Last updated: 26-Apr-2011
This document provides important information about Discovery Collector, which you should read before you install or upgrade the software.
For the most up-to-date version of this document, see the following article on the Symantec Enterprise Support site:
The documentation that accompanies Discovery Collector provides extensive information on installation and configuration processes.
Based on the data source, the file location field in Discovery Accelerator Review will have the following format for objects archived by Enterprise Vault Discovery Collector:
|Exchange 2003, 2007, 2010||server[:port]/mailbox/folder/ ...|
|SharePoint 2003, 2007, 2010||http://server/[site path]/folder/ ...|
Please refer to the table below in lieu of the supported data sources and protocols listed in Tables 6-2 and 6-3 at pages 73-76 of the Discovery Collector User Guide. These are the only data sources and protocols tested and supported by Discovery Collector Version 9.0.
|Data source||Protocol||System version||Supported?|
|Windows servers||CIFS v. 1.0||Windows NT, Windows 2000, Windows 2003, Windows 2008||Yes|
|UNIX servers||NFS v. 2/v. 3||All||Yes (but not tested)|
|NetWare servers||NCP over TCP/IP||NetWare 6.5||No|
|EMC Celerra||CIFS v. 1.0||DART 5.5 or later||No|
|NFS v. 2/v. 3||DART 5.5 or later||No|
|NetApp Filer||CIFS v. 1.0||ONTAP 7.0.0 or later||Yes|
|NFS v. 2/v. 3||ONTAP 7.0.0 or later||Yes|
|Other||CIFS v. 1.0||All||No|
|NFS v. 2/v. 3||All||No|
|Exchange Web Services (Soap XML-RPC)||Exchange 2007 and 2010||Yes|
|Domino||NRPC over TCP/IP||Lotus Domino 6.x, 7.x, and 8.x||Yes|
|Symantec Enterprise Vault/Discovery Accelerator||Discovery Accelerator Web Services (Soap XML-RPC)||8.0.4 and 9.0.0||Yes|
|Iron Mountain VFS||CIFS (Windows platforms), NFS v. 2/v. 3||No|
|Windows||CIFS v. 1.0||Windows XP, Vista||Yes|
|Macintosh||CIFS v. 1.0||No|
|NFS v. 2/v. 3||No|
|Unix/Linux||NFS v. 2/v. 3||No|
|Documentum||TCP/IP||5.3, 6.0, 6.5||No|
|SharePoint||SharePoint Web Services (Soap XML-RPC)||SharePoint 2003||Yes|
|SharePoint 2007 and 2010||Yes|
|EMC Celerra w/FLR||CIFS v. 1.0||DART 5.5||No|
|NFS v. 2/v. 3||DART 5.5||No|
|Enterprise Vault||DCOM/RPC||8.0.4, 9.0.0||Yes|
|NetApp SnapLock||CIFS v. 1.0||ONTAP 7.2.1 and later||No|
|NFS v. 2/v. 3||ONTAP 7.2.1 and later||No|
|IBM DR550||TCP/IP||TSM Client 188.8.131.52, TSM Server 184.108.40.206||No|
|Hitachi HCAP||HTTP/HTTPS 1.1||HCA 1.8||No|
|Iron Mountain VFS||CIFS (Windows platforms), NFS v. 2/v. 3||No|
SharePoint 2007 and 2010 require the configuration of alternate access mappings to map Enterprise Vault Discovery Collector requests to the correct web sites.
Alternate access mappings map URLs presented by Enterprise Vault Discovery Collector to internal URLs received by Windows SharePoint Services. An alternate access mapping is required between the server name and optional port defined in the SharePoint volume definition and the internal URL of the web application containing the web site being accessed is required.
Refer to Microsoft SharePoint 2007 or 2010 documentation to configure alternate access mappings based on the public URL configured by the local SharePoint administrator and the mapping used by the Enterprise Vault Discovery Collector SharePoint volume definitions.
You are accessing a SharePoint volume with the fully qualified domain name http://itweb.symantecexample.com from the Intranet zone. An alternate access mapping for the public URL http://itweb.symantecexample.com for the Intranet zone must be configured for the SharePoint 2007 or 2010 web application hosting the site to be accessed by the volume definition.
The following documentation is supplied with Discovery Collector.
|Symantec Enterprise Vault Discovery Collector Installation and Planning Guide||Guides you through the process of planning, sizing, and installing Discovery Collector for use on virtual machines.|
|Installation and Planning Template||Helps you to complete planning, configuration, and operational readiness tasks before you use Discovery Collector. This template should be used in conjunction with the Enterprise Vault Discovery Collector Installation and Planning Guide and the Enterprise Vault Discovery Collector User Guide.|
|Symantec Enterprise Vault Discovery Collector User Guide||Provides detailed information on how to configure and use Discovery Collector.|
|Operational Readiness Template||This Microsoft Excel template designed to help you complete operational readiness tasks prior to using Discovery Collector. Excel 2007 or later is required.|
|Symantec Enterprise Vault Discovery Collector Third-Party Software Guide||A document enumerating all software licensing attributions.|
Some manuals are in Adobe Acrobat format. If you have yet to install the free Adobe Reader, you can download it from the Adobe Web site at http://www.adobe.com.
For the latest information on supported devices and versions of software, see the Enterprise Vault Compatibility Charts (http://www.symantec.com/docs/TECH38537).
Copyright © 2011 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, Veritas, Enterprise Vault, Compliance Accelerator, and Discovery Accelerator are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Software file accompanying this Symantec product for more information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.
350 Ellis Street
Mountain View, CA 94043