IBM Virtualization Engine TS7700 Series Best Practices. TS7700 Logical WORM Best Practices
|
|
- Gladys Hubbard
- 5 years ago
- Views:
Transcription
1 IBM Virtualization Engine TS7700 Series Best Practices TS7700 Logical WORM Best Practices Jim Fisher Executive IT Specialist Advanced Technical Skills (ATS) Page 1 of 10
2 Contents Introduction...3 Cohasset Associates Report...3 Host Considerations...4 Protecting ACS Routines...4 Protecting Logical Volumes from Being Scratched...4 TS7700 Considerations...5 Data Class Default...5 Limit Access to Storage Construct Action Modification...5 Fast Ready Expire with Hold...9 Separate Category for WORM and Non-WORM Use Media 1 and Media Page 2 of 10
3 Introduction The TS7700 Virtualization Engine supports the logical write once, read many (WORM) function through TS7700 Virtualization Engine software emulation. The host views the TS7700 Virtualization Engine as a Logical WORM (LWORM) compliant library that contains WORM-compliant 3490E logical drives and media. The LWORM implementation of the TS7700 Virtualization Engine emulates physical WORM tape drives and media. The TS7700 Virtualization Engine provides the following functions: Provides an advanced function Data Class construct property that allows volumes to be assigned as LWORM-compliant during the volume s first mount, where a write operation from BOT is required, or during a volume s reuse from scratch, where a write from BOT is required. Generates, during the assignment of LWORM to a volume s characteristics, a temporary World Wide Identifier that is surfaced to host software during host software open and close processing, and then bound to the volume during first write from BOT. Generates and maintains a persistent Write-Mount Count for each LWORM volume and keeps the value synchronized with host software. Allows only appends to LWORM volumes using physical WORM append guidelines. Provides a mechanism through which host software commands can discover LWORM attributes for a given mounted volume. The LWORM implementation consists of two major components, the TS7700 itself and the host s Tape Management System (TMS). The TS7700 protects data from overwrite and modification and the TMS controls retention of the LWORM volume. A report from Cohasset Associates was commissioned by IBM to evaluate the TS7700 LWORM implementation. The report is referenced in the next section. This paper looks beyond the Cohasset report and provides best practices for protecting the solution from changes made to LWORM policies by unauthorized personnel. This paper also provides details of some of the items mentioned in the Cohasset Associates report. Cohasset Associates Report This technical report is a compliance assessment of the storage capabilities of the IBM Virtualization Engine TS7700 relative to the requirements and conditions of SEC Rule 17a-4(f). Its purpose is to obtain an independent and objective assessment of the TS7700 s capabilities to meet the requirements set forth in SEC Rule 17a-4(f). Cohasset Associates assessment concludes that the TS7700 meets all of the SEC requirements that are its direct responsibility for retaining and storing in digital form 17a-3 and 17a-4 records pursuant to the requirements set forth in Rule 17a-4(f), which expressly allows records to be retained on electronic storage media. Here is a pointer to the Cohasset Associates report: ftp://public.dhe.ibm.com/storage/tape/cai-ibmts7700techreport.pdf Page 3 of 10
4 Host Considerations Protecting ACS Routines The DFSMS Automatic Class Selection (ACS) routines are used to assign storage construct names for a logical volume scratch mount being directed to a TS7700. These constructs include Storage Group, Management Class, Storage Class, and Data Class. The Data Class construct is used to designate the logical volume as a Logical WORM (LWORM) volume. To make sure all logical volume mounts that were intended to be LWORM tapes, the ACS routines must be protected from being altered by an unauthorized person. This can be accomplished using RACF. Refer to the z/os DFSMSdfp Storage Administration manual for more information. F=all13be9&DT= &CASE=&searchTopic=TOPIC&searchText=TEXT&searchIndex=INDEX& rank=rank&scrolltop=firsthit#firsthit Protecting Logical Volumes from Being Scratched The Tape Management System (TMS), such as RMM or CA-1 is responsible for logical volume retention. Access to the ability to scratch a logical volume must be protected from unauthorized access. Also, using RMM, the scratching process can be changed to require a manual two-step process. RMM (Removable Media Manager) provides the ability to require manual action before allowing a logical volume to be returned to scratch. Below is an excerpt from an RMM manual. Check the CA-1 product or your TMS product to see if it has a similar capability. If you want to prevent logical WORM volumes returning to scratch automatically you can use the existing capability of the VLPOOL with RELEASEACTION(NOTIFY). This forces the NOTIFY release action for all volumes in the pool and requires you to issue RMM CV volser CRLSE(NOTIFY) to confirm the action before the REPLACE is handled automatically. Refer to existing DFSMSrmm Implementation & Customization Guide documentation for how to use NOTIFY and ensure it requires a manual action. tm Page 4 of 10
5 TS7700 Considerations The TS7700 defines the actions associated with the storage constructs that are passed to the TS7700 as part of a scratch mount. This includes the Data Class which is used to select Logical WORM. Be sure the appropriate Data Classes have the Logical WORM action set to Yes. Data Class Default The four storage constructs have default actions that can be altered. For a TS7700 that is exclusively using Logical WORM tapes, the default action should be set to specify the Logical WORM action. When the TS7700 receives a scratch mount request with an undefined storage construct, the TS7700 will automatically add the new construct name and assign the default actions. With the default set to Logical WORM, a previously unknown Data Class passed to the TS7700 will be given the action of a Logical WORM. The figure below shows the Modify Data Class panel for the default Data Class ( ) with Logical WORM being set as the action associated with the default. Figure 1 - Modify Data Class Panel Limit Access to Storage Construct Action Modification Similar to protecting modification of the ACS routines at the host, the construct actions need to be protected from alternation by an unauthorized person. This is accomplished by properly utilizing the Roles and Permissions settings on the TS7700 as well as assigning the appropriate role to a user account. The TS7700 provides four fixed roles; Administrator, Operator, Lead Operator, and Manager, as well as ten customizable roles. Each custom role can be defined to provide or deny access to selected, individual panels. For Logical WORM protect, be specifically concerned with the access to the storage construct panels associated with the Data Class construct. The fixed Operator role cannot modify, add, or delete any storage constructs. However, the Lead Operator, Manager, and Administrator roles can modify, add, or delete storage constructs and their associated actions. Any accounts created for users that should not have access to modifying, adding, or deleting storage constructs should be assigned the Operator Role or a custom role that denies access to the storage construct panels, especially Data Class. Page 5 of 10
6 It is also critical to only allow authorized users to create, modify, or delete user accounts. Both the Manager and Administrator roles are able to modify, add, and delete accounts. A custom role could also create, modify, or delete an account if the role is defined to allow this. The screenshot below shows the Roles & Permissions panel with the four fixed roles and six of the ten custom roles. As an example, Custom Role 1 will be modified to allow user Account and Roles & Permissions access. The example also makes an update to the role s name to make it more meaningful. Figure 2 - Roles & Permissions Panel Page 6 of 10
7 The screenshot below shows the panel used to define the access for one of the custom roles. Access to a panel is granted by checking the checkbox next to a panel name. In this example the panels associated with user account and roles are checked. This custom role will be able to create and modify custom roles and add, modify, and delete user accounts and their associated roles. This custom role is named Manage Users. Figure 3 - Modifying Custom Roles & Assigned Permissions - Account Management Page 7 of 10
8 The screenshot below also shows the panel used to define the access for one of the custom roles. Access to a panel is granted by checking the checkbox next to a panel name. In this example the panels associated with adding, modifying and deleting storage constructs are checked. This custom role will be able to add, modify, and delete storage constructs and their associated actions. This custom role is named Manage Constructs. Figure 4 - Modifying Custom Roles & Assigned Permissions - Construct Management Page 8 of 10
9 The screenshot below shows the addition of a new account, AdminJim, with a role of Manage Users and access to all clusters in the five cluster grid. Since the Manage Users role was defined to allow alteration of Roles and Permissions, AdminJim will be able to alter Roles and Permissions. Figure 5 - Adding an Account Panel In summary: 1. Control who can administer the user accounts and the actions available to each role. Make sure only authorized users can create, modify, or delete accounts. Also make sure only authorized users can modify the actions available to the custom roles. 2. Control which accounts can modify the storage construct actions, such as the actions associated with the Data Class, Logical WORM in particular. Fast Ready Expire with Hold As explained earlier, it is the Tape Management System (TMS) that controls when a logical volume is returned to scratch. The appropriate protections against unauthorized or inadvertent scratching of a Logical WORM volume should be in place. Additional protection can be provided at the TS7700 by utilizing the Fast Ready Expire with Hold functionality on the TS7700. Scratch categories are defined at the TS7700 to allow the TS7700 to quickly mount a scratch volume, thus the name fast ready. The fast ready categories should match the scratch categories defined by DEVSUP at the host. There are two optional parameters that can be set for each fast ready category; expire time and expire hold. Expire time defines the amount of time after a virtual volume is returned to the Fast Ready scratch category before its data content is automatically expired by the TS7700. Once expired, the TS7700 stops managing the logical volume at which point it can no longer be accessed. The logical volume will expire when either the expiretime passes or the scratch volume is needed to satisfy a scratch mount, whichever occurs first. The expire-time can be set from 1 hour to 365 days. Page 9 of 10
10 Expire hold causes the TS7700 to not allow a scratch logical volume s attributes to be altered or be used to satisfy a scratch mount for the full expire time. This essentially protects the data on the logical volume from being expired for the duration of the expire-time. Setting an expire-time and enabling the expire-hold capability you can provide a grace period where an inadvertent or unauthorized setting of a logical volume to scratch can be reversed. The TMS can be used to set the volume back to private. Starting with Release 2.1, the TS7700 allows an expire-held logical volume s category to be changed from its fast-ready category to a non-fast-ready category. Prior to Release 2.1, expire-hold must be temporarily turned off at the TS7700 in order to change the logical volume s category. The screenshot below shows scratch category 0012 being added as a fast-ready category with an expire-time of 365 days and with expire-hold set. Figure 6 - Add a Fast Ready Category with Expire Hold Separate Category for WORM and Non-WORM Use Media 1 and Media 2 In some TS7700 Logical WORM (LWORM) implementations all of the logical volumes are WORM tapes. In other TS7700 implementations some logical volumes are treated as normal volumes and others are treated as LWORMs. In the mixed case, the fast-ready category attributes for expire-hold will most likely need to be different. For example, it may be desirable to set an expire time of just a few days for a non-lworm scratched volume, but many days, perhaps 365 days, for LWORM volumes. This requires two scratch categories. The TS7700 supports media 1 and media 2 logical volumes. Each media type has a different category such as 0001 and 0002, or 0011 and 0012, and so forth. When the two both non-lworm and LWORM volumes need to be specified using a single DEVSUP definition, you can use one media type for LWORM and the other for non- LWORM volumes. This will allow you to have separate expire-hold settings for each media type with a single DEVSUP. Page 10 of 10
IBM Virtualization Engine TS7700 Series Best Practices. Usage with Linux on System z 1.0
IBM Virtualization Engine TS7700 Series Best Practices Usage with Linux on System z 1.0 Erika Dawson brosch@us.ibm.com z/os Tape Software Development Page 1 of 11 1 Introduction... 3 1.1 Change History...
More informationExam Actual. Higher Quality. Better Service! QUESTION & ANSWER
Higher Quality Better Service! Exam Actual QUESTION & ANSWER Accurate study guides, High passing rate! Exam Actual provides update free of charge in one year! http://www.examactual.com Exam : 000-207 Title
More informationIBM Virtualization Engine TS7700 Series Best Practices. Cache Management in the TS7720 V1.6
IBM Virtualization Engine TS7700 Series Best Practices Cache Management in the TS7720 V1.6 Jim Fisher fisherja@us.ibm.com IBM Advanced Technical Skills North America Page 1 of 47 1 Introduction... 3 1.1
More informationSession RMM Exploitation
Session 15549 RMM Exploitation Speakers Vickie Dault, IBM Thursday August 7, 2014 3:00 4:00 pm Insert Custom Session QR if Desired. Agenda Retentionmethods VRSEL EXPDT Assigning Retentionmethod and Limitations
More informationIBM Virtualization Engine TS7700 Series Best Practices. TS7700 Hybrid Grid Usage V1.1
IBM Virtualization Engine TS7700 Series Best Practices TS7700 Hybrid Grid Usage V1.1 William Travis billyt@us.ibm.com STSM TS7700 Development Jim Fisher fisherja@us.ibm.com IBM Advanced Technical Skills
More informationIBM Virtualization Engine TS7700 Series Copy Export Function User's Guide Version 2.1.5
May 2013 IBM Virtualization Engine TS7700 Series Copy Export Function User's Guide Version 2.1.5 Kerri Shotwell Senior Design Engineer Tucson, Arizona Copyright 2007, 2009, 2011, 2012 IBM Corporation Introduction...
More informationEMC for Mainframe Tape on Disk Solutions
EMC for Mainframe Tape on Disk Solutions May 2012 zmainframe Never trust a computer you can lift! 1 EMC & Bus-Tech for Mainframe EMC supports mainframe systems since 1990 with first integrated cached disk
More informationIBM Virtualization Engine TS7700 Series Encryption Overview Version 1.1
April 2007 IBM Virtualization Engine TS7700 Series Encryption Overview Version 1.1 By: Wayne Carlson IBM Senior Engineer Tucson, Arizona Introduction The IBM Virtualization Engine TS7700 Series is the
More informationIBM TS7700 Series Best Practices. Flash Copy for Disaster Recovery Testing V1.1.1
7/9/2015 IBM TS7700 Series Best Practices Flash Copy for Disaster Recovery Testing V1.1.1 Norie Iwasaki, norie@jp.ibm.com IBM STG, Storage Systems Development, IBM Japan Ltd. Katsuyoshi Katori, katori@jp.ibm.com
More informationUnder the Covers. Benefits of Disk Library for Mainframe Tape Replacement. Session 17971
Under the Covers Benefits of Disk Library for Mainframe Tape Replacement Session 17971 Session Overview DLm System Architecture Virtual Library Architecture VOLSER Handling Formats Allocating/Mounting
More informationISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No.
ISSUE N 1 MAJOR MODIFICATIONS Version Changes Related Release No. 01 First issue. 2.8.0 PREVIOUS VERSIONS HISTORY Version Date History Related Release No. N/A N/A N/A N/A APPROVAL TABLE Signatures below
More informationFinancial Services Compliance
Financial Services Compliance WHITEPAPER SEC RULE 17A FOR BROKER-DEALERS SEC RULE 31A-2 AND 204-2 FOR INVESTMENT ADVISORS. Financial Services Compliance Whitepaper 2 U.S. Security Exchange Commission -
More informationRECORDS AND INFORMATION MANAGEMENT AND RETENTION
RECORDS AND INFORMATION MANAGEMENT AND RETENTION Policy The Health Science Center recognizes the need for orderly management and retrieval of all official records and a documented records retention and
More informationStandard CIP 005 2a Cyber Security Electronic Security Perimeter(s)
A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-2a 3. Purpose: Standard CIP-005-2 requires the identification and protection of the Electronic Security Perimeter(s)
More informationThe Life and Times of a Data Set: You Wouldn't Want Your Relatives Hanging Around, Why Your Data?
The Life and Times of a Data Set: You Wouldn't Want Your Relatives Hanging Around, Why Your Data? Chris Taylor ctaylor1@us.ibm.com IBM Corporation August 16, 2013 Session Number 13772 Legal Disclaimer
More informationTS7700 Technical Update What s that I hear about R3.2?
TS7700 Technical Update What s that I hear about R3.2? Ralph Beeston TS7700 Architecture IBM Session objectives Brief Overview TS7700 TS7700 Release 3.2 TS7720T TS7720 Tape Attach The Basics Partitions
More informationStandard CIP 005 4a Cyber Security Electronic Security Perimeter(s)
A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-4a 3. Purpose: Standard CIP-005-4a requires the identification and protection of the Electronic Security Perimeter(s)
More informationSet Up a Compliant Archive. November 2016
Set Up a Compliant Archive November 2016 2016, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents AWS s current
More informationSAPERION Records Management
SAPERION Records Management Copyright 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc., registered in the U.S. and/or other countries. All other trademarks are the
More informationIBM TS7700 Series Grid Failover Scenarios Version 1.4
July 2016 IBM TS7700 Series Grid Failover Scenarios Version 1.4 TS7700 Development Team Katsuyoshi Katori Kohichi Masuda Takeshi Nohta Tokyo Lab, Japan System and Technology Lab Copyright 2006, 2013-2016
More informationSolution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer
More informationIBM Tape Manager for z/vm and DFSMSRMS z/vm in a TS7700 Tape Grid Environment
IBM Tape Manager for z/vm and DFSMSRMS z/vm in a TS7700 Tape Grid Environment This document can be found on the web at www.ibm.com/support/techdocs Search for author s name under the category of White
More informationTS7700 Technical Update TS7720 Tape Attach Deep Dive
TS7700 Technical Update TS7720 Tape Attach Deep Dive Ralph Beeston TS7700 Architecture IBM Session objectives Brief Overview TS7700 Quick background of TS7700 TS7720T Overview TS7720T Deep Dive TS7720T
More informationIBM. CICSPlex SM Concepts and Planning. CICS Transaction Server for z/os. Version 5 Release 4
for z/os IBM CICSPlex SM Concepts and Planning Version 5 Release 4 for z/os IBM CICSPlex SM Concepts and Planning Version 5 Release 4 Note Before using this information and the product it supports, read
More informationIBM Virtualization Engine TS7700 Series Best Practices. Copy Consistency Points V1.2
IBM Virtualization Engine TS7700 Series Best Practices Copy Consistency Points V1.2 Takeshi Nohta nohta@jp.ibm.com RMSS/SSD-VTS - Japan Target Audience This document provides the Best Practices for TS7700
More informationPolicy & Procedure HIPAA / PRIVACY DESTRUCTION
PURPOSE To ensure that any medium containing Protected Health Information ( PHI ) is properly destroyed. POLICY PHI stored in paper, electronic or other format will be destroyed utilizing an acceptable
More informationIBM High End Taps Solutions Version 5. Download Full Version :
IBM 000-207 High End Taps Solutions Version 5 Download Full Version : http://killexams.com/pass4sure/exam-detail/000-207 QUESTION: 194 Which of the following is used in a System Managed Tape environment
More informationIBM. Archive Manager for z/vm Administration Guide. IBM Archive Manager for z/vm. Version 1 Release 1 SC
IBM Archive Manager for z/vm IBM Archive Manager for z/vm Administration Guide Version 1 Release 1 SC18-9345-03 IBM Archive Manager for z/vm IBM Archive Manager for z/vm Administration Guide Version 1
More informationIBM Software. IBM z/vm Management Software. Introduction. Tracy Dean, IBM April IBM Corporation
IBM z/vm Management Software Introduction Tracy Dean, IBM tld1@us.ibm.com April 2009 Agenda System management Operations Manager for z/vm Storage management Backup and Restore Manager for z/vm Tape Manager
More informationz/os Introduction and Workshop Data Sets
z/os Introduction and Workshop Data Sets 2009 IBM Corporation Unit Objectives After completing this unit, you should be able to: Describe data set naming rules Describe a partitioned data set Describe
More informationVeritas NetBackup Vault Administrator s Guide
Veritas NetBackup Vault Administrator s Guide UNIX, Windows, and Linux Release 6.5 12308354 Veritas NetBackup Vault Administrator s Guide Copyright 2001 2007 Symantec Corporation. All rights reserved.
More informationIBM Virtualization Engine TS7700 Series Statistical Data Format White Paper Version 1.6
November 2009 IBM Virtualization Engine TS7700 Series Statistical Data Format White Paper Version 1.6 Tucson Tape Development Tucson, Arizona Target Audience This document provides the definition of the
More informationNSIF APPROVED DOCUMENT. Common Applications Requirements for SONET NE Security System
NSIF APPROVED DOCUMENT NSIF-037-2000 (NSIF Document #NSIF-CA-9910-110R3) WORK GROUP: Security TITLE: Common Applications Requirements for SONET NE Security System DATE: EDITOR: Name: Ron Roman Voice: (732)
More informationWHITE PAPER PAPERWISE DOCUMENT MANAGEMENT COMPLIANCE WITH SEC 17A-4
WHITE PAPER PAPERWISE DOCUMENT MANAGEMENT COMPLIANCE WITH SEC 17A-4 Prepared By Chris Jones Documentation and Content 417.886.7505 cjones@paperwise.com Prepared On March 20, 2013 TABLE OF CONTENTS Introduction
More informationEMC E Networked Storage CAS Specialist. Download Full Version :
EMC E20-570 Networked Storage CAS Specialist Download Full Version : https://killexams.com/pass4sure/exam-detail/e20-570 D. During each backup at 1:14 a.m. QUESTION: 131 A CUA running 4.0 has been archiving
More informationDFSMS Basics: How to Create/Modify an SMS Configuration and Write ACS Routines - Demo
DFSMS Basics: How to Create/Modify an SMS Configuration and Write ACS Routines - Demo Steve Huber and David Legendre IBM March 14,2012 Session Number 10936 Agenda Intro to SMS (Configuration and ACS) Configuration
More informationPA-DSS Implementation Guide for Sage MAS 90 and 200 ERP. and Sage MAS 90 and 200 Extended Enterprise Suite
for Sage MAS 90 and 200 ERP Versions 4.30.0.18 and 4.40.0.1 and Sage MAS 90 and 200 Extended Enterprise Suite Versions 1.3 with Sage MAS 90 and 200 ERP 4.30.0.18 and 1.4 with Sage MAS 90 and 200 ERP 4.40.0.1
More informationEvents User Guide for Microsoft Office Live Meeting from Global Crossing
for Microsoft Office Live Meeting from Global Crossing Contents Events User Guide for... 1 Microsoft Office Live Meeting from Global Crossing... 1 Contents... 1 Introduction... 2 About This Guide... 2
More informationIBM. DFSMS Introduction. z/os. Version 2 Release 3 SC
z/os IBM DFSMS Introduction Version 2 Release 3 SC23-6851-30 Note Before using this information and the product it supports, read the information in Notices on page 91. This edition applies to Version
More informationTS7720 Implementation in a 4-way Grid
TS7720 Implementation in a 4-way Grid Rick Adams Fidelity Investments Monday August 6, 2012 Session Number 11492 Agenda Introduction TS7720 Components How a Grid works Planning Considerations TS7720 Setup
More informationFirewall Configuration and Management Policy
Firewall Configuration and Management Policy Version Date Change/s Author/s Approver/s 1.0 01/01/2013 Initial written policy. Kyle Johnson Dean of Information Services Executive Director for Compliance
More informationACH Monitor Fraud Review and Approval USER GUIDE
ACH Monitor Fraud Review and Approval USER GUIDE For informational purposes only, not considered an advertisement. ACH MONITOR - FRAUD REVIEW AND APPROVAL Welcome to M&T Bank s ACH Monitor Fraud Review
More informationStandard CIP Cyber Security Electronic Security Perimeter(s)
A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-2 3. Purpose: Standard CIP-005-2 requires the identification and protection of the Electronic Security Perimeter(s)
More informationGlobalSearch Security Definition Guide
Prepared by: Marketing Square 9 Softworks 203-361-3471 127 Church Street, New Haven, CT 06510 O: (203) 789-0889 E: sales@square-9.com www.square-9.com Table of Contents GLOBALSEARCH SECURITY METHODS...
More informationStandard CIP Cyber Security Electronic Security Perimeter(s)
A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-1 3. Purpose: Standard CIP-005 requires the identification and protection of the Electronic Security Perimeter(s)
More informationCIP Cyber Security Configuration Management and Vulnerability Assessments
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationUser Scripting April 14, 2018
April 14, 2018 Copyright 2013, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and
More informationQuick Start Guide. FactoryTalk Security System Configuration Guide
Quick Start Guide FactoryTalk Security System Configuration Guide Table of contents Preface About this publication... 9 Additional resources... 9 Chapter 1 About FactoryTalk systems About FactoryTalk
More informationVANGUARD Compliance Manager VANGUARD Policy Manager VANGUARD Security Manager VANGUARD Enforcer
VANGUARD Compliance Manager VANGUARD Policy Manager VANGUARD Security Manager VANGUARD Enforcer VANGUARD Compliance Manager Customization Compliance Support Performs specific custom baseline checks Performs
More informationIBM. DFSMS Implementing System-Managed Storage. z/os. Version 2 Release 3 SC
z/os IBM DFSMS Implementing System-Managed Storage Version 2 Release 3 SC23-6849-30 Note Before using this information and the product it supports, read the information in Notices on page 267. This edition
More informationConnecting EMC DiskXtender for Windows to EMC Centera
Connecting EMC DiskXtender for Windows to EMC Centera Best Practices Planning Abstract This white paper provides details on building the connection string that EMC DiskXtender for Windows uses to connect
More informationIBM. DFSMS Using the Interactive Storage Management Facility. z/os. Version 2 Release 3 SC
z/os IBM DFSMS Using the Interactive Storage Management Facility Version 2 Release 3 SC23-656-30 Note Before using this information and the product it supports, read the information in Notices on page
More informationIBM Spectrum Protect HSM for Windows Version Administration Guide IBM
IBM Spectrum Protect HSM for Windows Version 8.1.0 Administration Guide IBM IBM Spectrum Protect HSM for Windows Version 8.1.0 Administration Guide IBM Note: Before you use this information and the product
More informationAvaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface
Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Document ID: 13-603114 Release 2.2 July 2008 Issue No.1 2008 Avaya Inc. All Rights Reserved. Notice While reasonable
More informationTape Channel Analyzer Windows Driver Spec.
Tape Channel Analyzer Windows Driver Spec. 1.1 Windows Driver The Driver handles the interface between the Adapter and the Adapter Application Program. The driver follows Microsoft Windows Driver Model
More informationUser Databases. ACS Internal Database CHAPTER
CHAPTER 12 The Cisco Secure Access Control Server Release 4.2, hereafter referred to as ACS, authenticates users against one of several possible databases, including its internal database. You can configure
More informationCARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose
CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION I. Purpose To provide guidance to schools and administrative offices regarding the maintenance, retention,
More informationIBM Content Manager Compliance Solution with IBM System Storage N Series SnapLock devices
IBM Content Manager Compliance Solution with IBM System Storage N Series SnapLock devices Author: Raghuram Tadipatri Senior Manager, IBM tadipatr@us.ibm.com Dated: 5/20/2013 Copyright IBM (2013). This
More informationFIA Electronic Give-Up Agreement System (EGUS) Version 2.6
FIA Electronic Give-Up Agreement System (EGUS) Version 2.6 User Guide 18 January 2010 Copyright Unpublished work 2007-2010 Markit Group Limited This work is an unpublished, copyrighted work and contains
More informationCA EPIC for z/vse. Release Notes. r5.2
CA EPIC for z/vse Release Notes r5.2 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational
More informationHP Storage Provisioning Manager HP 3PAR StoreServ Peer Persistence
Technical white paper HP Storage Provisioning Manager HP 3PAR StoreServ Peer Persistence Handling HP 3PAR StoreServ Peer Persistence with HP Storage Provisioning Manager Click here to verify the latest
More informationMANAGING AN FLR-ENABLED NAS ENVIRONMENT WITH THE EMC FLR TOOLKIT ON VNXe
White Paper MANAGING AN FLR-ENABLED NAS ENVIRONMENT WITH THE EMC FLR TOOLKIT ON VNXe Overview Abstract EMC File-Level Retention (FLR) is a feature that provides a software infrastructure for users to secure
More informationFile Organization Sheet
File Organization Sheet 1. What are File Structures? A File Structure is a combination of representations for data in files and of operations for accessing the data. A File Structure allows applications
More informationEnd User Licence. PUBLIC 31 January 2017 Version: T +44 (0) E ukdataservice.ac.uk
End User Licence PUBLIC 31 January 2017 Version: 07.00 T +44 (0)1206 872572 E susan@essex.ac.uk ukdataservice.ac.uk Contents 1. End User Licence (EUL) Text... 2 2. End User Licence (EUL) Summary text...
More informationCompany System Administrator (CSA) User Guide
BMO HARRIS ONLINE BANKING SM FOR SMALL BUSINESS Company System Administrator (CSA) User Guide Copyright 2011 BMO Harris Bank N.A. TABLE OF CONTENTS WELCOME... 1 Who should use this guide... 1 What it covers...
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationWHITEPAPER RETAINING USER DATA WHITEPAPER RETAINING USER DATA
TM WHITEPAPER RETAINING USER DATA WHITEPAPER RETAINING USER DATA Content Page Overview...03 The Frozen Environment...04 Storage Solutions...05 Redirecting User Profiles and Folders using Data Igloo...06
More informationCA TLMS Tape Management
CA TLMS Tape Management TLMS_User_ENU Release 12.6 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationEnterprise Vault Best Practices
Enterprise Vault Best Practices Implementing SharePoint Archiving This document contains information on best practices when implementing Enterprise Vault for SharePoint If you have any feedback or questions
More informationAutomation Change Management for Regulated Industries
Automation Change Management for Regulated Industries Achieving Part 11 Compliance A White Paper Synopsis This whitepaper provides information related to FDA regulation 21 CFR Part 11 (Part 11) for organizations
More informationDELL EMC DATA DOMAIN RETENTION LOCK SOFTWARE
WHITEPAPER DELL EMC DATA DOMAIN RETENTION LOCK SOFTWARE A Detailed Review ABSTRACT Enterprises continue to see an exponential growth in the structured and unstructured data that is proliferating across
More informationVSC-PCTS2003 TEST SUITE TIME-LIMITED LICENSE AGREEMENT
VSC-PCTS2003 TEST SUITE TIME-LIMITED LICENSE AGREEMENT Notes These notes are intended to help prospective licensees complete the attached Test Suite Time-Limited License Agreement. If you wish to execute
More informationDFSMSdss Best Practices in an SMS Environment
DFSMSdss Best Practices in an SMS Environment Steve Huber and Jeff Suarez IBM Corporation shuber@us.ibm.com jrsuarez@us.ibm.com August 5, 2010 Session 8049 Legal Disclaimer NOTICES AND DISCLAIMERS Copyright
More informationDEPARTMENT OF LICENSING AND REGULATORY AFFAIRS PUBLIC SERVICE COMMISSION BASIC LOCAL EXCHANGE SERVICE CUSTOMER MIGRATION
DEPARTMENT OF LICENSING AND REGULATORY AFFAIRS PUBLIC SERVICE COMMISSION BASIC LOCAL EXCHANGE SERVICE CUSTOMER MIGRATION (By authority conferred on the public service commission by sections 202 and 213
More information21 CFR Part 11 FAQ (Frequently Asked Questions)
21 CFR Part 11 FAQ (Frequently Asked Questions) and Roles and Responsibilities for Assessment of METTLER TOLEDO STAR e Software Version 16.00, including: - 21 CFR 11 Compliance software option for Compliance
More informationStandard CIP 007 4a Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-4a 3. Purpose: Standard CIP-007-4 requires Responsible Entities to define methods, processes, and procedures for
More informationSAS Data Libraries. Definition CHAPTER 26
385 CHAPTER 26 SAS Data Libraries Definition 385 Library Engines 387 Library Names 388 Physical Names and Logical Names (Librefs) 388 Assigning Librefs 388 Associating and Clearing Logical Names (Librefs)
More informationCompliance of Shimadzu Total Organic Carbon (TOC) Analyzer with FDA 21 CFR Part 11 Regulations on Electronic Records and Electronic Signatures
NT1D-1275 Compliance of Shimadzu Total Organic Carbon (TOC) Analyzer with FDA 21 CFR Part 11 Regulations on Electronic Records and Electronic Signatures TOC-Control L Ver.1 / LabSolutions DB/CS Ver.6 Part
More informationStandard CIP 007 3a Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3a 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for
More informationAn Oracle White Paper April How to Use Tape Tiering Accelerator (Automatically Linked Partition)
An Oracle White Paper April 2014 How to Use Tape Tiering Accelerator (Automatically Linked Partition) Introduction... 1 New Host Interface Commands... 3 Locate ALP... 3 Set ALP Mode... 3 Set Writable ALPs...
More informationData Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement
Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationNTP Software VFM Administration Web Site
NTP Software VFM Administration Web Site User Manual Version 7.1 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective. Upon completion of
More informationGovernance, Risk, and Compliance Controls Suite. Release Notes. Software Version
Governance, Risk, and Compliance Controls Suite Release Notes Software Version 7.2.2.1 Governance, Risk, and Compliance Controls Suite Release Notes Part No. AG008-7221A Copyright 2007, 2008, Oracle Corporation
More informationLIST RENTAL CONTRACT
LIST RENTAL CONTRACT After execution of this Contract and upon receipt of order(s) from List Enduser or their list broker that is acceptable to MSLA INTERNATIONAL and contractual affiliates ( List Owners
More informationSystem Assessment Report Relating to Electronic Records and Electronic Signatures; Final Rule, 21 CFR Part 11. System: tiamo 2.3
Page 1 /14 System Assessment Report Relating to Electronic Records and Electronic Signatures; Final le, 21 CFR Part 11 System: tiamo 23 052011 / doe Page 2 /14 1 Procedures and Controls for Closed Systems
More informationIntroduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault
Introduction What is Microsoft Data Protection Manager (DPM)? The Microsoft Data Protection Manager is a member of the Microsoft System Center family of management products. DPM provides continuous data
More informationWebSphere Application Server V7: Administration Consoles and Commands
Chapter 5 of WebSphere Application Server V7 Administration and Configuration Guide, SG24-7615 WebSphere Application Server V7: Administration Consoles and Commands WebSphere application server properties
More informationC Q&As. IBM Tivoli Storage Manager V7.1 Implementation. Pass IBM C Exam with 100% Guarantee
C2010-511 Q&As IBM Tivoli Storage Manager V7.1 Implementation Pass IBM C2010-511 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money
More informationForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3
ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic
More informationCertified Professional in Supply Management Application for Recertification
Certified Professional in Supply Management Application for Recertification For use with applications beginning March 1, 2017. Recertification Requirements Individuals who have earned their CPSM designation
More informationManage Authorization Policies and Profiles
Cisco ISE Authorization Policies, on page 1 Cisco ISE Authorization Profiles, on page 1 Default Authorization Policies, on page 5 Configure Authorization Policies, on page 6 Permissions for Authorization
More informationQuestion No : 1 Which three statements are true regarding persistent lightweight jobs? (Choose three.)
Volume: 183 Questions Question No : 1 Which three statements are true regarding persistent lightweight jobs? (Choose three.) A. The user cannot set privileges on persistent lightweight jobs. B. The use
More informationCalifornia Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT
California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT SUBCHAPTER 2.5. VOLUNTARY CERTIFIED ACCESS SPECIALIST PROGRAM Program
More informationMySign Electronic Signature
MySign Electronic Signature Advisory Circular Compliance Matrix FAA AC 120 78A Dated 06/22/16 1 Table of Contents Table of Contents 2 Purpose 3 FAA Acceptance 3 Non Requirement for Approval 3 2-2 Electronic
More informationWhat Every Storage Administrator Should Do For YOUR DB2 Environment
What Every Storage Administrator Should Do For YOUR DB2 Environment John Iczkovits IBM March 15, 2012 Session Number 10475 10475: What Every Storage Administrator Should Do For YOUR DB2 Environment Storage
More informationEmployee Security Awareness Training Program
Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,
More informationCIP Cyber Security Physical Security of BES Cyber Systems
A. Introduction 1. Title: Cyber Security Physical Security of BES Cyber Systems 2. Number: CIP-006-5 3. Purpose: To manage physical access to BES Cyber Systems by specifying a physical security plan in
More informationIntegrity 10. Curriculum Guide
Integrity 10 Curriculum Guide Live Classroom Curriculum Guide Integrity 10 Workflows and Documents Administration Training Integrity 10 SCM Administration Training Integrity 10 SCM Basic User Training
More informationIBM. OA VTAM 3270 Intrusion Detection Services - Overview, Considerations, and Assessment (Prerequisite) z/os Communications Server
z/os Communications Server IBM OA49911 - VTAM 3270 Intrusion Detection Services - Overview, Considerations, and Assessment (Prerequisite) Version 2 Release 2 Note: Links to related publications are from
More informationReliability Standard Audit Worksheet 1
Reliability Standard Audit Worksheet 1 CIP-006-6 Cyber Security Physical Security of BES Cyber Systems This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity:
More information