AUTOMATED QUOTA MANAGEMENT AND FILE SCREENING

Size: px
Start display at page:

Download "AUTOMATED QUOTA MANAGEMENT AND FILE SCREENING"

Transcription

1 StorageCentral: Architecture Overview AUTOMATED QUOTA MANAGEMENT AND FILE SCREENING For Windows Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS 1 product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation in the US and/or other countries. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Specifications and product offerings subject to change without notice. Printed in USA and the EU. April 2004.

2 TABLE OF CONTENTS TABLE OF CONTENTS...2 architecture overview...3 Agents...3 Collectors...3 Management Console...4 Managed objects...4 Policies...4 Policy management and propagation...5 Computer policies...5 Allocation Design Overview...6 Allocation (Quota Management) Flow:...6 Allocation Functional Overview...6 File Groups...6 Policies and Managed Objects...7 Reporting...8 Report definitions...8 Report sets...8 Running reports...8 Scheduling Reports with Collectors...8 Active HTML reports...9 Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 2

3 ARCHITECTURE OVERVIEW VERITAS StorageCentral uses a distributed architecture that scales throughout enterprises small and large with a minimal impact on existing resources. The three basic components of this architecture are agents, collectors, and consoles. AGENTS Agents are small software components that provide the core functionality of StorageCentral. Agents are installed and executed on any Windows 2003, Windows 2000, or Windows NT 4 server for StorageCentral quota management or file screening. Agents run as a background service and are managed from a StorageCentral console. Agents are the primary workhorses of the StorageCentral product. However, Agents do not contain a user interface of any kind. Instead, they run entirely in the background, accepting instructions from the StorageCentral management console. COLLECTORS The reporting function that comes with StorageCentral may be used to report on large numbers of files in a production environment. The process of gathering and processing the file information can be time-consuming if a significantly large number of files are being reported on. In some situations the StorageCentral collector may require a dedicate system for a report execution. The StorageCentral collector can be installed on a standalone system or on a management workstation, allowing offloaded report processing. Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 3

4 MANAGEMENT CONSOLE The StorageCentral management console controls all operational aspects of StorageCentral. The console is a snap-in to the Microsoft Management Console. Customers can deploy one or more management consoles to manage and monitor deployed StorageCentral agents and report collectors. MANAGED OBJECTS A managed object is the basic unit of management for StorageCentral. Managed objects may be a file, folder, share, or partition. With Active Directory Edition, Organization Units (OUs), sites, and domains can also be managed objects. Managed objects have a space allocation or a file screening policy associations. StorageCentral applies policies to managed objects. For example, a policy prevents MP3 files from being saved. A StorageCentral management console can be used to associate that policy to a folder. The folder is now a StorageCentral managed object. StorageCentral will prevent MP3 files from being saved to that folder. POLICIES Policies can contain both space allocation (quota management) and file screening properties, and implement storage management policies. By themselves, policies have no effect. When applied to eligible file, folder, share, or partition, policies define managed objects. Policies can act as templates, applying the same business practices to multiple managed objects. Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 4

5 POLICY MANAGEMENT AND PROPAGATION When a policy is applied to a managed object, the properties are copied to the managed object. If the policy is changed in the future, StorageCentral by default copies changes to associated managed objects. A StorageCentral policy can be configured not to automatically propagate policy changes. In some cases, folders and/or users can be disassociated from a policy and will continue to exist as StorageCentral managed objects, via the management console interface. COMPUTER POLICIES Computer policies are available with StorageCentral Active Directory Edition and apply only to servers. Computer policies specify the systems that the policy will apply to, the folders on each system that the policy will apply to, and actions such as auto detecting disks, folders, and folder policies. Computer policies specify server-wide policies and apply them with a single policy. Computer policies consistently apply policies to new systems. By applying the computer policy to an Active Directory Organizational Unit, StorageCentral ensures that any system defined to that Organizational Unit will automatically receive the correct policies. Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 5

6 ALLOCATION DESIGN OVERVIEW Space allocation is physically implemented as a Windows service called QuotaAdvisor server. The service receives instructions from the StorageCentral management console. The service does not actually implement allocation policies; instead, it creates and manages policies for users. Policies are enforced by a patented filter driver (TruStor), file name QAFilter.sys stored in %systemroot%\system32\drivers\qafilter.sys. The filter driver is viewable via Device Manager and selecting the option to view hidden devices. ALLOCATION (QUOTA MANAGEMENT) FLOW: StorageCentral management console communicates with the QAServer service to create or modify space allocation settings. QAServer service communicates with the filter driver to create or modify allocations as instructed by the management console. In effect, the service acts as a front door to the filter. Filter driver monitors file I/O and adjusts space usage information accordingly. Allocation values and current usage are stored in a local data file, which resides in server memory. o o o o Filter drivers responds to the QAServer service to modify and display allocation information. The filter triggers QAServer to take alarm actions when allocation usage exceeds the configured alarm threshold. Allocation information is persistent, and is stored on each volume. This technique provides excellent scalability, and makes StorageCentral cluster-compatible. StorageCentral reads allocation information from the volume when Windows mounts the volume at system startup. The driver filter enforces allocation policy limits. QAServer performs actions as configured when triggered by the filter. Actions are stored in a local data file. ALLOCATION FUNCTIONAL OVERVIEW Space allocation is an object-based process. Administrators use the StorageCentral management console to define managed objects, which can be files, folders, logical drives, or file shares. With Active Directory Edition, managed objects can also represent Organizational Units (OUs), sites, or domains. Space allocation policies define quotas. Policies can define an active limitations, such as preventing users from storing more than 10MB. Policies are applied to managed objects, and become a governing force for how those managed objects behave. From a design standpoint, the StorageCentral components monitor managed objects; if anything happens to a file or folder that isn t part of a managed object, StorageCentral ignores it. File Groups StorageCentral comes with predefined file groups. Customers can modify predefined file groups and create new file groups. File groups provide an easy way to define a related set of files and/or file types. For example, a file group named graphic files 2 may include unauthorized file types of.gif and.jpg, while containing authorized file types.tif and.bmp. File groups can contain a list of authorized types, unauthorized types, or both. Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 6

7 Policies and Managed Objects File blocking is implemented through policies, just like disk space allocation. A policy can include both space allocation (quotas) and file blocking policies. Policies are applied to managed objects, and enforce file placement (or allocation) within managed objects. File blocking policies have properties. When file blocking policies are created, file groups are specified for the policy. And, file groups can include both authorized file types and unauthorized file types. File blocking policies can be active or passive. In passive mode, alarms are activated when the policy is violated but the file I/O is allowed to continue. Active policies stop files that violate the policy from being allocated in the managed object. File blocking policies by default use the file name extension to define the file type. File blocking policies can be configured to identify file type based on the content of the file. Users trying to bypass policy may try to rename their files for example, renaming an unauthorized JPG file with a DOC extension. By configuring the blocking policy to check file content, StorageCentral stops users and blocks unauthorized files even if they have been renamed. StorageCentral stores file type signatures in the system Registry. Some file types include multiple signatures (MP3, for example), reflecting the changing content types of those files. These signatures are used for content checking, when that option is selected in a policy. Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 7

8 REPORTING REPORT DEFINITIONS Report definitions are templates that determine what a report will look like, and what data the report will display. In this way, report definitions act as a starting point for report sets. Report definitions are batched together in to a report set. In report sets, definitions can be modified without modifying the original definition. Report definitions draw data from server file system, from the StorageCentral quota database, and the StorageCentral trend databases, enabling comprehensive customizable reporting capabilities. REPORT SETS A report set is a collection of built-in and custom report definitions. A report set batches one or more report definitions for preparation as part of a common pass of a file system. A report set can apply filters to the reports it contains. For example, a report set may filter on a specific folder \Users\ on a particular server. The report set will limit the report to data in the filtered object, enabling reports on specific servers or other managed objects. Report sets also define output format for the report data, such as an HTML file, a CSV file, and so on. RUNNING REPORTS Reports can be scheduled or run interactively. Report sets can be run interactively, StorageCentral processes the report on demand. Running interactive reports makes sense for reports with limited scope and retrieving less than 100,000 files. Interactive reports make sense when extracting from one StorageCentral database, since the data is easier to collect that information about files spread across multiple servers. Custom reports can be run without performing any configuration tasks, making it easy to use StorageCentral with an auditing requirement. Running a report is as easy as selecting a drive, file, or folder as the target of a report - without configuring any managed objects within StorageCentral. StorageCentral uses a process called RapidScan to create file reports. Rather than reading each file individually to determine its file type, size, last modification date, and other information, RapidScan retrieves the information from the file system s master file table. This design allows StorageCentral to quickly retrieve file information from a centralized location on each volume, imposing a minimum processor overhead. RapidScan is utilized when reports are executed at the volume level. Data collection in StorageCentral is distributed; report sets that reports on different servers spawn a process on each server to collect the necessary information. That information is reported back to the reporting computer for compilation, earlier described as the collector. SCHEDULING REPORTS WITH COLLECTORS Some reports can take a very long time to run, simply because they have to collect and format a lot of information. For example, generating a list of all BMP files located on 100 different file servers might take a while, especially if the servers contain a lot of BMP files. StorageCentral data collection and report generation runs at a low priority. Rather than tying up a management console for long reporting runs, schedule the report to run at a designated time (like overnight). Each computer has a separate agent to collect local data. StorageCentral uses a collector to Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 8

9 create and generate report. Designated systems with report collectors perform the time consuming function of sorting and generating reports. ACTIVE HTML REPORTS One of the most useful features in StorageCentral is the interactive HTML report, which can be viewed in a Web browser. All StorageCentral reports can be generated in Active HTML format, making it easy to create a Webbased reporting solution. Reports in this format can easily be saved in a web portal that is available to all users for storage reporting. As shown below, Active HTML reports offer easy-to-read charts and graphs, as well as detail grids. ActiveX HTML Reports note the drill-down hot link in the Category column Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 9

10 Many summary-style reports offer the ability to automatically create drill-down reports. For example, in the above screen capture, the Category column includes hot-linked items. Clicking one automatically creates a report for that category, as shown below: Detail reports like the one above allow users and administrators to examine individual files and folders. As shown below, right-clicking any file provides a number of options: Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 10

11 Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 11

12 Copyright 2004 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other 12

VERITAS StorageCentral 5.2

VERITAS StorageCentral 5.2 VERITAS StorageCentral 5.2 Release Notes Windows Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes no warranty of any kind

More information

VERITAS StorageCentral 5.2

VERITAS StorageCentral 5.2 VERITAS StorageCentral 5.2 Installation Instructions Windows Introduction to the Installation Process The steps below summarize what you must do to install StorageCentral on your system. Step To do this

More information

VERITAS Storage Foundation 4.0 TM for Databases

VERITAS Storage Foundation 4.0 TM for Databases VERITAS Storage Foundation 4.0 TM for Databases Powerful Manageability, High Availability and Superior Performance for Oracle, DB2 and Sybase Databases Enterprises today are experiencing tremendous growth

More information

FSRM (File Server Resource Management)

FSRM (File Server Resource Management) 2012 FSRM (File Server Resource Management) Prepared By: Dharak Adroja Project Guide: Prof. Heera Bamaniya Acknowledgement I take this opportunity to express my indebtedness to all those who directly helped

More information

NETWRIX PASSWORD EXPIRATION NOTIFIER

NETWRIX PASSWORD EXPIRATION NOTIFIER NETWRIX PASSWORD EXPIRATION NOTIFIER ADMINISTRATOR S GUIDE Product Version: 3.3 January 2013 Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Achieving Network Storage Optimization, Security, and Compliance Using File Reporter

Achieving Network Storage Optimization, Security, and Compliance Using File Reporter Information Management & Governance Achieving Network Storage Optimization, Security, and Compliance Using File Reporter Table of Contents page Detailed Network Storage File Reporting and Analysis...2

More information

Parallels Virtuozzo Containers 4.6 for Windows

Parallels Virtuozzo Containers 4.6 for Windows Parallels Parallels Virtuozzo Containers 4.6 for Windows Deploying Microsoft Clusters Copyright 1999-2010 Parallels Holdings, Ltd. and its affiliates. All rights reserved. Parallels Holdings, Ltd. c/o

More information

Parallels Containers for Windows 6.0

Parallels Containers for Windows 6.0 Parallels Containers for Windows 6.0 Deploying Microsoft Clusters June 10, 2014 Copyright 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse

More information

DefendX Software Control-QFS for Isilon Installation Guide

DefendX Software Control-QFS for Isilon Installation Guide DefendX Software Control-QFS for Isilon Installation Guide Version 8.6 This guide details the method for the installation and initial configuration of DefendX Software Control-QFS for NAS, Isilon Edition,

More information

Parallels Virtuozzo Containers 4.6 for Linux Readme

Parallels Virtuozzo Containers 4.6 for Linux Readme Parallels Virtuozzo Containers 4.6 for Linux Readme This document provides the first-priority information about Parallels Virtuozzo Containers 4.6 for Linux and supplements the included documentation.

More information

User Guide HelpSystems Insite 1.6

User Guide HelpSystems Insite 1.6 User Guide HelpSystems Insite 1.6 Copyright Copyright HelpSystems, LLC. HelpSystems Insite, OPAL, OPerator Assistance Language, Robot ALERT, Robot AUTOTUNE, Robot CLIENT, Robot CONSOLE, Robot CORRAL, Robot

More information

OrgPublisher 8.1 PluginX Implementation Guide

OrgPublisher 8.1 PluginX Implementation Guide OrgPublisher 8.1 PluginX Implementation Guide Introduction Table of Contents Introduction... 3 OrgPublisher Architecture Overview... 4 OrgPublisher Architecture Components... 4 Data Source... 5 Org Chart

More information

Managing Oracle Real Application Clusters. An Oracle White Paper January 2002

Managing Oracle Real Application Clusters. An Oracle White Paper January 2002 Managing Oracle Real Application Clusters An Oracle White Paper January 2002 Managing Oracle Real Application Clusters Overview...3 Installation and Configuration...3 Oracle Software Installation on a

More information

NETWRIX GROUP POLICY CHANGE REPORTER

NETWRIX GROUP POLICY CHANGE REPORTER NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Ovation Process Historian

Ovation Process Historian Ovation Process Historian Features Designed to meet the needs of precision, performance, scalability and historical data management for the Ovation control system Collects historical data of Ovation process

More information

Technical What s New. Autodesk Vault Manufacturing 2010

Technical What s New. Autodesk Vault Manufacturing 2010 Autodesk Vault Manufacturing 2010 Contents Welcome to Autodesk Vault Manufacturing 2010... 2 Vault Client Enhancements... 2 Autoloader Enhancements... 2 User Interface Update... 3 DWF Publish Options User

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 6.5 9/26/2014 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

NetIQ Secure Configuration Manager Installation Guide. October 2016

NetIQ Secure Configuration Manager Installation Guide. October 2016 NetIQ Secure Configuration Manager Installation Guide October 2016 Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use restrictions, U.S. Government restricted

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 4.0 June 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Windows Server 2003 Network Administration Goals

Windows Server 2003 Network Administration Goals Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management

More information

Messaging Service Management and Analysis

Messaging Service Management and Analysis Messaging Service Management and Analysis Hypersoft OmniAnalyser delivers to enterprise customers detailed and comprehensive information on the quality of service, workload, usage and performance of their

More information

WHITE PAPER: ENTERPRISE SOLUTIONS

WHITE PAPER: ENTERPRISE SOLUTIONS WHITE PAPER: ENTERPRISE SOLUTIONS Integrating Network Appliance Snapshot and SnapRestore with Veritas NetBackup in an Oracle Backup Environment (Now from Symantec ) White Paper: Symantec Enterprise Solutions

More information

Service Manager. Ops Console On-Premise User Guide

Service Manager. Ops Console On-Premise User Guide Service Manager powered by HEAT Ops Console On-Premise User Guide 2017.2.1 Copyright Notice This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates

More information

Configuring File Server Resource Manager (FSRM)

Configuring File Server Resource Manager (FSRM) Configuring File Server Resource Manager (FSRM) LESSON 5 70-411 EXAM OBJECTIVE Objective 2.2 Configure File Server Resource Manager (FSRM). This objective may include but is not limited to: install the

More information

DELL EMC VMAX UNISPHERE 360

DELL EMC VMAX UNISPHERE 360 DELL EMC VMAX UNISPHERE 360 ABSTRACT Using Unisphere 360 to consolidate the management of VMAX storage system offers many benefits. This management interface offers a single interface where all enrolled

More information

OMi Management Pack for Microsoft SQL Server. Software Version: For the Operations Manager i for Linux and Windows operating systems.

OMi Management Pack for Microsoft SQL Server. Software Version: For the Operations Manager i for Linux and Windows operating systems. OMi Management Pack for Microsoft Software Version: 1.01 For the Operations Manager i for Linux and Windows operating systems User Guide Document Release Date: April 2017 Software Release Date: December

More information

Version Monitoring Agent User s Guide SC

Version Monitoring Agent User s Guide SC Tivoli IBM Tivoli Advanced Catalog Management for z/os Version 02.01.00 Monitoring Agent User s Guide SC23-7974-00 Tivoli IBM Tivoli Advanced Catalog Management for z/os Version 02.01.00 Monitoring Agent

More information

Using the Cisco NAC Profiler Endpoint Console

Using the Cisco NAC Profiler Endpoint Console CHAPTER 15 Topics in this chapter include: Overview, page 15-1 Display Endpoints by Profile, page 15-4 Display Endpoints by Device Port, page 15-9 Unauthorized Endpoints, page 15-12 Endpoint Directory

More information

INTRODUCING VERITAS BACKUP EXEC SUITE

INTRODUCING VERITAS BACKUP EXEC SUITE INTRODUCING VERITAS BACKUP EXEC SUITE January 6, 2005 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Managing More Storage with Fewer Resources...3 VERITAS Backup Exec Suite...3 Continuous Data Protection...

More information

DefendX Software Control-Audit for Hitachi Installation Guide

DefendX Software Control-Audit for Hitachi Installation Guide DefendX Software Control-Audit for Hitachi Installation Guide Version 4.1 This guide details the method for the installation and initial configuration of DefendX Software Control-Audit for NAS, Hitachi

More information

INSTALL GUIDE BIOVIA INSIGHT 2016

INSTALL GUIDE BIOVIA INSIGHT 2016 INSTALL GUIDE BIOVIA INSIGHT 2016 Copyright Notice 2015 Dassault Systèmes. All rights reserved. 3DEXPERIENCE, the Compass icon and the 3DS logo, CATIA, SOLIDWORKS, ENOVIA, DELMIA, SIMULIA, GEOVIA, EXALEAD,

More information

Microsoft SQL Server Fix Pack 15. Reference IBM

Microsoft SQL Server Fix Pack 15. Reference IBM Microsoft SQL Server 6.3.1 Fix Pack 15 Reference IBM Microsoft SQL Server 6.3.1 Fix Pack 15 Reference IBM Note Before using this information and the product it supports, read the information in Notices

More information

NTP Software QFS for Isilon

NTP Software QFS for Isilon NTP Software QFS for Isilon Installation Guide Version 8.5 This guide details the method for the installation and initial configuration of NTP Software QFS for NAS, Isilon Edition, from an administrator

More information

Microsoft Windows Server Administration Fundamentals. Download Full Version :

Microsoft Windows Server Administration Fundamentals. Download Full Version : Microsoft 98-365 Windows Server Administration Fundamentals Download Full Version : http://killexams.com/pass4sure/exam-detail/98-365 installation from a master computer to the destination computers. The

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release

More information

Crystal Enterprise. Overview. Contents. Installation FAQ: Crystal Enterprise 9 & 10

Crystal Enterprise. Overview. Contents. Installation FAQ: Crystal Enterprise 9 & 10 : Crystal Enterprise 9 & 10 Overview Contents This document has been compiled in an effort to assist you both in determining installation requirements for your Crystal Enterprise (CE) installation as well

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release

More information

Comparison: Microsoft Logical Disk Manager (LDM) and VERITAS Volume Manager

Comparison: Microsoft Logical Disk Manager (LDM) and VERITAS Volume Manager Comparison: Microsoft Logical Disk Manager (LDM) and VERITAS Volume Manager V E R I T A S W H I T E P A P E R for Microsoft Windows Table of Contents Online Storage Management Challenge.......................................................................................................................1

More information

NTP Software File Auditor for Windows Edition

NTP Software File Auditor for Windows Edition NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor

More information

Veritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2

Veritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Last updated: 2018-09-19 Legal Notice Copyright 2017

More information

Maximizer CRM. Customer Service Maximizer CRM 2017 VERSION COMPARISON FOR WEB ACCESS (EMEA) Maximizer CRM 2016/R2.

Maximizer CRM. Customer Service Maximizer CRM 2017 VERSION COMPARISON FOR WEB ACCESS (EMEA) Maximizer CRM 2016/R2. VERSION COMPARISON FOR WEB ACCESS (EMEA) Sales Support multiple sales processes Track opportunity stage age Track overall opportunity age Monitor progress by comparing stage age with target age Opportunity

More information

Veritas NetBackup for Lotus Notes Administrator's Guide

Veritas NetBackup for Lotus Notes Administrator's Guide Veritas NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 8.0 Veritas NetBackup for Lotus Notes Administrator's Guide Document version: 8.0 Legal Notice Copyright 2016

More information

Dell Storage vsphere Web Client Plugin. Version 4.0 Administrator s Guide

Dell Storage vsphere Web Client Plugin. Version 4.0 Administrator s Guide Dell Storage vsphere Web Client Plugin Version 4.0 Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION:

More information

Ebook : Overview of application development. All code from the application series books listed at:

Ebook : Overview of application development. All code from the application series books listed at: Ebook : Overview of application development. All code from the application series books listed at: http://www.vkinfotek.com with permission. Publishers: VK Publishers Established: 2001 Type of books: Develop

More information

Central Administration Console Installation and User's Guide

Central Administration Console Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Central Administration Console Installation and User's Guide SC27-2808-04 IBM Tivoli Storage Manager FastBack for Workstations Version

More information

Report Viewer Comparison

Report Viewer Comparison Report Viewer Comparison Overview Contents BusinessObjects Enterprise and Crystal Reports Server allow viewing and exporting of reports over the web using two types of viewers: zeroclient and thin client

More information

Business Intelligence Launch Pad User Guide SAP BusinessObjects Business Intelligence Platform 4.1 Support Package 1

Business Intelligence Launch Pad User Guide SAP BusinessObjects Business Intelligence Platform 4.1 Support Package 1 Business Intelligence Launch Pad User Guide SAP BusinessObjects Business Intelligence Platform 4.1 Support Package 1 Copyright 2013 SAP AG or an SAP affiliate company. All rights reserved. No part of this

More information

sforce Web Services Enterprise API sforce Object Query Language sforce Custom Objects... 40

sforce Web Services Enterprise API sforce Object Query Language sforce Custom Objects... 40 Release Notes Winter 04 Major Announcements Dashboards... 2 Workflow Automation... 8 Advanced Page Layout Wizard... 12 Dynamic Page Layouts and Field-Level Security... 14 Team-Based Account Management...

More information

Agent vs Agentless Log Collection

Agent vs Agentless Log Collection Agent vs Agentless Log Collection Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for direct, or indirect

More information

ForeScout Extended Module for Qualys VM

ForeScout Extended Module for Qualys VM ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...

More information

Deploying Lightspeed User Agent v

Deploying Lightspeed User Agent v Deploying Lightspeed User Agent v2.01.14 The LS User Agent can be deployed via most application deployment utilities. This guide will focus on Group Policy Software installation policies. Please read over

More information

Xcalibur Global Version Rev. 2 Administrator s Guide Document Version 1.0

Xcalibur Global Version Rev. 2 Administrator s Guide Document Version 1.0 Xcalibur Global Version 1.1 - Rev. 2 Administrator s Guide Document Version 1.0 September 2006 COPYRIGHT NOTICE 2006 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd. All rights reserved. This product

More information

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide Revision A McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Centrify Infrastructure Services

Centrify Infrastructure Services Centrify Infrastructure Services License Management Administrator s Guide December 2018 (release 18.11) Centrify Corporation Legal Notice This document and the software described in this document are furnished

More information

One Identity Active Roles 7.2. Product Overview Guide

One Identity Active Roles 7.2. Product Overview Guide One Identity Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION

Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION 1 TABLE OF CONTENTS VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS...1

More information

Veritas Enterprise Vault PST Migration 12.2

Veritas Enterprise Vault PST Migration 12.2 Veritas Enterprise Vault PST Migration 12.2 Veritas Enterprise Vault: PST Migration Last updated: 2017-08-10. Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas

More information

Table Of Contents INTRODUCTION... 6 USER GUIDE Software Installation Installing MSI-based Applications for Users...9

Table Of Contents INTRODUCTION... 6 USER GUIDE Software Installation Installing MSI-based Applications for Users...9 Table Of Contents INTRODUCTION... 6 USER GUIDE... 8 Software Installation... 8 Installing MSI-based Applications for Users...9 Installing EXE-based Applications for Users...10 Installing MSI-based Applications

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

IM: Symantec Security Information Manager Patch 4 Resolved Issues

IM: Symantec Security Information Manager Patch 4 Resolved Issues IM: Symantec Security Information Manager 4.7.2 Patch 4 Resolved Symantec Security Information Manager 4.7.2 Patch 4 Resolved The software described in this book is furnished under a license agreement

More information

Smart-X Software Solutions SecReport Enterprise User Guide

Smart-X Software Solutions SecReport Enterprise User Guide Smart-X Software Solutions SecReport Enterprise User Guide Table of Contents: WELCOME 4 FEATURES AND CAPABILITIES 5 CONTENTS AND REQUIREMENTS 7 CONTENTS 7 REQUIREMENTS 8 LICENSING AND INSTALLATION 10 EVALUATION

More information

New Features Summary PowerDesigner 15.2

New Features Summary PowerDesigner 15.2 New Features Summary PowerDesigner 15.2 Windows DOCUMENT ID: DC10077-01-1520-01 LAST REVISED: February 2010 Copyright 2010 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software

More information

IBM Internet Security Systems Proventia Management SiteProtector

IBM Internet Security Systems Proventia Management SiteProtector Supporting compliance and mitigating risk through centralized management of enterprise security devices IBM Internet Security Systems Proventia Management SiteProtector Highlights Reduces the costs and

More information

IBM Monitoring Agent for Citrix Virtual Desktop Infrastructure 7.2 FP3. User's Guide IBM SC

IBM Monitoring Agent for Citrix Virtual Desktop Infrastructure 7.2 FP3. User's Guide IBM SC IBM Monitoring Agent for Citrix Virtual Desktop Infrastructure 7.2 FP3 User's Guide IBM SC14-7487-02 IBM Monitoring Agent for Citrix Virtual Desktop Infrastructure 7.2 FP3 User's Guide IBM SC14-7487-02

More information

DefendX Software Control-QFS for EMC Installation Guide

DefendX Software Control-QFS for EMC Installation Guide DefendX Software Control-QFS for EMC Installation Guide Version 8.6 This guide provides a short introduction to the installation and initial configuration of DefendX Software Control-QFS for NAS, EMC Edition,

More information

LIVE PLAYER. VR-5033 (Applicable to VR-5000 software version )

LIVE PLAYER. VR-5033 (Applicable to VR-5000 software version ) LIVE PLAYER VR-5033 (Applicable to VR-5000 software version 2.07.00) TABLE OF CONTENTS FOREWORD... ii 1. INSTALLATION... 1 1.1 Requirements... 1 1.2 Software Installation... 1 2. PLAYER CONFIGURATION...

More information

Adobe LiveCycle ES and the data-capture experience

Adobe LiveCycle ES and the data-capture experience Technical Guide Adobe LiveCycle ES and the data-capture experience Choosing the right solution depends on the needs of your users Table of contents 2 Rich application experience 3 Guided experience 5 Dynamic

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...

More information

Vector Issue Tracker and License Manager - Administrator s Guide. Configuring and Maintaining Vector Issue Tracker and License Manager

Vector Issue Tracker and License Manager - Administrator s Guide. Configuring and Maintaining Vector Issue Tracker and License Manager Vector Issue Tracker and License Manager - Administrator s Guide Configuring and Maintaining Vector Issue Tracker and License Manager Copyright Vector Networks Limited, MetaQuest Software Inc. and NetSupport

More information

NetWrix Account Lockout Examiner Version 4.0 User Guide

NetWrix Account Lockout Examiner Version 4.0 User Guide NetWrix Account Lockout Examiner Version 4.0 User Guide Table of Contents Introduction... 1 Product Architecture... 1 About Security Roles... 2 Default Installation Folders, Virtual Directory, and Startup

More information

IBM Global Technology Services May IBM Internet Security Systems Proventia Management SiteProtector system version 2.0, SP 7.

IBM Global Technology Services May IBM Internet Security Systems Proventia Management SiteProtector system version 2.0, SP 7. IBM Global Technology Services May 2008 IBM Internet Security Systems Proventia Management SiteProtector system version 2.0, SP 7.0 Preview Guide Page 1 Executive Summary IBM Internet Security Systems

More information

Veritas Storage Foundation for Windows by Symantec

Veritas Storage Foundation for Windows by Symantec Veritas Storage Foundation for Windows by Symantec Advanced online storage management Veritas Storage Foundation 5.0 for Windows brings advanced online storage management to Microsoft Windows Server environments.

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems Guide to Computer Forensics and Investigations Fourth Edition Chapter 6 Working with Windows and DOS Systems Understanding Disk Drives Disk drives are made up of one or more platters coated with magnetic

More information

Veritas System Recovery 16 Management Solution Administrator's Guide

Veritas System Recovery 16 Management Solution Administrator's Guide Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo

More information

Simplified Storage Migration for Microsoft Cluster Server

Simplified Storage Migration for Microsoft Cluster Server Simplified Storage Migration for Microsoft Cluster Server Using VERITAS Volume Manager for Windows 2000 with Microsoft Cluster Server V E R I T A S W H I T E P A P E R June 2001 Table of Contents Overview...................................................................................1

More information

Qlik Sense Enterprise architecture and scalability

Qlik Sense Enterprise architecture and scalability White Paper Qlik Sense Enterprise architecture and scalability June, 2017 qlik.com Platform Qlik Sense is an analytics platform powered by an associative, in-memory analytics engine. Based on users selections,

More information

Features Four popular platforms, same quality and ease of use

Features Four popular platforms, same quality and ease of use ISE is extending the boundaries of automated job scheduling with the only job scheduler for Windows NT/2000/XP OpenVMS, Tru64 UNIX and Linux. Each version incorporates ISE s unparalleled reputation in

More information

OnCommand Unified Manager 7.2: Best Practices Guide

OnCommand Unified Manager 7.2: Best Practices Guide Technical Report OnCommand Unified : Best Practices Guide Dhiman Chakraborty August 2017 TR-4621 Version 1.0 Abstract NetApp OnCommand Unified is the most comprehensive product for managing and monitoring

More information

ControlPoint. Managing ControlPoint Users, Permissions, and Menus. February 05,

ControlPoint. Managing ControlPoint Users, Permissions, and Menus. February 05, Managing Users, Permissions, and Menus February 05, 2018 www.metalogix.com info@metalogix.com 202.609.9100 Copyright International GmbH., 2008-2018 All rights reserved. No part or section of the contents

More information

Reporting Guide - V8.1

Reporting Guide - V8.1 Web Security - V8.1 4225 Executive Sq, Ste 1600 La Jolla, CA 92037-1487 Give us a call: 1-800-782-3762 Send us an email: wavesupport@edgewave.com For more info, visit us at: www.edgewave.com 2001 2018

More information

Integrate Sophos Enterprise Console. EventTracker v8.x and above

Integrate Sophos Enterprise Console. EventTracker v8.x and above Integrate Sophos Enterprise Console EventTracker v8.x and above Publication Date: September 22, 2017 Abstract This guide provides instructions to configure Sophos Enterprise Console to send the events

More information

Diagnostic Manager Advanced Installation Guide

Diagnostic Manager Advanced Installation Guide Diagnostic Manager Publication Date: May 03, 2017 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software,

More information

NetWrix SharePoint Change Reporter

NetWrix SharePoint Change Reporter NetWrix SharePoint Change Reporter Version 2.0 Freeware and Standard Editions Quick Start Guide Table of Contents Table of Contents...2 1. Introduction...3 1.1. What is NetWrix SharePoint Change Reporter?...

More information

Universal Management Agent Installation Guide G10L

Universal Management Agent Installation Guide G10L Universal Management Agent 1.01 Installation Guide IBM G10L-9841-1 IBM Universal Management Agent 1.01 Installation Guide G10L-9841-1 Note Before using this information and the product it supports, be

More information

NetWrix VMware Change Reporter Version 3.0 Enterprise Edition Quick Start Guide

NetWrix VMware Change Reporter Version 3.0 Enterprise Edition Quick Start Guide NetWrix VMware Change Reporter Version 3.0 Enterprise Edition Quick Start Guide Table of Contents NetWrix VMware Change Reporter Concepts... 1 How It Works... 2 Deploying Product... 3 System Requirements...

More information

McAfee Security Management Center

McAfee Security Management Center Data Sheet McAfee Security Management Center Unified management for next-generation devices Key advantages: Single pane of glass across the management lifecycle for McAfee next generation devices. Scalability

More information

NTP Software QFS for EMC

NTP Software QFS for EMC NTP Software QFS for EMC Installation Guide Version 8.4 This guide provides a short introduction to the installation and initial configuration of NTP Software QFS for NAS, EMC Edition, from an administrator

More information

Dashboard / Output Guide

Dashboard / Output Guide Interstage Business Process Manager Analytics V11.0 Dashboard / Output Guide Windows/Solaris/Linux J2U3-0053-01(00) December 2009 About this Manual This document describes how to use the Dashboard to display

More information

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/grpolwt.htm

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/grpolwt.htm Page 1 of 17 Windows 2000 Server Step-by-Step Guide to Understanding the Group Policy Feature Set Operating System Abstract Group Policy is the central component of the Change and Configuration Management

More information

Mozy. Administrator Guide

Mozy. Administrator Guide Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license

More information

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4 vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4 vrealize Operations Manager Customization and Administration Guide You can find the most up-to-date technical

More information

SQL Server Solutions GETTING STARTED WITH. SQL Secure

SQL Server Solutions GETTING STARTED WITH. SQL Secure SQL Server Solutions GETTING STARTED WITH SQL Secure Purpose of this document This document is intended to be a helpful guide to installing, using, and getting the most value from the Idera SQL Secure

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes AirWatch v9.3 Have documentation feedback? Submit a Documentation

More information

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Veritas NetBackup for Microsoft Exchange Server Administrator s Guide for Windows Release 8.1.1 Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Last updated: 2018-02-16 Document version:netbackup

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information