AUTOMATED QUOTA MANAGEMENT AND FILE SCREENING
|
|
- Cameron Gray
- 6 years ago
- Views:
Transcription
1 StorageCentral: Architecture Overview AUTOMATED QUOTA MANAGEMENT AND FILE SCREENING For Windows Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS 1 product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation in the US and/or other countries. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Specifications and product offerings subject to change without notice. Printed in USA and the EU. April 2004.
2 TABLE OF CONTENTS TABLE OF CONTENTS...2 architecture overview...3 Agents...3 Collectors...3 Management Console...4 Managed objects...4 Policies...4 Policy management and propagation...5 Computer policies...5 Allocation Design Overview...6 Allocation (Quota Management) Flow:...6 Allocation Functional Overview...6 File Groups...6 Policies and Managed Objects...7 Reporting...8 Report definitions...8 Report sets...8 Running reports...8 Scheduling Reports with Collectors...8 Active HTML reports...9 Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 2
3 ARCHITECTURE OVERVIEW VERITAS StorageCentral uses a distributed architecture that scales throughout enterprises small and large with a minimal impact on existing resources. The three basic components of this architecture are agents, collectors, and consoles. AGENTS Agents are small software components that provide the core functionality of StorageCentral. Agents are installed and executed on any Windows 2003, Windows 2000, or Windows NT 4 server for StorageCentral quota management or file screening. Agents run as a background service and are managed from a StorageCentral console. Agents are the primary workhorses of the StorageCentral product. However, Agents do not contain a user interface of any kind. Instead, they run entirely in the background, accepting instructions from the StorageCentral management console. COLLECTORS The reporting function that comes with StorageCentral may be used to report on large numbers of files in a production environment. The process of gathering and processing the file information can be time-consuming if a significantly large number of files are being reported on. In some situations the StorageCentral collector may require a dedicate system for a report execution. The StorageCentral collector can be installed on a standalone system or on a management workstation, allowing offloaded report processing. Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 3
4 MANAGEMENT CONSOLE The StorageCentral management console controls all operational aspects of StorageCentral. The console is a snap-in to the Microsoft Management Console. Customers can deploy one or more management consoles to manage and monitor deployed StorageCentral agents and report collectors. MANAGED OBJECTS A managed object is the basic unit of management for StorageCentral. Managed objects may be a file, folder, share, or partition. With Active Directory Edition, Organization Units (OUs), sites, and domains can also be managed objects. Managed objects have a space allocation or a file screening policy associations. StorageCentral applies policies to managed objects. For example, a policy prevents MP3 files from being saved. A StorageCentral management console can be used to associate that policy to a folder. The folder is now a StorageCentral managed object. StorageCentral will prevent MP3 files from being saved to that folder. POLICIES Policies can contain both space allocation (quota management) and file screening properties, and implement storage management policies. By themselves, policies have no effect. When applied to eligible file, folder, share, or partition, policies define managed objects. Policies can act as templates, applying the same business practices to multiple managed objects. Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 4
5 POLICY MANAGEMENT AND PROPAGATION When a policy is applied to a managed object, the properties are copied to the managed object. If the policy is changed in the future, StorageCentral by default copies changes to associated managed objects. A StorageCentral policy can be configured not to automatically propagate policy changes. In some cases, folders and/or users can be disassociated from a policy and will continue to exist as StorageCentral managed objects, via the management console interface. COMPUTER POLICIES Computer policies are available with StorageCentral Active Directory Edition and apply only to servers. Computer policies specify the systems that the policy will apply to, the folders on each system that the policy will apply to, and actions such as auto detecting disks, folders, and folder policies. Computer policies specify server-wide policies and apply them with a single policy. Computer policies consistently apply policies to new systems. By applying the computer policy to an Active Directory Organizational Unit, StorageCentral ensures that any system defined to that Organizational Unit will automatically receive the correct policies. Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 5
6 ALLOCATION DESIGN OVERVIEW Space allocation is physically implemented as a Windows service called QuotaAdvisor server. The service receives instructions from the StorageCentral management console. The service does not actually implement allocation policies; instead, it creates and manages policies for users. Policies are enforced by a patented filter driver (TruStor), file name QAFilter.sys stored in %systemroot%\system32\drivers\qafilter.sys. The filter driver is viewable via Device Manager and selecting the option to view hidden devices. ALLOCATION (QUOTA MANAGEMENT) FLOW: StorageCentral management console communicates with the QAServer service to create or modify space allocation settings. QAServer service communicates with the filter driver to create or modify allocations as instructed by the management console. In effect, the service acts as a front door to the filter. Filter driver monitors file I/O and adjusts space usage information accordingly. Allocation values and current usage are stored in a local data file, which resides in server memory. o o o o Filter drivers responds to the QAServer service to modify and display allocation information. The filter triggers QAServer to take alarm actions when allocation usage exceeds the configured alarm threshold. Allocation information is persistent, and is stored on each volume. This technique provides excellent scalability, and makes StorageCentral cluster-compatible. StorageCentral reads allocation information from the volume when Windows mounts the volume at system startup. The driver filter enforces allocation policy limits. QAServer performs actions as configured when triggered by the filter. Actions are stored in a local data file. ALLOCATION FUNCTIONAL OVERVIEW Space allocation is an object-based process. Administrators use the StorageCentral management console to define managed objects, which can be files, folders, logical drives, or file shares. With Active Directory Edition, managed objects can also represent Organizational Units (OUs), sites, or domains. Space allocation policies define quotas. Policies can define an active limitations, such as preventing users from storing more than 10MB. Policies are applied to managed objects, and become a governing force for how those managed objects behave. From a design standpoint, the StorageCentral components monitor managed objects; if anything happens to a file or folder that isn t part of a managed object, StorageCentral ignores it. File Groups StorageCentral comes with predefined file groups. Customers can modify predefined file groups and create new file groups. File groups provide an easy way to define a related set of files and/or file types. For example, a file group named graphic files 2 may include unauthorized file types of.gif and.jpg, while containing authorized file types.tif and.bmp. File groups can contain a list of authorized types, unauthorized types, or both. Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 6
7 Policies and Managed Objects File blocking is implemented through policies, just like disk space allocation. A policy can include both space allocation (quotas) and file blocking policies. Policies are applied to managed objects, and enforce file placement (or allocation) within managed objects. File blocking policies have properties. When file blocking policies are created, file groups are specified for the policy. And, file groups can include both authorized file types and unauthorized file types. File blocking policies can be active or passive. In passive mode, alarms are activated when the policy is violated but the file I/O is allowed to continue. Active policies stop files that violate the policy from being allocated in the managed object. File blocking policies by default use the file name extension to define the file type. File blocking policies can be configured to identify file type based on the content of the file. Users trying to bypass policy may try to rename their files for example, renaming an unauthorized JPG file with a DOC extension. By configuring the blocking policy to check file content, StorageCentral stops users and blocks unauthorized files even if they have been renamed. StorageCentral stores file type signatures in the system Registry. Some file types include multiple signatures (MP3, for example), reflecting the changing content types of those files. These signatures are used for content checking, when that option is selected in a policy. Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 7
8 REPORTING REPORT DEFINITIONS Report definitions are templates that determine what a report will look like, and what data the report will display. In this way, report definitions act as a starting point for report sets. Report definitions are batched together in to a report set. In report sets, definitions can be modified without modifying the original definition. Report definitions draw data from server file system, from the StorageCentral quota database, and the StorageCentral trend databases, enabling comprehensive customizable reporting capabilities. REPORT SETS A report set is a collection of built-in and custom report definitions. A report set batches one or more report definitions for preparation as part of a common pass of a file system. A report set can apply filters to the reports it contains. For example, a report set may filter on a specific folder \Users\ on a particular server. The report set will limit the report to data in the filtered object, enabling reports on specific servers or other managed objects. Report sets also define output format for the report data, such as an HTML file, a CSV file, and so on. RUNNING REPORTS Reports can be scheduled or run interactively. Report sets can be run interactively, StorageCentral processes the report on demand. Running interactive reports makes sense for reports with limited scope and retrieving less than 100,000 files. Interactive reports make sense when extracting from one StorageCentral database, since the data is easier to collect that information about files spread across multiple servers. Custom reports can be run without performing any configuration tasks, making it easy to use StorageCentral with an auditing requirement. Running a report is as easy as selecting a drive, file, or folder as the target of a report - without configuring any managed objects within StorageCentral. StorageCentral uses a process called RapidScan to create file reports. Rather than reading each file individually to determine its file type, size, last modification date, and other information, RapidScan retrieves the information from the file system s master file table. This design allows StorageCentral to quickly retrieve file information from a centralized location on each volume, imposing a minimum processor overhead. RapidScan is utilized when reports are executed at the volume level. Data collection in StorageCentral is distributed; report sets that reports on different servers spawn a process on each server to collect the necessary information. That information is reported back to the reporting computer for compilation, earlier described as the collector. SCHEDULING REPORTS WITH COLLECTORS Some reports can take a very long time to run, simply because they have to collect and format a lot of information. For example, generating a list of all BMP files located on 100 different file servers might take a while, especially if the servers contain a lot of BMP files. StorageCentral data collection and report generation runs at a low priority. Rather than tying up a management console for long reporting runs, schedule the report to run at a designated time (like overnight). Each computer has a separate agent to collect local data. StorageCentral uses a collector to Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 8
9 create and generate report. Designated systems with report collectors perform the time consuming function of sorting and generating reports. ACTIVE HTML REPORTS One of the most useful features in StorageCentral is the interactive HTML report, which can be viewed in a Web browser. All StorageCentral reports can be generated in Active HTML format, making it easy to create a Webbased reporting solution. Reports in this format can easily be saved in a web portal that is available to all users for storage reporting. As shown below, Active HTML reports offer easy-to-read charts and graphs, as well as detail grids. ActiveX HTML Reports note the drill-down hot link in the Category column Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 9
10 Many summary-style reports offer the ability to automatically create drill-down reports. For example, in the above screen capture, the Category column includes hot-linked items. Clicking one automatically creates a report for that category, as shown below: Detail reports like the one above allow users and administrators to examine individual files and folders. As shown below, right-clicking any file provides a number of options: Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 10
11 Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 11
12 Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 12
VERITAS StorageCentral 5.2
VERITAS StorageCentral 5.2 Release Notes Windows Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes no warranty of any kind
More informationVERITAS StorageCentral 5.2
VERITAS StorageCentral 5.2 Installation Instructions Windows Introduction to the Installation Process The steps below summarize what you must do to install StorageCentral on your system. Step To do this
More informationVERITAS Storage Foundation 4.0 TM for Databases
VERITAS Storage Foundation 4.0 TM for Databases Powerful Manageability, High Availability and Superior Performance for Oracle, DB2 and Sybase Databases Enterprises today are experiencing tremendous growth
More informationFSRM (File Server Resource Management)
2012 FSRM (File Server Resource Management) Prepared By: Dharak Adroja Project Guide: Prof. Heera Bamaniya Acknowledgement I take this opportunity to express my indebtedness to all those who directly helped
More informationNETWRIX PASSWORD EXPIRATION NOTIFIER
NETWRIX PASSWORD EXPIRATION NOTIFIER ADMINISTRATOR S GUIDE Product Version: 3.3 January 2013 Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationAchieving Network Storage Optimization, Security, and Compliance Using File Reporter
Information Management & Governance Achieving Network Storage Optimization, Security, and Compliance Using File Reporter Table of Contents page Detailed Network Storage File Reporting and Analysis...2
More informationParallels Virtuozzo Containers 4.6 for Windows
Parallels Parallels Virtuozzo Containers 4.6 for Windows Deploying Microsoft Clusters Copyright 1999-2010 Parallels Holdings, Ltd. and its affiliates. All rights reserved. Parallels Holdings, Ltd. c/o
More informationParallels Containers for Windows 6.0
Parallels Containers for Windows 6.0 Deploying Microsoft Clusters June 10, 2014 Copyright 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse
More informationDefendX Software Control-QFS for Isilon Installation Guide
DefendX Software Control-QFS for Isilon Installation Guide Version 8.6 This guide details the method for the installation and initial configuration of DefendX Software Control-QFS for NAS, Isilon Edition,
More informationParallels Virtuozzo Containers 4.6 for Linux Readme
Parallels Virtuozzo Containers 4.6 for Linux Readme This document provides the first-priority information about Parallels Virtuozzo Containers 4.6 for Linux and supplements the included documentation.
More informationUser Guide HelpSystems Insite 1.6
User Guide HelpSystems Insite 1.6 Copyright Copyright HelpSystems, LLC. HelpSystems Insite, OPAL, OPerator Assistance Language, Robot ALERT, Robot AUTOTUNE, Robot CLIENT, Robot CONSOLE, Robot CORRAL, Robot
More informationOrgPublisher 8.1 PluginX Implementation Guide
OrgPublisher 8.1 PluginX Implementation Guide Introduction Table of Contents Introduction... 3 OrgPublisher Architecture Overview... 4 OrgPublisher Architecture Components... 4 Data Source... 5 Org Chart
More informationManaging Oracle Real Application Clusters. An Oracle White Paper January 2002
Managing Oracle Real Application Clusters An Oracle White Paper January 2002 Managing Oracle Real Application Clusters Overview...3 Installation and Configuration...3 Oracle Software Installation on a
More informationNETWRIX GROUP POLICY CHANGE REPORTER
NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationOvation Process Historian
Ovation Process Historian Features Designed to meet the needs of precision, performance, scalability and historical data management for the Ovation control system Collects historical data of Ovation process
More informationTechnical What s New. Autodesk Vault Manufacturing 2010
Autodesk Vault Manufacturing 2010 Contents Welcome to Autodesk Vault Manufacturing 2010... 2 Vault Client Enhancements... 2 Autoloader Enhancements... 2 User Interface Update... 3 DWF Publish Options User
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationNetwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 6.5 9/26/2014 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationNetwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationNetIQ Secure Configuration Manager Installation Guide. October 2016
NetIQ Secure Configuration Manager Installation Guide October 2016 Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use restrictions, U.S. Government restricted
More informationNETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 4.0 June 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationWindows Server 2003 Network Administration Goals
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management
More informationMessaging Service Management and Analysis
Messaging Service Management and Analysis Hypersoft OmniAnalyser delivers to enterprise customers detailed and comprehensive information on the quality of service, workload, usage and performance of their
More informationWHITE PAPER: ENTERPRISE SOLUTIONS
WHITE PAPER: ENTERPRISE SOLUTIONS Integrating Network Appliance Snapshot and SnapRestore with Veritas NetBackup in an Oracle Backup Environment (Now from Symantec ) White Paper: Symantec Enterprise Solutions
More informationService Manager. Ops Console On-Premise User Guide
Service Manager powered by HEAT Ops Console On-Premise User Guide 2017.2.1 Copyright Notice This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates
More informationConfiguring File Server Resource Manager (FSRM)
Configuring File Server Resource Manager (FSRM) LESSON 5 70-411 EXAM OBJECTIVE Objective 2.2 Configure File Server Resource Manager (FSRM). This objective may include but is not limited to: install the
More informationDELL EMC VMAX UNISPHERE 360
DELL EMC VMAX UNISPHERE 360 ABSTRACT Using Unisphere 360 to consolidate the management of VMAX storage system offers many benefits. This management interface offers a single interface where all enrolled
More informationOMi Management Pack for Microsoft SQL Server. Software Version: For the Operations Manager i for Linux and Windows operating systems.
OMi Management Pack for Microsoft Software Version: 1.01 For the Operations Manager i for Linux and Windows operating systems User Guide Document Release Date: April 2017 Software Release Date: December
More informationVersion Monitoring Agent User s Guide SC
Tivoli IBM Tivoli Advanced Catalog Management for z/os Version 02.01.00 Monitoring Agent User s Guide SC23-7974-00 Tivoli IBM Tivoli Advanced Catalog Management for z/os Version 02.01.00 Monitoring Agent
More informationUsing the Cisco NAC Profiler Endpoint Console
CHAPTER 15 Topics in this chapter include: Overview, page 15-1 Display Endpoints by Profile, page 15-4 Display Endpoints by Device Port, page 15-9 Unauthorized Endpoints, page 15-12 Endpoint Directory
More informationINTRODUCING VERITAS BACKUP EXEC SUITE
INTRODUCING VERITAS BACKUP EXEC SUITE January 6, 2005 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Managing More Storage with Fewer Resources...3 VERITAS Backup Exec Suite...3 Continuous Data Protection...
More informationDefendX Software Control-Audit for Hitachi Installation Guide
DefendX Software Control-Audit for Hitachi Installation Guide Version 4.1 This guide details the method for the installation and initial configuration of DefendX Software Control-Audit for NAS, Hitachi
More informationINSTALL GUIDE BIOVIA INSIGHT 2016
INSTALL GUIDE BIOVIA INSIGHT 2016 Copyright Notice 2015 Dassault Systèmes. All rights reserved. 3DEXPERIENCE, the Compass icon and the 3DS logo, CATIA, SOLIDWORKS, ENOVIA, DELMIA, SIMULIA, GEOVIA, EXALEAD,
More informationMicrosoft SQL Server Fix Pack 15. Reference IBM
Microsoft SQL Server 6.3.1 Fix Pack 15 Reference IBM Microsoft SQL Server 6.3.1 Fix Pack 15 Reference IBM Note Before using this information and the product it supports, read the information in Notices
More informationNTP Software QFS for Isilon
NTP Software QFS for Isilon Installation Guide Version 8.5 This guide details the method for the installation and initial configuration of NTP Software QFS for NAS, Isilon Edition, from an administrator
More informationMicrosoft Windows Server Administration Fundamentals. Download Full Version :
Microsoft 98-365 Windows Server Administration Fundamentals Download Full Version : http://killexams.com/pass4sure/exam-detail/98-365 installation from a master computer to the destination computers. The
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release
More informationCrystal Enterprise. Overview. Contents. Installation FAQ: Crystal Enterprise 9 & 10
: Crystal Enterprise 9 & 10 Overview Contents This document has been compiled in an effort to assist you both in determining installation requirements for your Crystal Enterprise (CE) installation as well
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release
More informationComparison: Microsoft Logical Disk Manager (LDM) and VERITAS Volume Manager
Comparison: Microsoft Logical Disk Manager (LDM) and VERITAS Volume Manager V E R I T A S W H I T E P A P E R for Microsoft Windows Table of Contents Online Storage Management Challenge.......................................................................................................................1
More informationNTP Software File Auditor for Windows Edition
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
More informationVeritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2
Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Last updated: 2018-09-19 Legal Notice Copyright 2017
More informationMaximizer CRM. Customer Service Maximizer CRM 2017 VERSION COMPARISON FOR WEB ACCESS (EMEA) Maximizer CRM 2016/R2.
VERSION COMPARISON FOR WEB ACCESS (EMEA) Sales Support multiple sales processes Track opportunity stage age Track overall opportunity age Monitor progress by comparing stage age with target age Opportunity
More informationVeritas NetBackup for Lotus Notes Administrator's Guide
Veritas NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 8.0 Veritas NetBackup for Lotus Notes Administrator's Guide Document version: 8.0 Legal Notice Copyright 2016
More informationDell Storage vsphere Web Client Plugin. Version 4.0 Administrator s Guide
Dell Storage vsphere Web Client Plugin Version 4.0 Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION:
More informationEbook : Overview of application development. All code from the application series books listed at:
Ebook : Overview of application development. All code from the application series books listed at: http://www.vkinfotek.com with permission. Publishers: VK Publishers Established: 2001 Type of books: Develop
More informationCentral Administration Console Installation and User's Guide
IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Central Administration Console Installation and User's Guide SC27-2808-04 IBM Tivoli Storage Manager FastBack for Workstations Version
More informationReport Viewer Comparison
Report Viewer Comparison Overview Contents BusinessObjects Enterprise and Crystal Reports Server allow viewing and exporting of reports over the web using two types of viewers: zeroclient and thin client
More informationBusiness Intelligence Launch Pad User Guide SAP BusinessObjects Business Intelligence Platform 4.1 Support Package 1
Business Intelligence Launch Pad User Guide SAP BusinessObjects Business Intelligence Platform 4.1 Support Package 1 Copyright 2013 SAP AG or an SAP affiliate company. All rights reserved. No part of this
More informationsforce Web Services Enterprise API sforce Object Query Language sforce Custom Objects... 40
Release Notes Winter 04 Major Announcements Dashboards... 2 Workflow Automation... 8 Advanced Page Layout Wizard... 12 Dynamic Page Layouts and Field-Level Security... 14 Team-Based Account Management...
More informationAgent vs Agentless Log Collection
Agent vs Agentless Log Collection Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for direct, or indirect
More informationForeScout Extended Module for Qualys VM
ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...
More informationDeploying Lightspeed User Agent v
Deploying Lightspeed User Agent v2.01.14 The LS User Agent can be deployed via most application deployment utilities. This guide will focus on Group Policy Software installation policies. Please read over
More informationXcalibur Global Version Rev. 2 Administrator s Guide Document Version 1.0
Xcalibur Global Version 1.1 - Rev. 2 Administrator s Guide Document Version 1.0 September 2006 COPYRIGHT NOTICE 2006 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd. All rights reserved. This product
More informationRevision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide
Revision A McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationCentrify Infrastructure Services
Centrify Infrastructure Services License Management Administrator s Guide December 2018 (release 18.11) Centrify Corporation Legal Notice This document and the software described in this document are furnished
More informationOne Identity Active Roles 7.2. Product Overview Guide
One Identity Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
More informationData Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION
Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION 1 TABLE OF CONTENTS VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS...1
More informationVeritas Enterprise Vault PST Migration 12.2
Veritas Enterprise Vault PST Migration 12.2 Veritas Enterprise Vault: PST Migration Last updated: 2017-08-10. Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas
More informationTable Of Contents INTRODUCTION... 6 USER GUIDE Software Installation Installing MSI-based Applications for Users...9
Table Of Contents INTRODUCTION... 6 USER GUIDE... 8 Software Installation... 8 Installing MSI-based Applications for Users...9 Installing EXE-based Applications for Users...10 Installing MSI-based Applications
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationIM: Symantec Security Information Manager Patch 4 Resolved Issues
IM: Symantec Security Information Manager 4.7.2 Patch 4 Resolved Symantec Security Information Manager 4.7.2 Patch 4 Resolved The software described in this book is furnished under a license agreement
More informationSmart-X Software Solutions SecReport Enterprise User Guide
Smart-X Software Solutions SecReport Enterprise User Guide Table of Contents: WELCOME 4 FEATURES AND CAPABILITIES 5 CONTENTS AND REQUIREMENTS 7 CONTENTS 7 REQUIREMENTS 8 LICENSING AND INSTALLATION 10 EVALUATION
More informationNew Features Summary PowerDesigner 15.2
New Features Summary PowerDesigner 15.2 Windows DOCUMENT ID: DC10077-01-1520-01 LAST REVISED: February 2010 Copyright 2010 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software
More informationIBM Internet Security Systems Proventia Management SiteProtector
Supporting compliance and mitigating risk through centralized management of enterprise security devices IBM Internet Security Systems Proventia Management SiteProtector Highlights Reduces the costs and
More informationIBM Monitoring Agent for Citrix Virtual Desktop Infrastructure 7.2 FP3. User's Guide IBM SC
IBM Monitoring Agent for Citrix Virtual Desktop Infrastructure 7.2 FP3 User's Guide IBM SC14-7487-02 IBM Monitoring Agent for Citrix Virtual Desktop Infrastructure 7.2 FP3 User's Guide IBM SC14-7487-02
More informationDefendX Software Control-QFS for EMC Installation Guide
DefendX Software Control-QFS for EMC Installation Guide Version 8.6 This guide provides a short introduction to the installation and initial configuration of DefendX Software Control-QFS for NAS, EMC Edition,
More informationLIVE PLAYER. VR-5033 (Applicable to VR-5000 software version )
LIVE PLAYER VR-5033 (Applicable to VR-5000 software version 2.07.00) TABLE OF CONTENTS FOREWORD... ii 1. INSTALLATION... 1 1.1 Requirements... 1 1.2 Software Installation... 1 2. PLAYER CONFIGURATION...
More informationAdobe LiveCycle ES and the data-capture experience
Technical Guide Adobe LiveCycle ES and the data-capture experience Choosing the right solution depends on the needs of your users Table of contents 2 Rich application experience 3 Guided experience 5 Dynamic
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...
More informationVector Issue Tracker and License Manager - Administrator s Guide. Configuring and Maintaining Vector Issue Tracker and License Manager
Vector Issue Tracker and License Manager - Administrator s Guide Configuring and Maintaining Vector Issue Tracker and License Manager Copyright Vector Networks Limited, MetaQuest Software Inc. and NetSupport
More informationNetWrix Account Lockout Examiner Version 4.0 User Guide
NetWrix Account Lockout Examiner Version 4.0 User Guide Table of Contents Introduction... 1 Product Architecture... 1 About Security Roles... 2 Default Installation Folders, Virtual Directory, and Startup
More informationIBM Global Technology Services May IBM Internet Security Systems Proventia Management SiteProtector system version 2.0, SP 7.
IBM Global Technology Services May 2008 IBM Internet Security Systems Proventia Management SiteProtector system version 2.0, SP 7.0 Preview Guide Page 1 Executive Summary IBM Internet Security Systems
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Veritas Storage Foundation 5.0 for Windows brings advanced online storage management to Microsoft Windows Server environments.
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationGuide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems
Guide to Computer Forensics and Investigations Fourth Edition Chapter 6 Working with Windows and DOS Systems Understanding Disk Drives Disk drives are made up of one or more platters coated with magnetic
More informationVeritas System Recovery 16 Management Solution Administrator's Guide
Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo
More informationSimplified Storage Migration for Microsoft Cluster Server
Simplified Storage Migration for Microsoft Cluster Server Using VERITAS Volume Manager for Windows 2000 with Microsoft Cluster Server V E R I T A S W H I T E P A P E R June 2001 Table of Contents Overview...................................................................................1
More informationQlik Sense Enterprise architecture and scalability
White Paper Qlik Sense Enterprise architecture and scalability June, 2017 qlik.com Platform Qlik Sense is an analytics platform powered by an associative, in-memory analytics engine. Based on users selections,
More informationFeatures Four popular platforms, same quality and ease of use
ISE is extending the boundaries of automated job scheduling with the only job scheduler for Windows NT/2000/XP OpenVMS, Tru64 UNIX and Linux. Each version incorporates ISE s unparalleled reputation in
More informationOnCommand Unified Manager 7.2: Best Practices Guide
Technical Report OnCommand Unified : Best Practices Guide Dhiman Chakraborty August 2017 TR-4621 Version 1.0 Abstract NetApp OnCommand Unified is the most comprehensive product for managing and monitoring
More informationControlPoint. Managing ControlPoint Users, Permissions, and Menus. February 05,
Managing Users, Permissions, and Menus February 05, 2018 www.metalogix.com info@metalogix.com 202.609.9100 Copyright International GmbH., 2008-2018 All rights reserved. No part or section of the contents
More informationReporting Guide - V8.1
Web Security - V8.1 4225 Executive Sq, Ste 1600 La Jolla, CA 92037-1487 Give us a call: 1-800-782-3762 Send us an email: wavesupport@edgewave.com For more info, visit us at: www.edgewave.com 2001 2018
More informationIntegrate Sophos Enterprise Console. EventTracker v8.x and above
Integrate Sophos Enterprise Console EventTracker v8.x and above Publication Date: September 22, 2017 Abstract This guide provides instructions to configure Sophos Enterprise Console to send the events
More informationDiagnostic Manager Advanced Installation Guide
Diagnostic Manager Publication Date: May 03, 2017 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software,
More informationNetWrix SharePoint Change Reporter
NetWrix SharePoint Change Reporter Version 2.0 Freeware and Standard Editions Quick Start Guide Table of Contents Table of Contents...2 1. Introduction...3 1.1. What is NetWrix SharePoint Change Reporter?...
More informationUniversal Management Agent Installation Guide G10L
Universal Management Agent 1.01 Installation Guide IBM G10L-9841-1 IBM Universal Management Agent 1.01 Installation Guide G10L-9841-1 Note Before using this information and the product it supports, be
More informationNetWrix VMware Change Reporter Version 3.0 Enterprise Edition Quick Start Guide
NetWrix VMware Change Reporter Version 3.0 Enterprise Edition Quick Start Guide Table of Contents NetWrix VMware Change Reporter Concepts... 1 How It Works... 2 Deploying Product... 3 System Requirements...
More informationMcAfee Security Management Center
Data Sheet McAfee Security Management Center Unified management for next-generation devices Key advantages: Single pane of glass across the management lifecycle for McAfee next generation devices. Scalability
More informationNTP Software QFS for EMC
NTP Software QFS for EMC Installation Guide Version 8.4 This guide provides a short introduction to the installation and initial configuration of NTP Software QFS for NAS, EMC Edition, from an administrator
More informationDashboard / Output Guide
Interstage Business Process Manager Analytics V11.0 Dashboard / Output Guide Windows/Solaris/Linux J2U3-0053-01(00) December 2009 About this Manual This document describes how to use the Dashboard to display
More informationms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/grpolwt.htm
Page 1 of 17 Windows 2000 Server Step-by-Step Guide to Understanding the Group Policy Feature Set Operating System Abstract Group Policy is the central component of the Change and Configuration Management
More informationMozy. Administrator Guide
Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license
More informationvrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4
vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4 vrealize Operations Manager Customization and Administration Guide You can find the most up-to-date technical
More informationSQL Server Solutions GETTING STARTED WITH. SQL Secure
SQL Server Solutions GETTING STARTED WITH SQL Secure Purpose of this document This document is intended to be a helpful guide to installing, using, and getting the most value from the Idera SQL Secure
More informationHPE Intelligent Management Center
HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM
More informationVMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes
VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes AirWatch v9.3 Have documentation feedback? Submit a Documentation
More informationVeritas NetBackup for Microsoft Exchange Server Administrator s Guide
Veritas NetBackup for Microsoft Exchange Server Administrator s Guide for Windows Release 8.1.1 Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Last updated: 2018-02-16 Document version:netbackup
More informationVeritas System Recovery 18 Management Solution Administrator's Guide
Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are
More information