<< Click to Display Table of Contents >> Navigation: Installing CloudNine LAW > LAW Installer > Advanced Configuration |
As of version 7.3, LAW supports TLS 1.2 encryption protocols for Windows 10 systems.
•For information on enabling TLS on your environment systems, we recommend you work with your Administrator.
•LAW is compatible with systems running TLS 1.2 encryption; TLS 1.0 may be disabled on these systems.
•For instructions on enabling/disabling TLS 1.2 and 1.0, please reference https://docs.microsoft.com/en-us/windows-server/security/tls/tls-registry-settings.
Effective starting with version 7.5.X, CloudNine LAW is certified for FIPS encrypted Windows 10 operating systems.
Administrators can enable FIPS via either local system registry, or via Group Policy.
When enabled, the operating system will ensure that only FIPS validated hashing and encryption modules are used by the operating system (including .NET libraries).
For more information on the FIPS encryption and usage with Windows 10, the STIG guidelines are listed here for reference: https://www.stigviewer.com/stig/windows_10/.
Users can also reference the STIG guidelines for enabling FiPS encryption: https://www.stigviewer.com/stig/windows_10/2019-01-04/finding/V-63811.
With any eDiscovery processing tool, an anti-virus scanning utility can alter files and interrupt chain of custody and hashing values.
Best Practices for insulating against unwanted AV impacts in processing include:
•Separate the Processing Network other Review and Business Networks (e.g., separate LAN or vLAN).
•Only run virus scanning after processing is completed (e.g., when moving processing volumes to new locations for Production or Review Loading).
•If on-demand virus scanning is a compliance requirement, then scan only the file shares with extracted ESI.
•These paths should be excluded so as to avoid impacts to processing speed and reliability:
oInstallation directory
oLocal User Log Directory
oLocal User Data store Directory
oLocal Computer Data store Directory
oLAW Case Directory
oLAW Worker Temp Directory
oSource data location
Additionally, Users may reference the EDRM recommended practices regarding virus protection here: https://www.edrm.net/resources/frameworks-and-standards/edrm-model/edrm-stages-standards/edrm-processing-standards-guide-version-2/.