, the item is
archived but no HTML version is created. The item is archived and a message is
written to the Windows Application Event Log.
If many items are taking longer than the default 10 minutes allowed, you can change
the timeout value. To change the timeout, edit the following registry key:
HKEY_LOCAL_MACHINE
\SOFTWARE
\Wow6432Node
\KVS
\Enterprise Vault
\ConversionTimeout
HKEY_LOCAL_MACHINE
\SOFTWARE
\Wow6432Node
\KVS
\Enterprise Vault
\ExcludedFileTypesFromConversion
.filetype[.filetype].
For example, to exclude *.JPG and *.CAD files from conversion, set the key to the
following:
.JPG.CAD.
Customizations and best practice 374
About performance tuning
The registry key lists all the file types that are not currently converted.
Chapter 26
Auditing
This chapter includes the following topics:
■ About auditing
■ Configuring auditing
■ Tuning auditing
About auditing
Enterprise Vault auditing records activity in a number of different categories. All
auditing is disabled by default, but you can enable it and specify the categories that
you want to audit.
The auditing database can optionally be on a computer that is running Enterprise
Vault services. However, it must be hosted by the same SQL Server as the
Enterprise Vault Directory database.
The process of setting up auditing is as follows:
■ Create the auditing database.
■ Configure auditing on each Enterprise Vault server.
The following sections describe these activities in detail.
database, you cannot use the Administration Console to do so; see the support
article How to rollover an auditing database for instructions.
To create the auditing database
1 In the left pane of the Administration Console, right-click the Enterprise Vault
Directory and then, on the context menu, click Enable Auditing.
2 Under Audit Database location, click Browse to display the available locations
for the auditing database.
3 If you want to create a new folder for the auditing database, click New Folder.
4 Click the location to use for the auditing database, and then click OK.
5 Under Transaction log location, click Browse to display the available locations
for the auditing database transaction log.
6 If you want to create a new folder for the transaction log, click New Folder.
7 Click the location to use for the log, and then click OK.
8 Click OK to close the Configure Auditing dialog box.
9 Wait a few moments for Enterprise Vault to create the database.
10 When Enterprise Vault displays a message confirming that it has created the
auditing database, click OK to dismiss the message.
Configuring auditing
Enterprise Vault auditing records data in a number of different categories. You can
specify whether auditing is enabled or disabled for each category. All categories
can record summary audit data, but some can also record detailed data.
To configure auditing
1 In the Administration Console, expand the tree in the left pane until the
Enterprise Vault Servers container is visible.
2 Click the Enterprise Vault Servers container.
3 Right-click the computer whose auditing you want to enable or disable and
then, on the context menu, click Properties.
4 Click the Auditing tab.
Auditing 377
Configuring auditing
5 If you want to enable or disable all auditing, check or uncheck Audit entries
based on the following categories. Otherwise, check or uncheck the required
audit categories.
PST Migration Records details of items being migrated from PST files.
NSF Migration Records details of items being migrated from NSF files.
Get Online XML Records details of document retrieval into SharePoint Portal
Server.
Saveset Status (For support use only.) Records whether a saveset file is
available.
Archive Folder Updates Records the saveset ID and source and destination folders of
archived items being moved to a different mailbox folder.
Undelete Records when deleted items are recovered using the option
Recover items on the Deleted Items tab of archive properties.
Shortcuts recovered using FSAUndelete utility are also
recorded.
Indexing operations Records when the indexing subtasks for managing index
volumes start and stop. Also records any critical errors that
the subtasks encounter when processing indexes. The
Manage Indexes wizard enables you to manage index
volumes.
5 Click Execute on the SQL Editor toolbar, or press F5 to run the command.
Auditing 379
Tuning auditing
Tuning auditing
Each computer on which you enable auditing has a limited number of connections
that it can make to the auditing database. These connections are reused as needed.
Auditing uses a pool of connections to the auditing database. You can make
Enterprise Vault log the level of usage of these connections and then, if necessary,
you can modify the number of connections as required.
To turn connection information logging on or off
1 In the Administration Console, expand the tree in the left pane until the
Enterprise Vault Servers container is visible.
2 Click the Enterprise Vault Servers container.
3 Right-click the computer whose logging you want to enable or disable and then,
on the context menu, click Properties.
4 Click the Auditing tab.
5 Click Advanced.
6 Check or uncheck Log database information to turn logging on or off.
7 Click OK.
8 Restart the Enterprise Vault services on the computer.
7 Click OK.
8 Restart the Enterprise Vault services on the computer.
Chapter 27
Backing up Enterprise Vault
This chapter includes the following topics:
http://www.symantec.com/docs/TECH172279
The following examples show how to use backup mode in the administration console.
The first example is a procedure to set backup mode on all the vault stores in a
vault store group. The second example is a procedure to find the current backup
mode settings for index locations on a server called EVServer.domain1.local.
To set backup mode on all the vault stores in a vault store group
1 In the left pane of the administration console, expand the Vault Store Group
container.
2 Right-click the vault store group whose vault stores you want to place in backup
mode, and click Set State > Set Backup Mode on all Vault Stores.
The Backup Mode column in the right pane now shows that backup mode is set
on all the vault stores in the vault store group.
To see the current backup mode settings for index locations, and to change these
settings
1 In the left pane of the administration console, browse to Enterprise Vault
Servers > EVServer.domain1.local > Services.
2 In the right pane, right-click Enterprise Vault Indexing Service and click
Properties.
3 Click the Index Locations tab.
4 The Backup Mode column shows the current backup mode settings for all the
index locations on the server. You can change the setting for any of these
locations.
See “Vault store partitions and vault store databases backup” on page 384.
■ EnterpriseVaultMonitoring
■ Each FSA Reporting database you have set up, if you use FSA Reporting.
The following document on the Symantec Support website describes procedures
which you can use to back up your Enterprise Vault SQL databases if you do not
use a third party SQL backup tool:
http://www.symantec.com/docs/TECH74666
Note: Every Enterprise Vault server must also have a complete system and file
backup. This backup must include the registry because all Enterprise Vault services
store information in the registry. You should consider taking this system and file
backup at the same time you back up the Enterprise Vault system databases.
Note: After you back up a vault store database or back up a group of vault store
databases, immediately back up the directory database
(EnterpriseVaultDirectory).
Before you back up the vault store databases and vault store partitions, place the
vault stores in backup mode.
See “About Enterprise Vault backup mode” on page 382.
Note: To find a complete list of all the index locations to back up, you must complete
this procedure on all the Enterprise Vault servers that run an indexing service.
Note: For Enterprise Vault 10.0 and later, you must ensure that all the indexing
services in your environment are running before you set backup mode on index
locations.
While index locations are in backup mode, users can continue to search their
archives. In environments where it is not necessary to maintain this functionality
during the backup window, you can stop all the indexing services while you take
backups. If you do this, you do not have to set backup mode on index locations.
Note: When you use the Administration Console to clear backup mode from an
index location or vault store, Enterprise Vault ignores the backup mode count and
forcibly clears backup mode.
Backing up Enterprise Vault 387
About backup mode cmdlets
To run PowerShell cmdlets directly, first run the Enterprise Vault Management
Shell
◆ Start the Enterprise Vault Management Shell.
PowerShell opens and loads the Enterprise Vault snap-in which makes the
backup mode cmdlets available in the shell.
The Enterprise Vault Management Shell provides the following backup mode
cmdlets:
The following video shows how to set and clear backup mode with the PowerShell
cmdlets.
How to Set Backup Mode using the PowerShell cmdlets.
Help is available for all the cmdlets. For example, the following command shows
the detailed Help for Clear-VaultStoreBackupMode:
Get-Help Clear-VaultStoreBackupMode -detailed
You can also generate PowerShell backup mode commands that are based on the
configuration of your environment and ready for use in your backup scripts.
See “Generating PowerShell backup commands for your environment” on page 390.
For example:
Set-IndexLocationBackupMode -EntryId
1F3C7910CD579234AB8EB207F0ECEBCE91210000EVServer.Domain1.local
This command increments the backup mode count on the object that has the
specified ID. Specify the ID of an index location to increment the backup mode
count on that index location. Specify the ID of a server or a site to increment the
backup mode count on all its associated index locations.
Clear-IndexLocationBackupMode uses the same syntax to decrement the backup
mode count on index locations. It also has an additional parameter which you can
use to forcibly clear backup mode from index locations. For example:
Clear-IndexLocationBackupMode EV1 -ForceClearBackupMode 1
This command forcibly clears backup mode from all the index locations associated
with server EV1. Clear-IndexLocationBackupMode ignores the existing backup
mode count and sets it to 0.
Get-IndexLocationBackupMode also uses the same syntax to report current backup
mode settings.
If you know the ID of the vault store, vault store group or site, you can use the
following syntax to decrement the backup mode count:
Clear-VaultStoreBackupMode -EntryId <String> [<CommonParameters>]
For example:
Clear-VaultStoreBackupMode -EntryId
1F3C7910CD579234AB8EB207F0ECEBCE91210000EVServer.Domain1.local
This command decrements the backup mode count on the object that has the
specified ID. Specify the ID of a vault store to decrement the backup mode count
on that vault store. Specify the ID of a vault store group or a site to decrement the
backup mode count on all its associated vault stores.
Clear-VaultStoreBackupMode uses the same syntax to decrement the backup
mode count on vault stores. It also has an additional parameter which you can use
to forcibly clear backup mode from vault stores. For example:
Clear-VaultStoreBackupMode EV1 -ForceClearBackupMode 1
Backing up Enterprise Vault 390
Generating PowerShell backup commands for your environment
This command forcibly clears backup mode from all the vault stores associated
with server EV1. Clear-VaultStoreBackupMode ignores the existing backup mode
count and sets it to 0.
Get-VaultStoreBackupMode also uses the same syntax to report current backup
mode settings.
Before you run the script, you must set the PowerShell script execution policy, to
allow only signed scripts to run. You only have to do this once.
Backing up Enterprise Vault 391
Using PowerShell cmdlets in backup scripts
When you have set the PowerShell script execution policy, you can run
Transform-Backup.ps1 to generate the backup mode commands for your
environment.
To run the script
1 Start the Enterprise Vault Management Shell.
2 Change directory to the Reports\Templates folder beneath the Enterprise
Vault installation folder.
3 Enter the following command to run the script:
.\Transform-Backup.ps1
Note: Enterprise Vault and Microsoft Windows PowerShell 2.0 must be installed on
your server to run these cmdlets.
After your backup is complete, you should run a similar command in your script to
clear backup mode. For example:
%SystemRoot%\SysWow64\WindowsPowerShell\v1.0\powershell -psconsolefile
"C:\Program Files (x86)\Enterprise Vault\EVShell.psc1" -command "&
{clear-vaultstorebackupmode -name 'Express Vault Store Group'
-evservername EVserver -evobjecttype vaultstoregroup}"
Chapter 28
Failover in a building blocks
configuration
This chapter includes the following topics:
■ SQL databases for directory and archive data. These are typically deployed on
a dedicated SQL server, allowing the inherent scalability and high availability
features of SQL to be fully exploited.
■ Centralized storage. Vault store partition data and index locations are shared
by each of the building blocks servers.
A building block server may or may not include an Indexing service, depending on
the indexing configuration used. The following indexing configurations are supported
in building blocks:
■ Both the active and failover servers are Index Servers that belong to the same
Index Server Group.
■ Both the active and failover servers are ungrouped Index Servers.
■ Neither the active nor failover servers host an Indexing service.
■ The active server is an ungrouped Index Server, and the failover server does
not host an Indexing service. On failover, an ungrouped Indexing service is
created on the failover computer.
For an introduction to Index Servers, Index Server Groups and Enterprise Vault
building blocks, see Introduction and Planning.
The planning of building block configurations is beyond the scope of this manual.
Contact your Symantec solution provider if you need a highly-available installation
of Enterprise Vault.
2 Start the Administration Console on any of the servers in the Enterprise Vault
site.
3 In the left pane, expand the tree until the Enterprise Vault Servers container
is visible.
4 Right-click the Enterprise Vault Servers container and, on the shortcut menu,
click Update Service Locations.
You are prompted for the password for the Vault Service account.
5 Enter the password for the Vault Service account and click OK.
Enterprise Vault updates the service locations and creates new services as
necessary.
At the end of the update a summary screen appears, listing the services on
each computer in the site.
6 If the Update Service Locations has created any services, start them.
Chapter 29
Recovery
This chapter includes the following topics:
Note: Unless otherwise stated, do not start any Enterprise Vault service until all the
steps of this recovery procedure have been completed.
■ EnterpriseVaultMonitoring
■ EnterpriseVaultAudit
■ Each FSA Reporting database you have set up, if you use FSA Reporting.
■ Each fingerprint database
■ Each vault store database
Recovery 398
Recovering Enterprise Vault using data-only backups
■ EnterpriseVaultMonitoring
■ EnterpriseVaultAudit
■ Each FSA Reporting database you have set up, if you use FSA Reporting.
■ Fingerprint databases
■ Vault store databases
You must also have backups of the following Enterprise Vault data:
■ Vault store partitions
■ Index locations
You can use these procedures when you need to recover only one Enterprise Vault
server, or to recover multiple servers.
To recover each server, you need to know which Enterprise Vault services it was
running before the disaster occurred. If you are unsure which Enterprise Vault
services were running on each server, run the SQL script ServiceLocations.sql,
which is installed in the Enterprise Vault installation folder, for example C:\Program
Files (x86)\Enterprise Vault.
Recovery 399
Recovering Enterprise Vault using data-only backups
Note: Before you can run the script you must first restore your Enterprise Vault
Directory database.
Note: If this is not possible the recovery steps tell you what to do to accommodate
a change in computer name.
Build each new system, starting with the installation of Windows and then all the
prerequisites for Enterprise Vault. Refer to the Enterprise Vault documentation if
you are not sure which prerequisite software you must install on each computer.
When you have set up the correct prerequisite software on each server, install
Enterprise Vault on the server.
Note the following:
■ Install Enterprise Vault on each new server, into the same folder as on the
original server.
■ Install the same version of Enterprise Vault as is being used in your current
environment.
Do not run the Enterprise Vault Configuration wizard at the end of completing the
installation of the Enterprise Vault software.
■ EnterpriseVaultMonitoring
■ EnterpriseVaultAudit
■ Each FSA Reporting database you have set up, if you use FSA Reporting.
■ Fingerprint databases
■ Vault store databases
Recovery 400
Recovering Enterprise Vault using data-only backups
USE EnterpriseVaultDirectory
UPDATE MonitoringSettings
SET SQLServer = 'SQL_server_name'
USE EnterpriseVaultDirectory
Select SQLServer,DatabaseName From FSAReportingDatabase
USE EnterpriseVaultDirectory
UPDATE FSAReportingDatabase
SET SQLServer = 'SQL_server_name'
WHERE DatabaseName = 'FSA_reporting_database_name'
where:
■ SQL_server_name is the name of the new SQL server.
■ FSA_reporting_database_name is the name of the FSA Reporting database
that you restored.
USE EnterpriseVaultDirectory
UPDATE ComputerEntry
SET ComputerNameAlternate = 'Name of new server'
WHERE ComputerNameAlternate = 'Name of old server'
2 Check that the DNS alias you set up for the old server points to the name of
the new server. If you are unsure what the DNS alias is, run the following SQL
query against the EnterpriseVaultDirectory database.
USE EnterpriseVaultDirectory
SELECT ComputerName FROM ComputerEntry
3 If you are recovering the system that provided the vault site alias (usually the
first server that was added to the site), then you need to update the vault site
alias to point to the new server. To do this, perform the following steps in the
order listed:
■ Run SQL Query Analyzer and connect to the server running the Enterprise
Vault Directory service.
■ Enter and run the following SQL command:
USE EnterpriseVaultDirectory
SELECT SiteEntryId
FROM SiteEntry
The value returned contain the vault site alias at the end of a long string of
numbers. For example, if the command returns the following then the vault
site alias is sitealias:
10354B15D38FE5B41BAAC212490EBA5351d10000sitealias
■ In DNS, change the DNS alias entry so that it points at the new server.
Depending on the original Enterprise Vault components that existed on the servers
you are recovering you must restore only the following data files:
■ If you are restoring a server that used to run a Storage service, or a server that
is configured in a cluster, you need to restore onto this server the saveset files
for any vault stores managed by the original Storage service.
■ If you are restoring a server that used to run an Indexing service, or a server
that is configured in a cluster, you need to restore onto this server the indexing
data files managed by the original Indexing service.
■ If you are restoring a server that used to run a Shopping service, or a server
that is configured in a cluster, you need to restore onto this server the shopping
files managed by the original Shopping service.
The Enterprise Vault data should be restored to the locations where they existed
on the original servers. For example, if you are recovering the server running the
Indexing service and the indexing data was originally stored in the following location:
I:\Indexing
then this indexing data should be restored to the same location on the new server.
To reorganize and move any SQL database devices on the disks, you can perform
the procedures as listed in the following Microsoft Knowledge Base article:
http://support.microsoft.com/?kbid=181602
This must be correct before you start any of the Enterprise Vault services, otherwise
some cleanup operations may occur, resulting in information loss.
To clear the directory database entries for all of the Enterprise Vault servers
1 Run SQL Query Analyzer and connect to the server running the Enterprise
Vault Directory service.
2 Enter and run the following SQL command:
USE EnterpriseVaultDirectory
UPDATE StorageServiceEntry
SET StorageArchive = '', StorageRestore = '',
StorageReplayIndex = '', StorageSpool = ''
UPDATE RetrievalTask
SET RetrievalSpoolQueue = ''
UPDATE ArchivingRetrievalTask
SET MessageQueue = ''
UPDATE RetrievalTask
SET MessageQueue = ''
UPDATE JournalTask
SET MessageQueue = ''
UPDATE PublicFolderTask
SET MessageQueue = ''
■ Converts the login for the Enterprise Vault Admin service so that it runs
under the Vault Service account.
■ Adds the Vault Service account to the Local Administrators group on the
computer.
■ Grants the user rights Log on as a service and Debug programs to the
Vault Service account.
■ Creates and starts the Enterprise Vault Directory service.
4 When prompted for the name of the SQL Server that will host the directory
database, enter the name of SQL Server used to host the directory database
for the original configuration of Enterprise Vault, and then click Next.
5 The Enterprise Vault Configuration wizard checks that the SQL Server exists
and can connect to it. As long as you have recovered the Directory service
database, the Enterprise Vault Configuration wizard now recreates the services
and tasks installed on the Directory service computer.
6 To recreate the Enterprise Vault services on the Directory service computer,
enter the password of the Vault Service account.
7 When the repair has finished, a success message is displayed.
8 If the Enterprise Vault Configuration wizard does not display a message, do
not continue to run the wizard. Close the wizard and do the following:
■ Check that all previous steps have been successful, repeat any missed
steps, and then run the Enterprise Vault Configuration wizard again.
■ Create a String registry value called UseLanManNameForSCM under the
following registry key:
HKEY_LOCAL_MACHINE HKEY_LOCAL_MACHINE
\SOFTWARE \SOFTWARE
\KVS \Wow6432Node
\Enterprise Vault \KVS
\Admin \Enterprise Vault
\Admin
HKEY_LOCAL_MACHINE HKEY_LOCAL_MACHINE
\SOFTWARE \SOFTWARE
\KVS \Wow6432Node
\Enterprise Vault \KVS
\Admin \Enterprise Vault
\Admin
During the synchronization the Indexing service logs progress events every
10 minutes. At the end of the synchronization, one of the following events is
logged:
The index synchronization may take some time. For example, an Enterprise
Vault recommended specification server takes approximately 10 minutes to
process 5,000 index volumes.
If any other index housekeeping is required there will be other progress
messages every few minutes.
Recovery 407
Recovery of an Enterprise Vault component
HKEY_LOCAL_MACHINE
\SOFTWARE
\Wow6432Node
\KVS
\Enterprise Vault
HKEY_CURRENT_USER
\Software
\Wow6432Node
\KVS
\Enterprise Vault
Directory service SQL 1 Ensure that the Enterprise Vault Admin services on all computers are stopped.
database To do this, use Windows Manager to stop the Enterprise Vault Admin service on
each computer.
Directory service computer 1 Restore the system backup, and the Directory service SQL database.
2 Restore the backups of any other Enterprise Vault services that run on this
computer.
Index file locations 1 Restore the system backup of the computer running the Indexing service.
3 Restore all the Indexing files to their original locations; ensure that all the
backed-up files are restored, and that no other files remain in the indexing folders.
Do not try to restore individual files because this leads to inconsistent indexes
that may be unusable.
4 Restore the backups of any other Enterprise Vault services that run on this
computer.
When correctly restored, the Indexing service can use the restored indexes.
However, there may be indexing entries lost from archive operations carried out
since the last backup. The Storage service will automatically reconstruct the
affected indexes.
During the synchronization the Indexing service logs progress events every 10
minutes. At the end of the synchronization, one of the following events is logged:
The index synchronization may take some time. For example, an Enterprise Vault
recommended specification server takes approximately 10 minutes to process
5,000 index volumes.
If any other index housekeeping is required there will be other progress messages
every few minutes.
Recovery 409
Recovery of Enterprise Vault in a VCS cluster
Shopping service files 1 Restore the system backup of the computer running the Shopping service.
4 Restore the backups of any other Enterprise Vault services that run on this
computer.
5 Start the Shopping service. Users should be able to use their existing shopping
baskets and create new shopping baskets.
4 Restore the backups of any other Enterprise Vault services that run on the restored
Storage service computer.
5 Run the EVSVR utility to verify the consistency of the information in your vault
store partitions and databases, and repair any errors.
Vault store or fingerprint 1 Restore the computer running the Storage service and replace the vault store
databases files.
3 Restore the backups of any other Enterprise Vault services that run on the restored
Storage service computer.
4 Run the EVSVR utility to verify the consistency of the information in your vault
store partitions and databases, and repair any errors.
The Installing and Configuring manual also describes how to implement a disaster
recovery solution using Veritas Storage Foundation HA with the Veritas Volume
Replicator (VVR) and Global Cluster Option (GCO).
See “About using EVSVR as part of the recovery procedure” on page 396.
■ Run the Enterprise Vault Cluster Setup wizard to recreate the service
groups. Use the same virtual server names as before.
■ Run the Enterprise Vault Configuration wizard on the primary node. Choose
to configure a new Enterprise Vault server with cluster group.
The wizard detects the existing virtual server name and performs a repair.
When the repair is complete, a wizard page is displayed with which you
can create the service resources. Do not bring the resources online when
given the option to do so.
■ Run the Enterprise Vault Configuration wizard on the failover node. Choose
to add the node as a failover node for an existing clustered server.
4 Run the Enterprise Vault Configuration wizard on the new node, selecting the
option to add the node as a failover node for an existing clustered server.
Enterprise Vault server TCP 135 svchost.exe component RPC Endpoint Mapper. Obtain
RPCSS service RPC (DCOM) connection.
Enterprise Vault server RPC dynamic ports. svchost.exe component RPC (DCOM) connection
Winmgmt service ports for WMI.
Enterprise Vault server RPC dynamic ports. AdminService.exe Access server properties from
Administration Console.
Enterprise Vault server TCP 445 System Browse shares from remote
server. For example, from
remote Administration Console
Enterprise Vault server TCP ports defined by the IMAPServer.exe The default IMAP ports are
administrator. 143 (IMAP) and 993 (IMAPS),
but administrators may choose
to use other ports.
Enterprise Vault storage RPC dynamic ports. StorageManagement.exe Create Vault Stores (on
server storage server).
Enterprise Vault storage RPC dynamic ports. StorageOnlineOpns.exe Create archives (on storage
server server).
Enterprise Vault storage RPC dynamic ports. StorageCrawler.exe Allow remote index servers to
server retrieve data (from storage
server).
Enterprise Vault storage RPC dynamic ports. StorageDelete.exe Delete Vault Stores/archives
server (on storage server).
Ports used by Enterprise Vault 416
Firewall settings for Enterprise Vault programs
Enterprise Vault storage TCP 2103, 2105 mqsvc.exe Task monitoring of storage
server message queues.
Enterprise Vault storage RPC dynamic ports. EVIndexAdminService.exe Contact index server.
server
Enterprise Vault server with TCP 1801 mqsvc.exe Message Queue message
Exchange Server task transfer.
(in Windows\System32\)
Enterprise Vault server with UDP 1801 mqsvc.exe Message Queue server
Exchange Server task discovery.
(in Windows\System32\)
Enterprise Vault Domino RPC dynamic ports. nserver.exe Retrieve archived Domino
Gateway messages.
(in Lotus\Domino\ or
IBM\Domino)
Enterprise Vault Domino TCP 1352 nsesrver.exe From Notes client. Retrieve
Gateway archived Domino messages.
(in Lotus\Domino\ or
IBM\Domino)
Enterprise Vault Shopping RPC dynamic ports. ShoppingService.exe Web restore to Exchange
server Server.
Enterprise Vault with RPC dynamic ports. AgentClientBroker.exe Client restore to Exchange
Exchange archiving task. Server.
Centera 3218 UDP and TCP Not applicable Connection to Centera storage
device.
Exchange Server TCP 135 svchost.exe component RPC Endpoint Mapper. Obtain
RPCSS service RPC (DCOM) connection.
Exchange Server TCP 445 System Required for the period when
the Administration Console is
used to add Exchange Server
as a target.
Ports used by Enterprise Vault 417
Firewall settings for Enterprise Vault programs
Exchange Server (before RPC dynamic ports Store.exe Access to Exchange store.
2010)
(in Exchange Server\bin\)
Exchange Server 2010 RPC dynamic ports Microsoft. For Exchange archiving task.
(CAS) Exchange.AddressBook.
Service.exe
Exchange Server 2010 RPC dynamic ports Microsoft.Exchange. Access to Exchange store.
(CAS) RpcClientAccess.Service.exe
FSA target server TCP 135 svchost.exe component RPC Endpoint Mapper. Obtain
RPCSS service RPC (DCOM) connection.
FSA target server RPC dynamic ports svchost.exe component RPC (DCOM) connection
Winmgmt service ports for WMI.
Enterprise Vault Domino As configured on Domino nhhtp.exe For HTTP to Domino server.
Gateway server. For example,
TCP 8080.
Enterprise Vault Domino As configured on Domino nhttp.exe For HTTPS to Domino server.
Gateway server.
■ Use the following SQL Query to obtain the number of different vaults processed
in a specified period.
■ Use the following SQL Query to obtain the number of vaults with items stored
in them.
■ Installation problems
■ Server problems
■ Client problems
Installation problems
The problems in this category can include the following:
■ Enterprise Vault servers: installation problems
■ Desktop clients: installation problems
You can stop the problem from occurring by taking the following steps:
■ Do not change the location of the Outlook Add-In.
■ If you do need to change the location of the Outlook Add-In, run Outlook after
you remove it. This forces Outlook to rebuild the extend.dat file without the
original location of the Outlook Add-In. You can then exit from Outlook and
reinstall the Outlook Add-In.
If the problem already exists, the solution is to delete the extend.dat file so that it
is automatically rebuilt when Outlook is next started. As the location of this file
varies, you need to search for it. One copy of the file exists for each user who uses
Outlook on the computer, so there can be several copies of the file to delete.
You can also use the ResetEVClient command-line tool to fix problems with the
Enterprise Vault add-in to Microsoft Outlook. For information on how to use
ResetEVClient, see the Utilities manual.
Note: ResetEVClient deletes extend.dat only for the user who runs it.
These errors are caused by a known SQL Server problem. How you fix the problem
depends on how you have set up access to SQL. The two most common methods
of access are TCP/IP and named pipes. For more information, see the most
up-to-date articles on the Microsoft Support website. In particular, you may find the
following article useful:
http://support.microsoft.com/?kbid=109787
If you are running SQL Enterprise Manager remotely, you require an extra SQL
Server license.
Enterprise Vault creates and accesses the Vault Directory Database and the vault
store databases. The number of licenses depends on your licensing type. For
example, if you are using per-server licensing, and both databases are located on
Troubleshooting 423
Server problems
the same computer, you require one Client Access License. If the two databases
are on different computers, you require two Client Access Licenses.
Server problems
The following sections list errors that you may encounter while running Enterprise
Vault.
The problems in this category can include the following:
■ Fixing errors when opening MSMQ dead letter queue
Here are a few tips for making sure that you avoid some common problems:
■ It is very important to set up the Vault Service account correctly and to ensure
that the Enterprise Vault services run under this account.
■ The Vault Service account must have the Microsoft Exchange Server permission
Service Account Admin at the Site and Configuration level. See the Installing
and Configuring manual for detailed information on setting up the Vault Service
account.
■ When you change the Vault Service account password using Windows, you
must update the password in the Vault Directory Database using the
Administration Console. The password is encrypted in the Vault Directory
Database. See the online help for the Administration Console for more
information.
Troubleshooting 424
Client problems
then you should grant the Local Administrator group full control of the message
queues on all computers running the following:
■ Exchange Mailbox Task
■ Exchange Public Folder Task
■ Exchange Journaling Task
■ Storage Service
To grant full control to the Local Administrator group
1 Run Microsoft Message Queue Explorer.
2 Expand the required site.
3 Select the appropriate computer.
4 Right-click the computer and then, on the context menu, select Properties.
5 On the Security tab, click Permissions.
6 In the Computer Permissions dialog box, select Add.
7 In the Add Users and Groups dialog box, select the Administrators group in
the List Names From box.
8 Click Add, and then click OK until you have returned to the main Message
Queue Explorer dialog box.
Client problems
The problems in this category can include the following:
■ Problems logging on to the Enterprise Vault Web Access application
■ MAPISVC.INF problems (client)
■ Problems seen by Enterprise Vault users
username and password. If there is no separate box for the domain name, the
username must be supplied in the following format:
domain_name\username
When users start the Enterprise Vault Web Access application from Microsoft
Outlook or Microsoft Exchange Client, they are prompted for both their Windows
user name and password. Normally, Windows passwords have a limit of 14
characters. If a user has set a password containing more than 14 characters, IIS
fails to recognize it, and the user cannot log on to use the Enterprise Vault Web
Access application. The user must change the password to 14 characters or fewer.
This is a known IIS restriction.
c:\program files\common
files\system\mapi\1033\nt\MAPISVC.INF
PowerPoint conversions
The Microsoft PowerPoint text conversion applies only to text contained within a
slide. Speaker notes text is not converted.
The cause of the problem is that the mailbox security descriptor is not read from
Active Directory until the user logs on or receives mail.
To fix the problem, log on to the mailbox or send a mail message to it.
For more information, see the following article in the Microsoft Knowledge Base:
http://support.microsoft.com/?kbid=272153
You must restart the Admin service after you have changed the registry value
for the change to take effect.
■ To view the Vault Cache Diagnostics page, the administrator must belong to an
Enterprise Vault role that allows administration on Enterprise Vault servers.
Typical roles for this purpose are Power Administrator, Messaging Administrator,
and Exchange Administrator.
■ You must select the Windows option to run your browser as an administrator to
open the Vault Cache Diagnostics page on an Enterprise Vault server.
To view the Vault Cache Diagnostics page
◆ Enter the following address in your browser:
http://your_ev_server/EnterpriseVault/ClientDiagnostics.aspx
where your_ev_server is the name of the Enterprise Vault server.
Information Description
Time since last sync The elapsed time since the last synchronization attempt
(this record).
Client Host The name of the host computer that the synchronization
attempt originated from.
Information Description
Content Cache Sync State The status of the user’s Content Cache.
Items Failed to Archive The number of items that have failed to be archived as
part of Vault Cache synchronization.
In addition, you can click an individual record on the page to display more detailed
information about it at the bottom of the page. Table C-2 shows the information that
is available.
Information Description
Header Synchronization status A more detailed explanation of the status of Vault Cache
Header (item stubs) synchronization.
Content Cache Synchronization A more detailed explanation of the user’s Content Cache
Status synchronization status.
Last Synchronization Occurred The date and time of the last synchronization attempt
(UTC).
Items in Content Cache The total number of items in the user’s content cache.
Depending on policy configurations, this number may
be 0.
Enterprise Vault Server The name of the Enterprise Vault server that handled
the synchronization attempt.
Add-in Version The version and build number of the Enterprise Vault
Outlook Add-In.
show results for a particular user or Windows domain. You can also sort table
columns into descending or ascending order.
The following example shows how to check for users from a particular domain who
have not synchronized for over a week.
To show users from a domain who have not synchronized for over a week
1 Navigate to:
http://your_ev_server/EnterpriseVault/ClientDiagnostics.aspx
where your_ev_server is the name of the Enterprise Vault server.
2 Uncheck Only Show failed synchronizations.
3 In the Apply filter box, enter the domain name.
4 On the User name/User domain menu to the right of Apply filter, select User
domain.
5 Click Search.
6 In the search results, examine the Time since last sync column to identify
the users whose last synchronization was over a week ago.
Exporting results
You can export the results on the Vault Cache Diagnostics page to a CSV file for
further analysis and reporting. Any filter, search, or ordering is honored in the
exported results.
To export the current results
1 Click Export at the top right of the page.
2 Save the results file.
Initializing Content Cache is initializing. This is a normal phase for newly enabled clients before
a first synchronization occurs, and is not a cause for concern.
Troubleshooting 434
Problems with Vault Cache synchronization
Not yet downloading Content Cache has finished initializing but has not yet started downloading files.
Again, this is a normal part of the Content Cache download process, and is not a
cause for concern.
Waiting for file on server Content Cache is waiting for a file to be built on the Enterprise Vault server. Content
Cache waits for a PST file to be built on the Enterprise Vault server and downloads
the same file to the user’s local Content Cache.
Downloading Content Cache is currently downloading a file from the Enterprise Vault server.
Retrying Content Cache is retrying a download following an error communicating with the
Enterprise Vault server. The client may have lost connectivity momentarily.
BITS not available The Microsoft Windows BITS service is not installed or not available. On the affected
client computer, check to see if the Background Intelligent Transfer Service is listed
as a service and is started.
Build failed A failure occurred on the Enterprise Vault server while building a file or as part of
integrating a built file with a local Content Cache. The Enterprise Vault Outlook Add-In
should retry the Content Cache download as part of the next scheduled
synchronization. If this status occurs regularly for a number of users then you should
investigate any possible issues on the Enterprise Vault server or client.
See “Identifying and resolving Vault Cache issues on the Enterprise Vault server”
on page 437.
BITS download error The Microsoft Windows BITS component reported an error while downloading a file
from the Enterprise Vault server. The download will be retried during the next
scheduled synchronization. If this status occurs regularly for an individual user then
you should investigate the BITS component on that client computer.
Failed to add archive The Content Cache component encountered an error when attempting to process
an additionally available archive. A retry will occur during the next synchronization
attempt. If this status occurs regularly for an individual user, then you should examine
a client log file from the affected computer to help diagnose the underlying issue.
See “Viewing the Enterprise Vault client log file” on page 441.
Troubleshooting 435
Problems with Vault Cache synchronization
Could not connect Content Cache could not connect to the target Enterprise Vault server for the selected
archive. It is unlikely that this status will ever be seen, since a connection to the
Enterprise Vault server is a prerequisite for the Outlook Add-In to report the
synchronization state.
File locked A client-side file that Content Cache depends on (DatabaseList.ini) is locked
or in use. Restarting Outlook may fix this issue. If not, restarting the affected client
computer should ensure that the file becomes unlocked and usable again.
Table C-4 explains the Header synchronization statuses and the steps you can
take to remedy any issues on the client computer.
Archive changed The archive information for the user changed while Header synchronization was in
progress. This should be resolved by the next scheduled synchronization.
Failed (server synchronizing) Header synchronization failed because the server was synchronizing the archive
hierarchy on the Enterprise Vault server. This is a temporary state for an archive on
an Enterprise Vault server and the next scheduled synchronization should complete
as normal.
Synchronization prevented Header synchronization was prevented by user activity in Virtual Vault. While a user
is performing certain actions within Virtual Vault (for example, moving folders)
synchronization cannot occur. Synchronization will be retried during the next scheduled
synchronization.
Insufficient disk space There is insufficient disk space on the client computer for header synchronization to
occur. You need to increase the amount of available disk space before synchronization
can complete. The Enterprise Vault Outlook Add-In needs 100MB by default to be able
to synchronize.
Troubleshooting 436
Problems with Vault Cache synchronization
Failed to acquire slot Header synchronization failed to acquire a synchronization slot from the Enterprise
Vault server. This synchronization slot is in place to limit the number of concurrent
header synchronizations occurring on the Enterprise Vault server. If this status occurs
regularly for a large number of users, consider altering your server configuration to
allow for a larger number of concurrent synchronizations.
See “Performance tuning Vault Cache and Virtual Vault” on page 441.
Could not connect Header synchronization could not occur because the Enterprise Vault Outlook Add-In
could not connect to the Enterprise Vault server. It is unlikely that this status will ever
be seen, since a connection to the Enterprise Vault server is a prerequisite for the
Outlook Add-In to report the synchronization state.
Offline The Enterprise Vault Outlook Add-In does not currently have a connection to the
Enterprise Vault server. It is unlikely that this status will ever be seen, since a connection
to the Enterprise Vault server is a prerequisite for the Outlook Add-In to report the
synchronization state.
Corrupt MDC Header synchronization could not proceed due to a corrupt MDC file. You will need to
delete the MDC file from the affected user’s computer.
Not yet synchronizing Header synchronization has not yet started. This might be an additionally available
archive that the user has not yet selected to synchronize with Enterprise Vault.
Pending Header synchronization is pending, but not yet started. You should not see this status
on the Vault Cache Diagnostics page, but it may be seen on client computers before
synchronization has started.
In progress Header synchronization is in progress. You should not see this status on the Vault
Cache Diagnostics page, but it may be seen on client computers during synchronization.
Acquiring slot The Enterprise Vault Outlook Add-In is trying to acquire a synchronization slot from
the Enterprise Vault server to proceed with synchronization. You should not see this
status on the Vault Cache Diagnostics page, nor on client computers. It is an internal,
transient state that is replaced with another status when the synchronization slot has
been either acquired or not acquired.
Troubleshooting 437
Problems with Vault Cache synchronization
Waiting for slot The Enterprise Vault Outlook Add-In is trying to acquire a synchronization slot from
the Enterprise Vault server to proceed with synchronization. You should not see this
status on the Vault Cache Diagnostics page, nor on client computers. It is an internal,
transient state that is replaced with another status when the synchronization slot has
been either acquired or not acquired.
Reset Header synchronization was reset manually by the user. You should not see this status
on the Vault Cache Diagnostics page, nor on client computers. It is an internal, transient
state that is replaced with another status when synchronization is resumed.
Suspended Header synchronization was suspended by the user. You should not see this status
on the Vault Cache Diagnostics page, nor on client computers. It is an internal, transient
state that is replaced with another status when synchronization is resumed.
Client Shutdown Header synchronization was stopped due to a shutdown by the user. You should not
see this status on the Vault Cache Diagnostics page, nor on client computers. It is an
internal, transient state that is replaced with another status when Outlook is restarted.
IIS Hosts a number of Enterprise Vault webpages DTrace the process w3wp.exe on the
that are used during synchronization. Serves affected server. Examine IIS log files for any
built Content Cache files to the client BITS issues.
service and receives files archived through
See “Examining IIS log files” on page 442.
Virtual Vault.
Troubleshooting 438
Problems with Vault Cache synchronization
EVMonitoring.exe Location on disk for the Content Cache The Symantec Enterprise Vault event log
(Cache Manager) builder component to assemble and build PST describes any serious issues concerning lack
files to be downloaded by client computers. of disk space. Any other issues require a
The Cache Manager component manages DTrace of the EVMonitoring.exe process.
configured disk space as specified under the
See “Tracing Vault Cache server
Cache tab of individual server properties.
components” on page 438.
EVMonitoring.exe Handles client requests to build files for The Symantec Enterprise Vault event log
(Content Cache Request Content Cache. Performs throttling of number describes any serious issues. Any other
Manager) of concurrent builds. issues require a DTrace of the
EVMonitoring.exe process.
MigratorServer.exe Builds files as the result of requests from Any severe issues should appear in the
(Content Cache Builder) client computers through the Content Cache Symantec Enterprise Vault event log. Any
Request Manager component. These files other issues or investigation require a DTrace
are later downloaded via BITS from the cache of MigratorServer.exe.
location.
See “Tracing Vault Cache server
components” on page 438.
EVMonitoring.exe Serves up completed files to client computers Any severe issues should appear in the
(Content Cache File that are performing downloads via BITS. Symantec Enterprise Vault event log. Any
Server) other issues or investigation require a DTrace
of EVMonitoring.exe.
For example, by targeting EVMonitoring.exe with DTrace and setting a filter to list
only lines that contain the word cache, you might see a line such as the one below,
which could help in diagnosing issues with cache sizing:
232 11:20:49.508 [3,044] (EVMonitoring) <5944> EV-H {CacheManager}
Updating cache Size: New:271360
Note: We recommend that wherever possible you avoid a full reset, because
the initial build of a user’s Content Cache incurs a significant overhead on the
Enterprise Vault server.
In the example:
■ A request was made to Slot.aspx at 09:29 A.M. on August 19, 2012.
■ The request included the archive ID, which in this case was the Archive ID of a
client attempting to synchronize.
■ The requesting user was MAIL2\mike_smith.
■ The response code was 200 (success).
Table C-6 shows the web pages that are used during synchronization, with their
uses and their possible effect on synchronization. A response code of 200 indicates
success.
DeleteArchivedItems.aspx The client may call this web page, A response code of 500 indicates an
passing it a list of items to be deleted as issue. DTrace w3wp.exe for more
the result of items being deleted from detailed information on the cause of the
Virtual Vault. response.
DeleteJob.aspx Called by the client to indicate that one A response code of 500 or 501 indicates
or more files have been downloaded an issue. DTrace w3wp.exe for more
successfully, so that the Enterprise Vault detailed information on the cause of the
server can remove the files from the response.
cache location.
Troubleshooting 443
Problems with Vault Cache synchronization
DownloadContent.aspx Used by the BITS component on the HTTP response codes can indicate
client to download completed files from issues with the download, as follows:
the cache location to the client.
■ 403: Access Denied
■ 404: File not found (it may have been
removed from the cache)
■ 408: Transient/Timeout
■ 505/501: Fatal error
FullSync.aspx Performs an index query and returns A response code of 500 indicates an
data to the client to facilitate an initial, issue, possibly with the underlying index
full header synchronization. query being performed. DTrace
w3wp.exe for more detailed information
on the cause of the response.
GetArchiveFolderHierarchy.aspx Gets the archive hierarchy (a list of A response code of 500 indicates an
archive folders). Used for header issue. DTrace w3wp.exe for more
synchronization. detailed information on the cause of the
response.
GetIncrSlotWithServer.aspx Used to obtain a slot with the server to A response code of 500 indicates an
perform an incremental build for Content issue. DTrace w3wp.exe or
Cache. EVMonitoring.exe for more detailed
information on the cause of the
response.
GetSlotWithServer.aspx Used to obtain a slot with the server to A response code of 500 indicates an
perform an initial (full) build for Content issue. DTrace w3wp.exe or
Cache. EVMonitoring.exe for more detailed
information on the cause of the
response.
HasJobBuiltYet.aspx The client polls the server through A response code of 500 indicates an
calling this web page to determine when issue. DTrace w3wp.exe or
a file being built on the server is ready EVMonitoring.exe for more detailed
to be downloaded. information on the cause of the
response.
IncrSync.aspx Gets the data for incremental header A response code of 500 indicates an
synchronization. issue. DTrace w3wp.exe for more
detailed information on the cause of the
response.
Slot.aspx Called by the client to obtain a slot to Repeated response codes of 500
proceed with header synchronization. indicate a potential bottleneck in the
number of users attempting to
synchronize.
SyncPoint.aspx Used by the client to determine the type A response code of 500 indicates an
of synchronization needed (full or issue. DTrace w3wp.exe for more
incremental). detailed information on the cause of the
response.
UpdateArchivedItemMetadata.aspx Used to inform the Enterprise Vault A response code of 500 indicates an
server of any user updates that have issue. DTrace w3wp.exe for more
UpdateArchivedFolderHierarchy.aspx
been performed in Virtual Vault. detailed information on the cause of the
response.
UploadItem.aspx Used to upload (that is, to archive) items A response code of 500 or 520 indicates
that have been dragged into Virtual an issue. DTrace w3wp.exe or
Vault. EVMonitoring.exe for more detailed
information on the cause of the
response.
service and the Admin service. You should stop the services in this way, rather
than stopping the Admin service, and relying on it to stop the other services.
* retry count:
Could not get a MAPI session from the session pool
whilst processing mailbox /o=ACME/ou=Site2000/
cn=Recipients/cn=lvservice
and:
User does not have access to an archive: all tasks and services
Users require write access to an archive in order to archive, and read access in
order to retrieve. This applies even for background archiving. A user must also be
the owner of the mailbox or be a member of the local Administrators group on the
system that is running the Exchange Mailbox task.
Troubleshooting 447
Problems with Enterprise Vault components
that the passwords match. You can use the Administration Console to set the
SQL password in Enterprise Manager and the Directory Service.
HKEY_LOCAL_MACHINE
\SOFTWARE
\Wow6432Node
\KVS
\Enterprise Vault
\Directory
0 None
1 Low
2 Medium
3 High
■ There may be no archiving schedule set. If you have not set such a schedule,
the Exchange Mailbox and Public Folder tasks do not run unless you use Run
Now. Check the Application Event Log for entries made by the Exchange Mailbox
task. Does archiving work when you use Run Now?
■ No mailboxes have had archiving enabled. This does not apply to an Exchange
Journaling task.
■ Use tracing so that you can follow the decisions made by the Exchange Mailbox
or Journaling task.
If you have just started using Enterprise Vault, it may take several archiving runs
before the system reaches a normal state. This is because a new installation may
have more items to archive than can be processed in a single run of the Exchange
Mailbox task. Enterprise Vault takes a few items from each mailbox and then, if
there is still time in its schedule, goes around again to take more. So some items
may have to wait for the next run of the Exchange Mailbox task.
This balancing process ensures that archiving is carried out evenly across all
mailboxes. However, it can appear that Enterprise Vault is ignoring some items
when, in fact, it is not.
Microsoft Exchange Server can monitor processes for you; see the Microsoft
Exchange Server documentation.
■ You have a new Enterprise Vault installation and the system has not yet reached
its normal state. It may take several runs of the Exchange Mailbox task before
all items that are ready to be archived are actually processed.
■ The user has no access to the archive. Check through the Application Event
Log to find out if there are any messages that help with solving the problem.
■ The user has changed the amount of time before an item is ready for archiving,
and items are consequently not yet eligible for archiving.
■ The item's message class has not been added to the list of those that Enterprise
Vault archives. To add more messages classes, use the Directory Properties:
Exchange Message Classes tab.
■ The Enterprise Vault mailbox has been deleted.
If items never turn into shortcuts, check the following:
■ The Exchange Mailbox task is running.
■ The Storage service is running.
■ The settings on the Safety Copies tab of the vault store properties. If the vault
store retains safety copies in the original location, items do not become shortcuts
until the vault store has backed up or replicated.
HKEY_LOCAL_MACHINE HKEY_LOCAL_MACHINE
\Software \Software
\KVS \Wow6432Node
\Enterprise Vault \KVS
\Admin \Enterprise Vault
\Admin
Troubleshooting: Indexing
Indexing tools are available to enable you to manage indexes and index volumes:
See “About the indexing wizards” on page 112.
Several documents and articles, including the following, are available on the
Enterprise Vault Support website to assist in troubleshooting indexing:
■ Troubleshooting and monitoring index tasks at
http://www.symantec.com/docs/TECH160420
Troubleshooting 454
Problems with Enterprise Vault components
Event ID 13360
Description:
Event ID 13336
Event ID 13360
Message What to do
The Shopping Service root Create the folder and try again.
directory (<...>) does not
exist
Troubleshooting 458
Problems with Enterprise Vault components
Message What to do
Failed to connect to the Make sure that the Shopping service is started.
Shopping Service
Failed to create new Check the access permissions on the Shopping folders,
basket BasketName as follows:
Failed to open file: Check the access permissions on the file. Both the user
<filespec> (Domain\user) and the Administrators group on the web
server computer (WebServerComputer\Administrators)
must have Full Control.
Failed to retrieve the Make sure that the Directory service is started.
Shopping Service directory
information
If there are no errors in the Application Event Log, or the errors listed do not point
to an obvious solution, try stopping and then restarting all the Enterprise Vault tasks
and services. If restarting the tasks and services does not fix the problem, try
increasing the tracing level to see whether that produces any additional information
in the Application Event Log.
basket but, in general, users should try to keep baskets to a moderate size (typically
fewer than a hundred or so items).
■ In the Choose Folder dialog box, select the new folder and then click OK.
Specific problems
■ Enterprise Vault tasks and services do not start (login failure).
If Enterprise Vault tasks and services do not start and report a login failure, the
most likely cause of the problem is that the password that has been supplied
for the Vault Service account is wrong. If you supply an incorrect password,
there will be login failures from all Enterprise Vault tasks and services.
■ Error while enabling mailbox for user /o=aaaa/ou=bbbbb/cn=Recipients/cn=ccccc,
error sending enabled message.
Enterprise Vault cannot send the enable mailbox message. This message is
stored in a file called EnableMailboxMessage.msg on the Exchange Mailbox
task computer.
■ Changes to an Enterprise Vault task or service do not take effect.
For many of the settings that you can change, you must stop and restart the
appropriate Enterprise Vault task or service so that it can obtain the new settings.
There are some settings that affect more than one task or service, so you may
need to stop and restart multiple tasks and services.
■ Mailboxes with no associated Windows account are not archived.
This is the correct behavior. The Exchange Mailbox task automatically disables
archiving for such mailboxes.
■ BCC recipients are missing from a message.
If you archive an unsent message with BCC recipients and then restore it, the
BCC recipients are missing from the restored message.
■ Re-installing the Outlook Add-In to a different folder does not work.
If you remove the Outlook Add-In and then install it to a different folder, Outlook
may not refresh its cache and so may not recognize the new location.
To force Outlook to see the new installation, do the following in the order listed:
Troubleshooting 463
Problems with Enterprise Vault components
■ Exit Outlook.
■ Remove the Enterprise Vault Outlook Add-In from the computer.
■ Start and then exit from Outlook.
■ Reinstall the Enterprise Vault Outlook Add-In.
■ Start Outlook.
HKEY_LOCAL_MACHINE HKEY_LOCAL_MACHINE
\SOFTWARE \SOFTWARE
\KVS \Wow6432Node
\Enterprise Vault \KVS
\Admin \Enterprise Vault
\UseLanmanNameForSCM \Admin
\UseLanmanNameForSCM
■ Items never become eligible for archiving, or manual archives do not work, or
an item cannot be restored.
All of these problems can happen if an Enterprise Vault server does not have
the necessary Windows codepages installed. If you need to install extra
languages, see the following article in the Microsoft Knowledge Base:
http://support.microsoft.com/?kbid=177561
■ Microsoft Message Queue Server: MQIS Initialization Error.
There is a known MSMQ Server problem that results in the following error
message:
These errors may be caused by the lack of, or the misplacement of, the ODBC
System Data Source Name (DSN) used to connect SQL Server to the MQIS
Troubleshooting 465
Techniques to aid troubleshooting
database. For more information on how to solve this problem, see the following
article in the Microsoft Knowledge Base:
http://support.microsoft.com/?kbid=193510
■ A scheduled run
■ A run that you start with the Run Now option, in Archiving and shortcut
processing mode or Shortcut processing mode
Hidden mailboxes do not appear in the report.
The report file is in the Reports\Exchange Mailbox Archiving subfolder of the
Enterprise Vault installation folder (for example C:\Program Files
(x86)\Enterprise Vault\Reports\Exchange Mailbox Archiving).
where exchangeserver is the Exchange Server that is associated with the task
and yyyymmdd is the date when the report was generated.
The fields within the file are tab-separated so that you can easily transfer them to
a spreadsheet program for analysis.
For each mailbox folder, the report provides the details that are shown in Table C-8.
Field Description
No. of moved shortcuts The number of shortcuts that have been moved into this mailbox
folder.
No. of copied shortcuts The number of shortcuts that have been copied into this mailbox
folder.
No. of shortcuts with The number of shortcuts that have had their retention category
updated Retention updated.
Category
No. of failed updates The number of shortcuts for which an update failed.
Archiving policy applied The Exchange Mailbox policy that applies to the mailbox.
Troubleshooting 468
Techniques to aid troubleshooting
■ In Outlook 2003/2007, click Help, then About Enterprise Vault, and then
Tech Info.
■ In Outlook 2010/2013, click the File tab, then Enterprise Vault, and then
Additional support information.
HKEY_LOCAL_MACHINE
\SOFTWARE
\Wow6432Node
\KVS
\Enterprise Vault
\Storage
\QueueTimeout
HKEY_LOCAL_MACHINE
\SOFTWARE
\Wow6432Node
\KVS
\Enterprise Vault
\OfflineDays
3 Set the value to the number of days that items stay online. The default value
is 0, which stops the Storage service using the secondary offline status
checking. If you set OfflineDays to 0, then the offline status is determined by
the OFFLINE file attribute setting.
The new setting is used immediately.
HKEY_LOCAL_MACHINE
\SOFTWARE
\Wow6432Node
\KVS
\Enterprise Vault
\BypassConversions
HKEY_LOCAL_MACHINE
\SOFTWARE
\Wow6432Node
\KVS
\Enterprise Vault
\Agents
You can also use the SkipRecipCheckSize registry value to set the minimum size
of message that is checked for its number of recipients. The size includes the size
of the recipient list itself. The default for SkipRecipCheckSize is 750 KB. Messages
that are larger than this are checked for the number of recipients, whereas smaller
messages are assumed to have fewer than the maximum number of recipients.
Warning: We strongly recommend that you do not move an Indexing service because
of the amount of work involved and because of the potential for introducing mistakes
that take time to rectify.
You require a database tool for viewing and changing data stored in the Enterprise
Vault Directory service. Some examples of such tools are VisData (a sample
application provided with Microsoft Visual Basic) and Query Analyzer (part of
Microsoft SQL Server). The following instructions do not include details of how to
set up your database tool to access the Vault Directory database.
Troubleshooting 474
About moving an Indexing service
There is a Vault Directory database entry for each root path location. This is the
IndexRootPathEntry. Each IndexRootPathEntry contains the folder name for the
root path location in the IndexRootPath field, and the IndexingServiceID for the
corresponding Indexing service in the IndexServiceEntryID field.
An IndexingServiceEntry does not contain a list of its IndexRootPathEntry records.
The link is the other way round; an IndexRootPathEntry contains a pointer to its
IndexingServiceEntry.
Each archive has a Vault Directory database entry. This is the VaultEntry. Each
VaultEntry contains the ID of the IndexRootPathEntry where the archive's index
data is stored.
3 Perform the following steps to obtain the Vault Database Directory entry for
the Indexing service on the target computer:
■ Search the ComputerEntry records in the directory until you find the entry
for the target computer.
■ Note the ComputerEntryId for this entry.
■ Search the IndexingServiceEntry records in the directory for the one that
contains this ComputerEntryId.
■ Note the IndexingServiceEntryId of this IndexingServiceEntry record.
■ You use this in 9.
4 Perform the following steps to find the Directory database entry for the Indexing
service on the source computer:
■ Search the ComputerEntry records in the directory until you find the entry
for the source computer.
■ Note the ComputerEntryId for this entry.
■ Search the IndexingServiceEntry records in the directory for the one that
contains this ComputerEntryId.
■ Note the IndexingServiceEntryId of this IndexingServiceEntry record.
■ You use this in 5.
5 Perform the following steps to identify all the Indexing service root path locations
on the source computer:
■ Search the IndexRootPathEntry records in the directory for those that contain
the IndexingServiceEntryId for the source computer.
■ This is the value you obtained in 4.
■ Decide which root path locations to move to the target computer. You can
choose to move all of them, if you want to move the entire Indexing service
to a new computer, or only some of them, if you want to spread the load
between two Indexing services.
■ Make a list of all the root path locations that you want to move. This list
should record the IndexRootPathEntryID for each root path and the
IndexRootPath folder where the index data is stored.
There is normally one root path for each disk used for storing index data.
If the target computer has fewer disks than the source computer, this may
not be possible. In this case, create multiple folders on the same disk. There
is no harm in this: the important thing is to create as many folders as there
are root paths to be moved.
Do not try to combine multiple root paths into one, or to split the data within
a root path and store it in multiple root paths.
■ Assign one of these folders to each root path on the list that you made in
5.
■ You must create each new folder on the target computer on a disk with
enough free space to hold all the data stored within its corresponding root
path on the source computer.
■ If using NTFS, modify the security permissions on each folder (and on each
file created in the folder) so that it is fully accessible to the Administrators
group but not accessible to anyone else.
7 Use the Service Control Manager to stop the Indexing services on both the
source and target computers.
8 Wait until both services have stopped.
9 For each root path location on the list that you created in step 5, do the
following:
■ Recursively copy all the files and subfolders from the root path location on
the source computer to the corresponding folder on the target computer
(that is, the folder you created in 6).
There must be a one-to-one correspondence between the root path locations
on the source computer and the new folders on the target computer. Do
not use existing folders on the target computer, and do not copy more than
one root path to the same folder.
■ When the data has been safely copied, use your database tool to select
the root path's IndexRootPathEntry in the directory, using its ID recorded
on the list made in 5.
■ Change the value in the IndexingServiceEntryID field to the ID that you
obtained in 3.
■ This associates this IndexRootPathEntry with the Indexing service on the
target computer.
■ Change the value in the IndexRootPath field to the name of the folder on
the target computer into which the data for this root path has just been
copied. Use the full, correct path name for the folder, including the drive
letter.
Troubleshooting 477
About moving an Indexing service
Auditing 375 C
configuring 376 Change Location wizard 112, 117
connection pool size 379 Change vault store group 61
creating database 376 Checking disk space for vault stores 52
NSF migration 340 Checking logs 49
tuning 379 ClearText copies of RMS Protected items 196
viewing audit log 378 ClearTextPrimary 197
Authorization Manager 24 Client connection 173
Automatic domain authentication 241 Client-driven migration 320
Automatic Monitoring 246 Clients
Automatic monitoring configuring 131, 136, 195
introduction 246 Code pages for right-to-left custom shortcuts 142, 202
Automatically delete IE file cache 153 Codepage
Automatically re-enable Outlook add-in 153 adding 51
AutoReEnable 154 adding default 51
Availability (Exchange Office Mail App setting) 148 deleting 51
Computer properties
B Advanced settings 212–213, 215
Backup Configuring Clients 131, 136, 195
checking 65 Create multiple Index Locations 217
Enterprise Vault data 383 Creating a new retention category 73
Enterprise Vault databases 383 CryptoModule event log 42
fingerprint database 384 Customizations and best practice 355
index locations 385 Customizing Outlook Integrated Search 238
system databases 383 Customizing the legacy search applications 234
vault store databases 384
vault stores 384 D
Backup mode 382 Day-to-day administration 41
index locations 382 DefaultFormatCodepage 235
PowerShell cmdlets 382, 386 DefaultFormatType 236
vault stores 382 DefaultRankResults 239
Backup Procedures 381 Delete shortcut after restore 174
Basic archive function 171 Deleting a vault store 103
Basic restore function 172 Deleting a vault store group 62
Behavior of Mail App Bar (Exchange Office Mail App Deleting an archive 102
setting) 149 Deleting moved archives 100
Behavior when Archive Explorer closes 154 Deletion 71
Browser Search shortcut 72
Customizing user interface Deploy forms locally 154
BSDeleteButton 241 Deployment Scanner 469
BSRestoreButton 241 Desktop policies
BSDeleteButton 241 Domino mailbox archiving 134
BSRestoreButton 241 Exchange mailbox archiving 148
Building Blocks Directory Database
failover 393, 395 maintaining 56
Services 393 moving 105
Update Service Locations 395 Directory database
clearing entries 402
Index 481
U Vault stores
Update Basket deleting 103
Retrieval 352 Verify wizard 112, 115
Update Shortcut View mode 178
Archiving Task 346 ViewMessage_Format 238
Public Folder Task 350 Virtual Vault 185
Upgrade wizard 112, 114 VVAllowArchive 192
URLEncodeFilenames 237 VVAllowHardDelete 194
Use proxy settings 168 VVAllowInterStoreCopyAndMove 193
UseFederatedSearch 240 VVAllowIntraStoreCopy 193
UseFolderSwitchOnAEClose 154 VVAllowReOrg 194
UseNewStyleSearch 167 VVAutoSyncItemsSizeThresholdMB 192
User interface tweaks 241 VVAutoSyncItemThreshold 191
UseRestrictedSecurity 237 VVDenyMultiContentlessOpsAboveMB 189
Users can archive items 192 VVReadingPaneContent 190
Users can copy items to another store 193
Users can copy items within their archive 193 W
Users can hard delete items 194 Warn if default or anonymous permissions exist 147
Users can reorganize items 194 Warn when mailbox not under quota after archiving
UseSelfInstallFunct 160 run 147
WarnWhenDefOrAnonPerms 147
V WDS search auto-enable 184
Valid Enterprise Vault server aliases 146 Web Access application
Vault Cache 134, 179 configuration 235
troubleshooting synchronization 430 Web Access application settings
Vault Cache Diagnostics web page 430 checking 407
Vault Service Account Web Application alias 178
link to technical note 478 Web Application URL 168
Vault Service account WebAppURL 169
changing 38 WhitelistOfGoodEVConnectionPoints 146
changing password 107 Windows Event Viewer 49
NSF migration 340 running 49
permissions 428 Windows Service Control manager 48
Vault store Windows Temp folder
change sharing level 60 performance 371
moving to a different group 61
Vault store cmdlet syntax 388
Vault store databases
maintaining 56
moving 106
Vault store files
recovery 409
Vault store group
configure sharing 60
deleting 62
managing 59
status 59
Vault store SQL database
recovery 409