IBM Virtualization Engine TS7700 Series Best Practices. TS7700 Logical WORM Best Practices

Size: px
Start display at page:

Download "IBM Virtualization Engine TS7700 Series Best Practices. TS7700 Logical WORM Best Practices"

Transcription

1 IBM Virtualization Engine TS7700 Series Best Practices TS7700 Logical WORM Best Practices Jim Fisher Executive IT Specialist Advanced Technical Skills (ATS) Page 1 of 10

2 Contents Introduction...3 Cohasset Associates Report...3 Host Considerations...4 Protecting ACS Routines...4 Protecting Logical Volumes from Being Scratched...4 TS7700 Considerations...5 Data Class Default...5 Limit Access to Storage Construct Action Modification...5 Fast Ready Expire with Hold...9 Separate Category for WORM and Non-WORM Use Media 1 and Media Page 2 of 10

3 Introduction The TS7700 Virtualization Engine supports the logical write once, read many (WORM) function through TS7700 Virtualization Engine software emulation. The host views the TS7700 Virtualization Engine as a Logical WORM (LWORM) compliant library that contains WORM-compliant 3490E logical drives and media. The LWORM implementation of the TS7700 Virtualization Engine emulates physical WORM tape drives and media. The TS7700 Virtualization Engine provides the following functions: Provides an advanced function Data Class construct property that allows volumes to be assigned as LWORM-compliant during the volume s first mount, where a write operation from BOT is required, or during a volume s reuse from scratch, where a write from BOT is required. Generates, during the assignment of LWORM to a volume s characteristics, a temporary World Wide Identifier that is surfaced to host software during host software open and close processing, and then bound to the volume during first write from BOT. Generates and maintains a persistent Write-Mount Count for each LWORM volume and keeps the value synchronized with host software. Allows only appends to LWORM volumes using physical WORM append guidelines. Provides a mechanism through which host software commands can discover LWORM attributes for a given mounted volume. The LWORM implementation consists of two major components, the TS7700 itself and the host s Tape Management System (TMS). The TS7700 protects data from overwrite and modification and the TMS controls retention of the LWORM volume. A report from Cohasset Associates was commissioned by IBM to evaluate the TS7700 LWORM implementation. The report is referenced in the next section. This paper looks beyond the Cohasset report and provides best practices for protecting the solution from changes made to LWORM policies by unauthorized personnel. This paper also provides details of some of the items mentioned in the Cohasset Associates report. Cohasset Associates Report This technical report is a compliance assessment of the storage capabilities of the IBM Virtualization Engine TS7700 relative to the requirements and conditions of SEC Rule 17a-4(f). Its purpose is to obtain an independent and objective assessment of the TS7700 s capabilities to meet the requirements set forth in SEC Rule 17a-4(f). Cohasset Associates assessment concludes that the TS7700 meets all of the SEC requirements that are its direct responsibility for retaining and storing in digital form 17a-3 and 17a-4 records pursuant to the requirements set forth in Rule 17a-4(f), which expressly allows records to be retained on electronic storage media. Here is a pointer to the Cohasset Associates report: ftp://public.dhe.ibm.com/storage/tape/cai-ibmts7700techreport.pdf Page 3 of 10

4 Host Considerations Protecting ACS Routines The DFSMS Automatic Class Selection (ACS) routines are used to assign storage construct names for a logical volume scratch mount being directed to a TS7700. These constructs include Storage Group, Management Class, Storage Class, and Data Class. The Data Class construct is used to designate the logical volume as a Logical WORM (LWORM) volume. To make sure all logical volume mounts that were intended to be LWORM tapes, the ACS routines must be protected from being altered by an unauthorized person. This can be accomplished using RACF. Refer to the z/os DFSMSdfp Storage Administration manual for more information. F=all13be9&DT= &CASE=&searchTopic=TOPIC&searchText=TEXT&searchIndex=INDEX& rank=rank&scrolltop=firsthit#firsthit Protecting Logical Volumes from Being Scratched The Tape Management System (TMS), such as RMM or CA-1 is responsible for logical volume retention. Access to the ability to scratch a logical volume must be protected from unauthorized access. Also, using RMM, the scratching process can be changed to require a manual two-step process. RMM (Removable Media Manager) provides the ability to require manual action before allowing a logical volume to be returned to scratch. Below is an excerpt from an RMM manual. Check the CA-1 product or your TMS product to see if it has a similar capability. If you want to prevent logical WORM volumes returning to scratch automatically you can use the existing capability of the VLPOOL with RELEASEACTION(NOTIFY). This forces the NOTIFY release action for all volumes in the pool and requires you to issue RMM CV volser CRLSE(NOTIFY) to confirm the action before the REPLACE is handled automatically. Refer to existing DFSMSrmm Implementation & Customization Guide documentation for how to use NOTIFY and ensure it requires a manual action. tm Page 4 of 10

5 TS7700 Considerations The TS7700 defines the actions associated with the storage constructs that are passed to the TS7700 as part of a scratch mount. This includes the Data Class which is used to select Logical WORM. Be sure the appropriate Data Classes have the Logical WORM action set to Yes. Data Class Default The four storage constructs have default actions that can be altered. For a TS7700 that is exclusively using Logical WORM tapes, the default action should be set to specify the Logical WORM action. When the TS7700 receives a scratch mount request with an undefined storage construct, the TS7700 will automatically add the new construct name and assign the default actions. With the default set to Logical WORM, a previously unknown Data Class passed to the TS7700 will be given the action of a Logical WORM. The figure below shows the Modify Data Class panel for the default Data Class ( ) with Logical WORM being set as the action associated with the default. Figure 1 - Modify Data Class Panel Limit Access to Storage Construct Action Modification Similar to protecting modification of the ACS routines at the host, the construct actions need to be protected from alternation by an unauthorized person. This is accomplished by properly utilizing the Roles and Permissions settings on the TS7700 as well as assigning the appropriate role to a user account. The TS7700 provides four fixed roles; Administrator, Operator, Lead Operator, and Manager, as well as ten customizable roles. Each custom role can be defined to provide or deny access to selected, individual panels. For Logical WORM protect, be specifically concerned with the access to the storage construct panels associated with the Data Class construct. The fixed Operator role cannot modify, add, or delete any storage constructs. However, the Lead Operator, Manager, and Administrator roles can modify, add, or delete storage constructs and their associated actions. Any accounts created for users that should not have access to modifying, adding, or deleting storage constructs should be assigned the Operator Role or a custom role that denies access to the storage construct panels, especially Data Class. Page 5 of 10

6 It is also critical to only allow authorized users to create, modify, or delete user accounts. Both the Manager and Administrator roles are able to modify, add, and delete accounts. A custom role could also create, modify, or delete an account if the role is defined to allow this. The screenshot below shows the Roles & Permissions panel with the four fixed roles and six of the ten custom roles. As an example, Custom Role 1 will be modified to allow user Account and Roles & Permissions access. The example also makes an update to the role s name to make it more meaningful. Figure 2 - Roles & Permissions Panel Page 6 of 10

7 The screenshot below shows the panel used to define the access for one of the custom roles. Access to a panel is granted by checking the checkbox next to a panel name. In this example the panels associated with user account and roles are checked. This custom role will be able to create and modify custom roles and add, modify, and delete user accounts and their associated roles. This custom role is named Manage Users. Figure 3 - Modifying Custom Roles & Assigned Permissions - Account Management Page 7 of 10

8 The screenshot below also shows the panel used to define the access for one of the custom roles. Access to a panel is granted by checking the checkbox next to a panel name. In this example the panels associated with adding, modifying and deleting storage constructs are checked. This custom role will be able to add, modify, and delete storage constructs and their associated actions. This custom role is named Manage Constructs. Figure 4 - Modifying Custom Roles & Assigned Permissions - Construct Management Page 8 of 10

9 The screenshot below shows the addition of a new account, AdminJim, with a role of Manage Users and access to all clusters in the five cluster grid. Since the Manage Users role was defined to allow alteration of Roles and Permissions, AdminJim will be able to alter Roles and Permissions. Figure 5 - Adding an Account Panel In summary: 1. Control who can administer the user accounts and the actions available to each role. Make sure only authorized users can create, modify, or delete accounts. Also make sure only authorized users can modify the actions available to the custom roles. 2. Control which accounts can modify the storage construct actions, such as the actions associated with the Data Class, Logical WORM in particular. Fast Ready Expire with Hold As explained earlier, it is the Tape Management System (TMS) that controls when a logical volume is returned to scratch. The appropriate protections against unauthorized or inadvertent scratching of a Logical WORM volume should be in place. Additional protection can be provided at the TS7700 by utilizing the Fast Ready Expire with Hold functionality on the TS7700. Scratch categories are defined at the TS7700 to allow the TS7700 to quickly mount a scratch volume, thus the name fast ready. The fast ready categories should match the scratch categories defined by DEVSUP at the host. There are two optional parameters that can be set for each fast ready category; expire time and expire hold. Expire time defines the amount of time after a virtual volume is returned to the Fast Ready scratch category before its data content is automatically expired by the TS7700. Once expired, the TS7700 stops managing the logical volume at which point it can no longer be accessed. The logical volume will expire when either the expiretime passes or the scratch volume is needed to satisfy a scratch mount, whichever occurs first. The expire-time can be set from 1 hour to 365 days. Page 9 of 10

10 Expire hold causes the TS7700 to not allow a scratch logical volume s attributes to be altered or be used to satisfy a scratch mount for the full expire time. This essentially protects the data on the logical volume from being expired for the duration of the expire-time. Setting an expire-time and enabling the expire-hold capability you can provide a grace period where an inadvertent or unauthorized setting of a logical volume to scratch can be reversed. The TMS can be used to set the volume back to private. Starting with Release 2.1, the TS7700 allows an expire-held logical volume s category to be changed from its fast-ready category to a non-fast-ready category. Prior to Release 2.1, expire-hold must be temporarily turned off at the TS7700 in order to change the logical volume s category. The screenshot below shows scratch category 0012 being added as a fast-ready category with an expire-time of 365 days and with expire-hold set. Figure 6 - Add a Fast Ready Category with Expire Hold Separate Category for WORM and Non-WORM Use Media 1 and Media 2 In some TS7700 Logical WORM (LWORM) implementations all of the logical volumes are WORM tapes. In other TS7700 implementations some logical volumes are treated as normal volumes and others are treated as LWORMs. In the mixed case, the fast-ready category attributes for expire-hold will most likely need to be different. For example, it may be desirable to set an expire time of just a few days for a non-lworm scratched volume, but many days, perhaps 365 days, for LWORM volumes. This requires two scratch categories. The TS7700 supports media 1 and media 2 logical volumes. Each media type has a different category such as 0001 and 0002, or 0011 and 0012, and so forth. When the two both non-lworm and LWORM volumes need to be specified using a single DEVSUP definition, you can use one media type for LWORM and the other for non- LWORM volumes. This will allow you to have separate expire-hold settings for each media type with a single DEVSUP. Page 10 of 10

IBM Virtualization Engine TS7700 Series Best Practices. Usage with Linux on System z 1.0

IBM Virtualization Engine TS7700 Series Best Practices. Usage with Linux on System z 1.0 IBM Virtualization Engine TS7700 Series Best Practices Usage with Linux on System z 1.0 Erika Dawson brosch@us.ibm.com z/os Tape Software Development Page 1 of 11 1 Introduction... 3 1.1 Change History...

More information

Exam Actual. Higher Quality. Better Service! QUESTION & ANSWER

Exam Actual. Higher Quality. Better Service! QUESTION & ANSWER Higher Quality Better Service! Exam Actual QUESTION & ANSWER Accurate study guides, High passing rate! Exam Actual provides update free of charge in one year! http://www.examactual.com Exam : 000-207 Title

More information

IBM Virtualization Engine TS7700 Series Best Practices. Cache Management in the TS7720 V1.6

IBM Virtualization Engine TS7700 Series Best Practices. Cache Management in the TS7720 V1.6 IBM Virtualization Engine TS7700 Series Best Practices Cache Management in the TS7720 V1.6 Jim Fisher fisherja@us.ibm.com IBM Advanced Technical Skills North America Page 1 of 47 1 Introduction... 3 1.1

More information

Session RMM Exploitation

Session RMM Exploitation Session 15549 RMM Exploitation Speakers Vickie Dault, IBM Thursday August 7, 2014 3:00 4:00 pm Insert Custom Session QR if Desired. Agenda Retentionmethods VRSEL EXPDT Assigning Retentionmethod and Limitations

More information

IBM Virtualization Engine TS7700 Series Best Practices. TS7700 Hybrid Grid Usage V1.1

IBM Virtualization Engine TS7700 Series Best Practices. TS7700 Hybrid Grid Usage V1.1 IBM Virtualization Engine TS7700 Series Best Practices TS7700 Hybrid Grid Usage V1.1 William Travis billyt@us.ibm.com STSM TS7700 Development Jim Fisher fisherja@us.ibm.com IBM Advanced Technical Skills

More information

IBM Virtualization Engine TS7700 Series Copy Export Function User's Guide Version 2.1.5

IBM Virtualization Engine TS7700 Series Copy Export Function User's Guide Version 2.1.5 May 2013 IBM Virtualization Engine TS7700 Series Copy Export Function User's Guide Version 2.1.5 Kerri Shotwell Senior Design Engineer Tucson, Arizona Copyright 2007, 2009, 2011, 2012 IBM Corporation Introduction...

More information

EMC for Mainframe Tape on Disk Solutions

EMC for Mainframe Tape on Disk Solutions EMC for Mainframe Tape on Disk Solutions May 2012 zmainframe Never trust a computer you can lift! 1 EMC & Bus-Tech for Mainframe EMC supports mainframe systems since 1990 with first integrated cached disk

More information

IBM Virtualization Engine TS7700 Series Encryption Overview Version 1.1

IBM Virtualization Engine TS7700 Series Encryption Overview Version 1.1 April 2007 IBM Virtualization Engine TS7700 Series Encryption Overview Version 1.1 By: Wayne Carlson IBM Senior Engineer Tucson, Arizona Introduction The IBM Virtualization Engine TS7700 Series is the

More information

IBM TS7700 Series Best Practices. Flash Copy for Disaster Recovery Testing V1.1.1

IBM TS7700 Series Best Practices. Flash Copy for Disaster Recovery Testing V1.1.1 7/9/2015 IBM TS7700 Series Best Practices Flash Copy for Disaster Recovery Testing V1.1.1 Norie Iwasaki, norie@jp.ibm.com IBM STG, Storage Systems Development, IBM Japan Ltd. Katsuyoshi Katori, katori@jp.ibm.com

More information

Under the Covers. Benefits of Disk Library for Mainframe Tape Replacement. Session 17971

Under the Covers. Benefits of Disk Library for Mainframe Tape Replacement. Session 17971 Under the Covers Benefits of Disk Library for Mainframe Tape Replacement Session 17971 Session Overview DLm System Architecture Virtual Library Architecture VOLSER Handling Formats Allocating/Mounting

More information

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No.

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No. ISSUE N 1 MAJOR MODIFICATIONS Version Changes Related Release No. 01 First issue. 2.8.0 PREVIOUS VERSIONS HISTORY Version Date History Related Release No. N/A N/A N/A N/A APPROVAL TABLE Signatures below

More information

Financial Services Compliance

Financial Services Compliance Financial Services Compliance WHITEPAPER SEC RULE 17A FOR BROKER-DEALERS SEC RULE 31A-2 AND 204-2 FOR INVESTMENT ADVISORS. Financial Services Compliance Whitepaper 2 U.S. Security Exchange Commission -

More information

RECORDS AND INFORMATION MANAGEMENT AND RETENTION

RECORDS AND INFORMATION MANAGEMENT AND RETENTION RECORDS AND INFORMATION MANAGEMENT AND RETENTION Policy The Health Science Center recognizes the need for orderly management and retrieval of all official records and a documented records retention and

More information

Standard CIP 005 2a Cyber Security Electronic Security Perimeter(s)

Standard CIP 005 2a Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-2a 3. Purpose: Standard CIP-005-2 requires the identification and protection of the Electronic Security Perimeter(s)

More information

The Life and Times of a Data Set: You Wouldn't Want Your Relatives Hanging Around, Why Your Data?

The Life and Times of a Data Set: You Wouldn't Want Your Relatives Hanging Around, Why Your Data? The Life and Times of a Data Set: You Wouldn't Want Your Relatives Hanging Around, Why Your Data? Chris Taylor ctaylor1@us.ibm.com IBM Corporation August 16, 2013 Session Number 13772 Legal Disclaimer

More information

TS7700 Technical Update What s that I hear about R3.2?

TS7700 Technical Update What s that I hear about R3.2? TS7700 Technical Update What s that I hear about R3.2? Ralph Beeston TS7700 Architecture IBM Session objectives Brief Overview TS7700 TS7700 Release 3.2 TS7720T TS7720 Tape Attach The Basics Partitions

More information

Standard CIP 005 4a Cyber Security Electronic Security Perimeter(s)

Standard CIP 005 4a Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-4a 3. Purpose: Standard CIP-005-4a requires the identification and protection of the Electronic Security Perimeter(s)

More information

Set Up a Compliant Archive. November 2016

Set Up a Compliant Archive. November 2016 Set Up a Compliant Archive November 2016 2016, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents AWS s current

More information

SAPERION Records Management

SAPERION Records Management SAPERION Records Management Copyright 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc., registered in the U.S. and/or other countries. All other trademarks are the

More information

IBM TS7700 Series Grid Failover Scenarios Version 1.4

IBM TS7700 Series Grid Failover Scenarios Version 1.4 July 2016 IBM TS7700 Series Grid Failover Scenarios Version 1.4 TS7700 Development Team Katsuyoshi Katori Kohichi Masuda Takeshi Nohta Tokyo Lab, Japan System and Technology Lab Copyright 2006, 2013-2016

More information

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer

More information

IBM Tape Manager for z/vm and DFSMSRMS z/vm in a TS7700 Tape Grid Environment

IBM Tape Manager for z/vm and DFSMSRMS z/vm in a TS7700 Tape Grid Environment IBM Tape Manager for z/vm and DFSMSRMS z/vm in a TS7700 Tape Grid Environment This document can be found on the web at www.ibm.com/support/techdocs Search for author s name under the category of White

More information

TS7700 Technical Update TS7720 Tape Attach Deep Dive

TS7700 Technical Update TS7720 Tape Attach Deep Dive TS7700 Technical Update TS7720 Tape Attach Deep Dive Ralph Beeston TS7700 Architecture IBM Session objectives Brief Overview TS7700 Quick background of TS7700 TS7720T Overview TS7720T Deep Dive TS7720T

More information

IBM. CICSPlex SM Concepts and Planning. CICS Transaction Server for z/os. Version 5 Release 4

IBM. CICSPlex SM Concepts and Planning. CICS Transaction Server for z/os. Version 5 Release 4 for z/os IBM CICSPlex SM Concepts and Planning Version 5 Release 4 for z/os IBM CICSPlex SM Concepts and Planning Version 5 Release 4 Note Before using this information and the product it supports, read

More information

IBM Virtualization Engine TS7700 Series Best Practices. Copy Consistency Points V1.2

IBM Virtualization Engine TS7700 Series Best Practices. Copy Consistency Points V1.2 IBM Virtualization Engine TS7700 Series Best Practices Copy Consistency Points V1.2 Takeshi Nohta nohta@jp.ibm.com RMSS/SSD-VTS - Japan Target Audience This document provides the Best Practices for TS7700

More information

Policy & Procedure HIPAA / PRIVACY DESTRUCTION

Policy & Procedure HIPAA / PRIVACY DESTRUCTION PURPOSE To ensure that any medium containing Protected Health Information ( PHI ) is properly destroyed. POLICY PHI stored in paper, electronic or other format will be destroyed utilizing an acceptable

More information

IBM High End Taps Solutions Version 5. Download Full Version :

IBM High End Taps Solutions Version 5. Download Full Version : IBM 000-207 High End Taps Solutions Version 5 Download Full Version : http://killexams.com/pass4sure/exam-detail/000-207 QUESTION: 194 Which of the following is used in a System Managed Tape environment

More information

IBM. Archive Manager for z/vm Administration Guide. IBM Archive Manager for z/vm. Version 1 Release 1 SC

IBM. Archive Manager for z/vm Administration Guide. IBM Archive Manager for z/vm. Version 1 Release 1 SC IBM Archive Manager for z/vm IBM Archive Manager for z/vm Administration Guide Version 1 Release 1 SC18-9345-03 IBM Archive Manager for z/vm IBM Archive Manager for z/vm Administration Guide Version 1

More information

IBM Software. IBM z/vm Management Software. Introduction. Tracy Dean, IBM April IBM Corporation

IBM Software. IBM z/vm Management Software. Introduction. Tracy Dean, IBM April IBM Corporation IBM z/vm Management Software Introduction Tracy Dean, IBM tld1@us.ibm.com April 2009 Agenda System management Operations Manager for z/vm Storage management Backup and Restore Manager for z/vm Tape Manager

More information

z/os Introduction and Workshop Data Sets

z/os Introduction and Workshop Data Sets z/os Introduction and Workshop Data Sets 2009 IBM Corporation Unit Objectives After completing this unit, you should be able to: Describe data set naming rules Describe a partitioned data set Describe

More information

Veritas NetBackup Vault Administrator s Guide

Veritas NetBackup Vault Administrator s Guide Veritas NetBackup Vault Administrator s Guide UNIX, Windows, and Linux Release 6.5 12308354 Veritas NetBackup Vault Administrator s Guide Copyright 2001 2007 Symantec Corporation. All rights reserved.

More information

IBM Virtualization Engine TS7700 Series Statistical Data Format White Paper Version 1.6

IBM Virtualization Engine TS7700 Series Statistical Data Format White Paper Version 1.6 November 2009 IBM Virtualization Engine TS7700 Series Statistical Data Format White Paper Version 1.6 Tucson Tape Development Tucson, Arizona Target Audience This document provides the definition of the

More information

NSIF APPROVED DOCUMENT. Common Applications Requirements for SONET NE Security System

NSIF APPROVED DOCUMENT. Common Applications Requirements for SONET NE Security System NSIF APPROVED DOCUMENT NSIF-037-2000 (NSIF Document #NSIF-CA-9910-110R3) WORK GROUP: Security TITLE: Common Applications Requirements for SONET NE Security System DATE: EDITOR: Name: Ron Roman Voice: (732)

More information

WHITE PAPER PAPERWISE DOCUMENT MANAGEMENT COMPLIANCE WITH SEC 17A-4

WHITE PAPER PAPERWISE DOCUMENT MANAGEMENT COMPLIANCE WITH SEC 17A-4 WHITE PAPER PAPERWISE DOCUMENT MANAGEMENT COMPLIANCE WITH SEC 17A-4 Prepared By Chris Jones Documentation and Content 417.886.7505 cjones@paperwise.com Prepared On March 20, 2013 TABLE OF CONTENTS Introduction

More information

EMC E Networked Storage CAS Specialist. Download Full Version :

EMC E Networked Storage CAS Specialist. Download Full Version : EMC E20-570 Networked Storage CAS Specialist Download Full Version : https://killexams.com/pass4sure/exam-detail/e20-570 D. During each backup at 1:14 a.m. QUESTION: 131 A CUA running 4.0 has been archiving

More information

DFSMS Basics: How to Create/Modify an SMS Configuration and Write ACS Routines - Demo

DFSMS Basics: How to Create/Modify an SMS Configuration and Write ACS Routines - Demo DFSMS Basics: How to Create/Modify an SMS Configuration and Write ACS Routines - Demo Steve Huber and David Legendre IBM March 14,2012 Session Number 10936 Agenda Intro to SMS (Configuration and ACS) Configuration

More information

PA-DSS Implementation Guide for Sage MAS 90 and 200 ERP. and Sage MAS 90 and 200 Extended Enterprise Suite

PA-DSS Implementation Guide for Sage MAS 90 and 200 ERP. and Sage MAS 90 and 200 Extended Enterprise Suite for Sage MAS 90 and 200 ERP Versions 4.30.0.18 and 4.40.0.1 and Sage MAS 90 and 200 Extended Enterprise Suite Versions 1.3 with Sage MAS 90 and 200 ERP 4.30.0.18 and 1.4 with Sage MAS 90 and 200 ERP 4.40.0.1

More information

Events User Guide for Microsoft Office Live Meeting from Global Crossing

Events User Guide for Microsoft Office Live Meeting from Global Crossing for Microsoft Office Live Meeting from Global Crossing Contents Events User Guide for... 1 Microsoft Office Live Meeting from Global Crossing... 1 Contents... 1 Introduction... 2 About This Guide... 2

More information

IBM. DFSMS Introduction. z/os. Version 2 Release 3 SC

IBM. DFSMS Introduction. z/os. Version 2 Release 3 SC z/os IBM DFSMS Introduction Version 2 Release 3 SC23-6851-30 Note Before using this information and the product it supports, read the information in Notices on page 91. This edition applies to Version

More information

TS7720 Implementation in a 4-way Grid

TS7720 Implementation in a 4-way Grid TS7720 Implementation in a 4-way Grid Rick Adams Fidelity Investments Monday August 6, 2012 Session Number 11492 Agenda Introduction TS7720 Components How a Grid works Planning Considerations TS7720 Setup

More information

Firewall Configuration and Management Policy

Firewall Configuration and Management Policy Firewall Configuration and Management Policy Version Date Change/s Author/s Approver/s 1.0 01/01/2013 Initial written policy. Kyle Johnson Dean of Information Services Executive Director for Compliance

More information

ACH Monitor Fraud Review and Approval USER GUIDE

ACH Monitor Fraud Review and Approval USER GUIDE ACH Monitor Fraud Review and Approval USER GUIDE For informational purposes only, not considered an advertisement. ACH MONITOR - FRAUD REVIEW AND APPROVAL Welcome to M&T Bank s ACH Monitor Fraud Review

More information

Standard CIP Cyber Security Electronic Security Perimeter(s)

Standard CIP Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-2 3. Purpose: Standard CIP-005-2 requires the identification and protection of the Electronic Security Perimeter(s)

More information

GlobalSearch Security Definition Guide

GlobalSearch Security Definition Guide Prepared by: Marketing Square 9 Softworks 203-361-3471 127 Church Street, New Haven, CT 06510 O: (203) 789-0889 E: sales@square-9.com www.square-9.com Table of Contents GLOBALSEARCH SECURITY METHODS...

More information

Standard CIP Cyber Security Electronic Security Perimeter(s)

Standard CIP Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-1 3. Purpose: Standard CIP-005 requires the identification and protection of the Electronic Security Perimeter(s)

More information

CIP Cyber Security Configuration Management and Vulnerability Assessments

CIP Cyber Security Configuration Management and Vulnerability Assessments Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

User Scripting April 14, 2018

User Scripting April 14, 2018 April 14, 2018 Copyright 2013, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and

More information

Quick Start Guide. FactoryTalk Security System Configuration Guide

Quick Start Guide. FactoryTalk Security System Configuration Guide Quick Start Guide FactoryTalk Security System Configuration Guide Table of contents Preface About this publication... 9 Additional resources... 9 Chapter 1 About FactoryTalk systems About FactoryTalk

More information

VANGUARD Compliance Manager VANGUARD Policy Manager VANGUARD Security Manager VANGUARD Enforcer

VANGUARD Compliance Manager VANGUARD Policy Manager VANGUARD Security Manager VANGUARD Enforcer VANGUARD Compliance Manager VANGUARD Policy Manager VANGUARD Security Manager VANGUARD Enforcer VANGUARD Compliance Manager Customization Compliance Support Performs specific custom baseline checks Performs

More information

IBM. DFSMS Implementing System-Managed Storage. z/os. Version 2 Release 3 SC

IBM. DFSMS Implementing System-Managed Storage. z/os. Version 2 Release 3 SC z/os IBM DFSMS Implementing System-Managed Storage Version 2 Release 3 SC23-6849-30 Note Before using this information and the product it supports, read the information in Notices on page 267. This edition

More information

Connecting EMC DiskXtender for Windows to EMC Centera

Connecting EMC DiskXtender for Windows to EMC Centera Connecting EMC DiskXtender for Windows to EMC Centera Best Practices Planning Abstract This white paper provides details on building the connection string that EMC DiskXtender for Windows uses to connect

More information

IBM. DFSMS Using the Interactive Storage Management Facility. z/os. Version 2 Release 3 SC

IBM. DFSMS Using the Interactive Storage Management Facility. z/os. Version 2 Release 3 SC z/os IBM DFSMS Using the Interactive Storage Management Facility Version 2 Release 3 SC23-656-30 Note Before using this information and the product it supports, read the information in Notices on page

More information

IBM Spectrum Protect HSM for Windows Version Administration Guide IBM

IBM Spectrum Protect HSM for Windows Version Administration Guide IBM IBM Spectrum Protect HSM for Windows Version 8.1.0 Administration Guide IBM IBM Spectrum Protect HSM for Windows Version 8.1.0 Administration Guide IBM Note: Before you use this information and the product

More information

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Document ID: 13-603114 Release 2.2 July 2008 Issue No.1 2008 Avaya Inc. All Rights Reserved. Notice While reasonable

More information

Tape Channel Analyzer Windows Driver Spec.

Tape Channel Analyzer Windows Driver Spec. Tape Channel Analyzer Windows Driver Spec. 1.1 Windows Driver The Driver handles the interface between the Adapter and the Adapter Application Program. The driver follows Microsoft Windows Driver Model

More information

User Databases. ACS Internal Database CHAPTER

User Databases. ACS Internal Database CHAPTER CHAPTER 12 The Cisco Secure Access Control Server Release 4.2, hereafter referred to as ACS, authenticates users against one of several possible databases, including its internal database. You can configure

More information

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION I. Purpose To provide guidance to schools and administrative offices regarding the maintenance, retention,

More information

IBM Content Manager Compliance Solution with IBM System Storage N Series SnapLock devices

IBM Content Manager Compliance Solution with IBM System Storage N Series SnapLock devices IBM Content Manager Compliance Solution with IBM System Storage N Series SnapLock devices Author: Raghuram Tadipatri Senior Manager, IBM tadipatr@us.ibm.com Dated: 5/20/2013 Copyright IBM (2013). This

More information

FIA Electronic Give-Up Agreement System (EGUS) Version 2.6

FIA Electronic Give-Up Agreement System (EGUS) Version 2.6 FIA Electronic Give-Up Agreement System (EGUS) Version 2.6 User Guide 18 January 2010 Copyright Unpublished work 2007-2010 Markit Group Limited This work is an unpublished, copyrighted work and contains

More information

CA EPIC for z/vse. Release Notes. r5.2

CA EPIC for z/vse. Release Notes. r5.2 CA EPIC for z/vse Release Notes r5.2 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

HP Storage Provisioning Manager HP 3PAR StoreServ Peer Persistence

HP Storage Provisioning Manager HP 3PAR StoreServ Peer Persistence Technical white paper HP Storage Provisioning Manager HP 3PAR StoreServ Peer Persistence Handling HP 3PAR StoreServ Peer Persistence with HP Storage Provisioning Manager Click here to verify the latest

More information

MANAGING AN FLR-ENABLED NAS ENVIRONMENT WITH THE EMC FLR TOOLKIT ON VNXe

MANAGING AN FLR-ENABLED NAS ENVIRONMENT WITH THE EMC FLR TOOLKIT ON VNXe White Paper MANAGING AN FLR-ENABLED NAS ENVIRONMENT WITH THE EMC FLR TOOLKIT ON VNXe Overview Abstract EMC File-Level Retention (FLR) is a feature that provides a software infrastructure for users to secure

More information

File Organization Sheet

File Organization Sheet File Organization Sheet 1. What are File Structures? A File Structure is a combination of representations for data in files and of operations for accessing the data. A File Structure allows applications

More information

End User Licence. PUBLIC 31 January 2017 Version: T +44 (0) E ukdataservice.ac.uk

End User Licence. PUBLIC 31 January 2017 Version: T +44 (0) E ukdataservice.ac.uk End User Licence PUBLIC 31 January 2017 Version: 07.00 T +44 (0)1206 872572 E susan@essex.ac.uk ukdataservice.ac.uk Contents 1. End User Licence (EUL) Text... 2 2. End User Licence (EUL) Summary text...

More information

Company System Administrator (CSA) User Guide

Company System Administrator (CSA) User Guide BMO HARRIS ONLINE BANKING SM FOR SMALL BUSINESS Company System Administrator (CSA) User Guide Copyright 2011 BMO Harris Bank N.A. TABLE OF CONTENTS WELCOME... 1 Who should use this guide... 1 What it covers...

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

WHITEPAPER RETAINING USER DATA WHITEPAPER RETAINING USER DATA

WHITEPAPER RETAINING USER DATA WHITEPAPER RETAINING USER DATA TM WHITEPAPER RETAINING USER DATA WHITEPAPER RETAINING USER DATA Content Page Overview...03 The Frozen Environment...04 Storage Solutions...05 Redirecting User Profiles and Folders using Data Igloo...06

More information

CA TLMS Tape Management

CA TLMS Tape Management CA TLMS Tape Management TLMS_User_ENU Release 12.6 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Enterprise Vault Best Practices

Enterprise Vault Best Practices Enterprise Vault Best Practices Implementing SharePoint Archiving This document contains information on best practices when implementing Enterprise Vault for SharePoint If you have any feedback or questions

More information

Automation Change Management for Regulated Industries

Automation Change Management for Regulated Industries Automation Change Management for Regulated Industries Achieving Part 11 Compliance A White Paper Synopsis This whitepaper provides information related to FDA regulation 21 CFR Part 11 (Part 11) for organizations

More information

DELL EMC DATA DOMAIN RETENTION LOCK SOFTWARE

DELL EMC DATA DOMAIN RETENTION LOCK SOFTWARE WHITEPAPER DELL EMC DATA DOMAIN RETENTION LOCK SOFTWARE A Detailed Review ABSTRACT Enterprises continue to see an exponential growth in the structured and unstructured data that is proliferating across

More information

VSC-PCTS2003 TEST SUITE TIME-LIMITED LICENSE AGREEMENT

VSC-PCTS2003 TEST SUITE TIME-LIMITED LICENSE AGREEMENT VSC-PCTS2003 TEST SUITE TIME-LIMITED LICENSE AGREEMENT Notes These notes are intended to help prospective licensees complete the attached Test Suite Time-Limited License Agreement. If you wish to execute

More information

DFSMSdss Best Practices in an SMS Environment

DFSMSdss Best Practices in an SMS Environment DFSMSdss Best Practices in an SMS Environment Steve Huber and Jeff Suarez IBM Corporation shuber@us.ibm.com jrsuarez@us.ibm.com August 5, 2010 Session 8049 Legal Disclaimer NOTICES AND DISCLAIMERS Copyright

More information

DEPARTMENT OF LICENSING AND REGULATORY AFFAIRS PUBLIC SERVICE COMMISSION BASIC LOCAL EXCHANGE SERVICE CUSTOMER MIGRATION

DEPARTMENT OF LICENSING AND REGULATORY AFFAIRS PUBLIC SERVICE COMMISSION BASIC LOCAL EXCHANGE SERVICE CUSTOMER MIGRATION DEPARTMENT OF LICENSING AND REGULATORY AFFAIRS PUBLIC SERVICE COMMISSION BASIC LOCAL EXCHANGE SERVICE CUSTOMER MIGRATION (By authority conferred on the public service commission by sections 202 and 213

More information

21 CFR Part 11 FAQ (Frequently Asked Questions)

21 CFR Part 11 FAQ (Frequently Asked Questions) 21 CFR Part 11 FAQ (Frequently Asked Questions) and Roles and Responsibilities for Assessment of METTLER TOLEDO STAR e Software Version 16.00, including: - 21 CFR 11 Compliance software option for Compliance

More information

Standard CIP 007 4a Cyber Security Systems Security Management

Standard CIP 007 4a Cyber Security Systems Security Management A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-4a 3. Purpose: Standard CIP-007-4 requires Responsible Entities to define methods, processes, and procedures for

More information

SAS Data Libraries. Definition CHAPTER 26

SAS Data Libraries. Definition CHAPTER 26 385 CHAPTER 26 SAS Data Libraries Definition 385 Library Engines 387 Library Names 388 Physical Names and Logical Names (Librefs) 388 Assigning Librefs 388 Associating and Clearing Logical Names (Librefs)

More information

Compliance of Shimadzu Total Organic Carbon (TOC) Analyzer with FDA 21 CFR Part 11 Regulations on Electronic Records and Electronic Signatures

Compliance of Shimadzu Total Organic Carbon (TOC) Analyzer with FDA 21 CFR Part 11 Regulations on Electronic Records and Electronic Signatures NT1D-1275 Compliance of Shimadzu Total Organic Carbon (TOC) Analyzer with FDA 21 CFR Part 11 Regulations on Electronic Records and Electronic Signatures TOC-Control L Ver.1 / LabSolutions DB/CS Ver.6 Part

More information

Standard CIP 007 3a Cyber Security Systems Security Management

Standard CIP 007 3a Cyber Security Systems Security Management A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3a 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for

More information

An Oracle White Paper April How to Use Tape Tiering Accelerator (Automatically Linked Partition)

An Oracle White Paper April How to Use Tape Tiering Accelerator (Automatically Linked Partition) An Oracle White Paper April 2014 How to Use Tape Tiering Accelerator (Automatically Linked Partition) Introduction... 1 New Host Interface Commands... 3 Locate ALP... 3 Set ALP Mode... 3 Set Writable ALPs...

More information

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

NTP Software VFM Administration Web Site

NTP Software VFM Administration Web Site NTP Software VFM Administration Web Site User Manual Version 7.1 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective. Upon completion of

More information

Governance, Risk, and Compliance Controls Suite. Release Notes. Software Version

Governance, Risk, and Compliance Controls Suite. Release Notes. Software Version Governance, Risk, and Compliance Controls Suite Release Notes Software Version 7.2.2.1 Governance, Risk, and Compliance Controls Suite Release Notes Part No. AG008-7221A Copyright 2007, 2008, Oracle Corporation

More information

LIST RENTAL CONTRACT

LIST RENTAL CONTRACT LIST RENTAL CONTRACT After execution of this Contract and upon receipt of order(s) from List Enduser or their list broker that is acceptable to MSLA INTERNATIONAL and contractual affiliates ( List Owners

More information

System Assessment Report Relating to Electronic Records and Electronic Signatures; Final Rule, 21 CFR Part 11. System: tiamo 2.3

System Assessment Report Relating to Electronic Records and Electronic Signatures; Final Rule, 21 CFR Part 11. System: tiamo 2.3 Page 1 /14 System Assessment Report Relating to Electronic Records and Electronic Signatures; Final le, 21 CFR Part 11 System: tiamo 23 052011 / doe Page 2 /14 1 Procedures and Controls for Closed Systems

More information

Introduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault

Introduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault Introduction What is Microsoft Data Protection Manager (DPM)? The Microsoft Data Protection Manager is a member of the Microsoft System Center family of management products. DPM provides continuous data

More information

WebSphere Application Server V7: Administration Consoles and Commands

WebSphere Application Server V7: Administration Consoles and Commands Chapter 5 of WebSphere Application Server V7 Administration and Configuration Guide, SG24-7615 WebSphere Application Server V7: Administration Consoles and Commands WebSphere application server properties

More information

C Q&As. IBM Tivoli Storage Manager V7.1 Implementation. Pass IBM C Exam with 100% Guarantee

C Q&As. IBM Tivoli Storage Manager V7.1 Implementation. Pass IBM C Exam with 100% Guarantee C2010-511 Q&As IBM Tivoli Storage Manager V7.1 Implementation Pass IBM C2010-511 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money

More information

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3 ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic

More information

Certified Professional in Supply Management Application for Recertification

Certified Professional in Supply Management Application for Recertification Certified Professional in Supply Management Application for Recertification For use with applications beginning March 1, 2017. Recertification Requirements Individuals who have earned their CPSM designation

More information

Manage Authorization Policies and Profiles

Manage Authorization Policies and Profiles Cisco ISE Authorization Policies, on page 1 Cisco ISE Authorization Profiles, on page 1 Default Authorization Policies, on page 5 Configure Authorization Policies, on page 6 Permissions for Authorization

More information

Question No : 1 Which three statements are true regarding persistent lightweight jobs? (Choose three.)

Question No : 1 Which three statements are true regarding persistent lightweight jobs? (Choose three.) Volume: 183 Questions Question No : 1 Which three statements are true regarding persistent lightweight jobs? (Choose three.) A. The user cannot set privileges on persistent lightweight jobs. B. The use

More information

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT SUBCHAPTER 2.5. VOLUNTARY CERTIFIED ACCESS SPECIALIST PROGRAM Program

More information

MySign Electronic Signature

MySign Electronic Signature MySign Electronic Signature Advisory Circular Compliance Matrix FAA AC 120 78A Dated 06/22/16 1 Table of Contents Table of Contents 2 Purpose 3 FAA Acceptance 3 Non Requirement for Approval 3 2-2 Electronic

More information

What Every Storage Administrator Should Do For YOUR DB2 Environment

What Every Storage Administrator Should Do For YOUR DB2 Environment What Every Storage Administrator Should Do For YOUR DB2 Environment John Iczkovits IBM March 15, 2012 Session Number 10475 10475: What Every Storage Administrator Should Do For YOUR DB2 Environment Storage

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

CIP Cyber Security Physical Security of BES Cyber Systems

CIP Cyber Security Physical Security of BES Cyber Systems A. Introduction 1. Title: Cyber Security Physical Security of BES Cyber Systems 2. Number: CIP-006-5 3. Purpose: To manage physical access to BES Cyber Systems by specifying a physical security plan in

More information

Integrity 10. Curriculum Guide

Integrity 10. Curriculum Guide Integrity 10 Curriculum Guide Live Classroom Curriculum Guide Integrity 10 Workflows and Documents Administration Training Integrity 10 SCM Administration Training Integrity 10 SCM Basic User Training

More information

IBM. OA VTAM 3270 Intrusion Detection Services - Overview, Considerations, and Assessment (Prerequisite) z/os Communications Server

IBM. OA VTAM 3270 Intrusion Detection Services - Overview, Considerations, and Assessment (Prerequisite) z/os Communications Server z/os Communications Server IBM OA49911 - VTAM 3270 Intrusion Detection Services - Overview, Considerations, and Assessment (Prerequisite) Version 2 Release 2 Note: Links to related publications are from

More information

Reliability Standard Audit Worksheet 1

Reliability Standard Audit Worksheet 1 Reliability Standard Audit Worksheet 1 CIP-006-6 Cyber Security Physical Security of BES Cyber Systems This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity:

More information