System Administration

Size: px
Start display at page:

Download "System Administration"

Transcription

1 CHAPTER 8 System Administration As your network inventory and user base grow, you need to perform certain system administration tasks to accommodate that growth. This chapter describes some of the features this product provides to help you with these tasks. The following sections are presented in this chapter: Storage Management Security For detailed information on System Administration, refer to the online help. System Administration 8-1

2 Storage Management Storage Management Perform storage management tasks to ensure that you have a set of database backups in case your current database becomes corrupted or otherwise unusable. Use a directory naming scheme that indicates your backup dates in case you need to restore the database. You should create a separate directory for each backup. The backup directory must be writeable by the user bin on Solaris systems. The backup process creates three files: px.db (database root file) contains all database system tables syslog.db contains Essentials tables for the syslog application CRM_filebackup.tar contains other files (for example, generation files) The px.db file is your database backup. The syslog.db file is a log of database transactions. Without the syslog.db file, you cannot restore your database. The CRM_filebackup.tar file contains a collection of backup files created by Essentials applications. Backing Up Your Database Scenario: You have imported devices into your Essentials database and you need to back up the database. You can back up your database immediately or you can schedule it for later. Make several directories to store your backup files. For example, if you want to perform backups weekly, use a naming convention that indicates the dates of the backups, such as: jan20_98 jan27_98 feb03_98 You should create a separate directory for each backup. Store a single set of backup files in each directory. Each time you perform a backup, Essentials stores the most current db files and other files specified by Essentials components in that directory. Note It is recommended that you check the size of the files stored in the backup directory. Some of the files stored in the backup directory might require additional disk space. 8-2 Gettting Started with Resource Manager Essentials

3 Backing Up Your Database To back up the database immediately, perform the following steps: Step 1 Select Admin > System Admin > Back Up Data Now. The Back Up Data Now dialog box appears. (See Figure 8-1.) Figure 8-1 Back Up Data Now Dialog Box Caution It is recommended that you store backups in a partition other than the one hosting the run-time database. Step 2 Enter the fully qualified path name of the backup directory, then click Finish. A confirmation message appears. To schedule regular backups, perform the following steps: Step 1 Select Admin > System Admin > Schedule Backup. The Set Backup Schedule dialog box appears. (See Figure 8-2.) Caution It is recommended that you store backups in a partition other than the one hosting the run-time database. Step 2 Enter information in the fields as required, then click Finish. System Administration 8-3

4 Storage Management Figure 8-2 Set Backup Schedule Dialog Box Restoring a Database Scenario: You discover your run-time database is corrupted and you want to restore the database. Caution Restoring the database from a backup permanently replaces your database with the backed up version. You can restore your database only by running a script from the command line. 8-4 Gettting Started with Resource Manager Essentials

5 Restoring a Database Caution As part of restoration, the entire product, except the web server in Windows NT, is shut down and restarted. Ensure that you are not running any critical tasks. Otherwise, you might lose data. Restoring a database requires you to stop all processes and then restart them. To restore the database, perform the following steps: On UNIX: Step 1 Step 2 Step 3 Step 4 Log in as the superuser at the command line and enter the root password. Stop all processes by entering: On Solaris: /etc/init.d/dmgtd stop On AIX: /etc/rc.dmgtd stop On HP-UX: /sbin/init.d/dmgtd stop Restore the database by entering: $NMSROOT/bin/perl $NMSROOT/bin/restorebackup.pl < backup directory > where $NMSROOT is the Essentials installation directory. For example, if the backups are stored in the /var/backup directory with a retention cycle of 3, there might be a /var/backup/1, /var/backup/2, and /var/backup/3. To restore the most recent version, enter the following command: $NMSROOT/bin/perl $NMSROOT/bin/restorebackup.pl /var/backup/3. Examine the log file in the following location to verify that the database was restored: /var/adm/cscopx/log/restorebackup.log Note You can start a process using the Start Processes option. All required processes are started when you access the system. Your login determines whether you can use this option. System Administration 8-5

6 Storage Management Step 5 Restart the system by entering: On Solaris: /etc/init.d/dmgtd start On AIX: /etc/rc.dmgtd start On HP-UX: /sbin/init.d/dmgtd start Note If you stopped the DbServer process, all processes were shut down. Using this option will start only the DbServer process, not the other processes. The Process Status table displays the new status of all processes. On Windows NT: At the command line, ensure that you have the correct permissions, then perform the following steps: Step 1 Stop all processes by entering: Step 2 Step 3 net stop crmdmgtd Restore the database by entering: %NMSROOT%\bin\restorebackup.pl backup directory where %NMSROOT% is the Essentials installation directory. For example, if the backups were stored in a \var\backup directory with a retention cycle of 3, there might be a \var\backup\1, \var\backup\2, and \var\backup\3. To restore the most recent version, enter the following command: %NMSROOT%\bin\restorebackup.pl drive:\var\backup\3. Examine the log file in the following location to verify the database was restored: %NMSROOT%\log\restorebackup.log 8-6 Gettting Started with Resource Manager Essentials

7 Moving a Database Note You can start a process using the Start Processes option. All required processes are started when you access the system. Your login determines whether you can use this option. Step 4 Restart the system by entering: net start crmdmgtd Note If you stopped the DbServer process, all processes were shut down. Using this option will start only the DbServer process, not the other processes. Moving a Database Scenario: You notice the file system containing the Essentials database is filling up and you need to move the current run-time database to a new location. You can relocate your database by running a script from the command line. Before you begin, ensure the new location has sufficient disk space. Caution As part of relocation, the entire product, except the web server in Windows NT, is shut down and restarted. Ensure that you are not running any critical tasks. Otherwise, you might lose data. This section describes the procedure for moving the database on both UNIX and Windows NT systems. To move the database, perform the following steps: On UNIX: Step 1 Step 2 Log in as the superuser at the command line, and enter the root password. Stop all processes by entering: On Solaris: /etc/init.d/dmgtd stop System Administration 8-7

8 Storage Management On AIX: /etc/rc.dmgtd stop Step 3 On HP-UX: /sbin/init.d/dmgtd stop Move the database from the current location to the target location by entering: $NMSROOT/bin/perl $NMSROOT/bin/dbmove.pl < target directory > where $NMSROOT is the Essentials installation directory and CSCOpx is the default directory. Note The target directory must be owned by user bin and group bin. The user must have read, write, and execute permissions, and the group must have at least read permission. Otherwise, the program will terminate with an error message and the database will not be moved. Step 4 Step 5 Verify the move by examining the contents of the log file in the following location: $NMSROOT/bin/dbmove.log file Restart the system by entering: On Solaris: /etc/init.d/dmgtd start On AIX: /etc/rc.dmgtd start On HP-UX: /sbin/init.d/dmgtd start On Windows NT: Step 1 Step 2 Step 3 Ensure that you have the correct permissions at the command line prompt. Stop all processes by entering: net stop crmdmgtd Move the database from the current location to the target location by entering: %NMSROOT%\bin\dbmove.pl target directory where %NMSROOT% is the Essentials installation directory 8-8 Gettting Started with Resource Manager Essentials

9 Security Step 4 Step 5 Examine the log file in the following location to verify that the database was moved: %NMSROOT%\log\dbmove.log Restart the system by entering: net start crmdmgtd Security Several Essentials network management and application management operations are potentially disruptive to either the network (for example, software image downloads) or to the applications themselves (for example, stopping a process) and must be protected. To prevent such operations from being used accidentally or maliciously, this product uses a multilevel security system that allows access to certain features only to users who can authenticate themselves at the appropriate level. The security features depend on the platform you are using. Table 8-1 shows available security levels: Table 8-1 Security Levels Level Description 0 Help Desk 1 Approver 2 Network Operator 4 Network Administrator 8 System Administrator System administrators determine the security level of all users when they are given access to Essentials. Each security level has a different set of available tasks. For example, level 0, Help Desk, provides access only to tasks required for help desk activities. Level 4, Network Administrator, provides access to all network administration tasks. Level 8, System Administrator, provides access to all application administrative tasks. System Administration 8-9

10 Security User Account Management Only systems administrators or superusers (admin login) can add or delete users or change certain user information. All users can change their own passwords. Adding Users Scenario: Your company has just hired a new employee to help manage the network and you want to give the employee administrator-level privileges. To add a user, perform the following steps: Step 1 Select Admin > User Accounts > Add Users. The Add System Users dialog box appears. (See Figure 8-3.) 8-10 Gettting Started with Resource Manager Essentials

11 User Account Management Figure 8-3 Add System Users Dialog Box Step 2 Enter information in all fields, then click Add. A confirmation message appears. Note The Essentials software cannot recover forgotten passwords. An administrator-level user must either change the password or delete and then add the user again. System Administration 8-11

12 Security Deleting Users Scenario: An employee in your network administration group has left your company. You need to delete the employee from the administrator-level user list. To delete users, perform the following steps: Step 1 Select Admin > User Accounts > Modify/Delete Users. The Modify Users dialog box appears. (See Figure 8-4.) Figure 8-4 Modify/Delete Users Dialog Box Step 2 Step 3 Select the name of the user, then click Delete. Click Delete again. A confirmation message appears Gettting Started with Resource Manager Essentials

13 User Account Management Note The username admin is reserved and cannot be deleted. Changing Passwords Scenario: A user wants to change his password to ensure account security. To change a password, perform the following steps: Step 1 Select Admin > User Accounts > Modify My Profile. The Modify My Profile dialog box appears. (See Figure 8-5.) Figure 8-5 Modify My Profile Dialog Box System Administration 8-13

14 Security Step 2 Enter the new password and any other settings you want to change, then click Modify. A confirmation message appears. This completes the chapter on System Administration Gettting Started with Resource Manager Essentials

INDEX. Symbols. .cshrc file modifying 2-8.profile file modifying 2-8.rhosts file for RCP 5-17

INDEX. Symbols. .cshrc file modifying 2-8.profile file modifying 2-8.rhosts file for RCP 5-17 INDEX Symbols.cshrc file modifying 2-8.profile file modifying 2-8.rhosts file for RCP 5-17 A adding inventory data 5-4 admin role changing login 4-7 changing login password 4-8 default login username 4-5

More information

Troubleshooting the Installation

Troubleshooting the Installation APPENDIX A This appendix provides troubleshooting information for CD One installation. It contains: Checking Files and Directories After Installation Viewing and Changing Process Status Understanding Installation

More information

Installing Essentials

Installing Essentials CHAPTER 1 This chapter describes installing Resource Manager Essentials 3.2 on a Windows system. It consists of: Product Overview Installation Overview Preparing to Install Essentials Importing Data Manually

More information

Setting Up Essentials

Setting Up Essentials CHAPTER 4 Setting Up Essentials Now that you have installed Essentials, you need to perform some required administrator tasks. This chapter consists of the following sections: Quick Reference Accessing

More information

Installing Essentials

Installing Essentials CHAPTER 1 This chapter describes how to install and uninstall Essentials, including upgrades and reinstallation. You must install CiscoWorks2000 CD One before you can install Resource Manager Essentials.

More information

Database Management. Understanding Failure Resiliency. Database Files CHAPTER

Database Management. Understanding Failure Resiliency. Database Files CHAPTER CHAPTER 7 This chapter contains information on RDU database management and maintenance. The RDU database is the Broadband Access Center for Cable (BACC) central database. As with any database, it is essential

More information

Licensing the Application CHAPTER

Licensing the Application CHAPTER CHAPTER 5 Licensing Application, Configuring E-mail, Cisco.com, Proxy Settings, RCP, SCP Settings, Security, Backup, Authentication Settings and Idle Timeout Settings, Browser and Server Security Mode

More information

Database Management. Understanding Failure Resiliency CHAPTER

Database Management. Understanding Failure Resiliency CHAPTER CHAPTER 15 This chapter contains information on RDU database management and maintenance. The RDU database is the Cisco Broadband Access Center (Cisco BAC) central database. The Cisco BAC RDU requires virtually

More information

Database Management. Understanding Failure Resiliency CHAPTER

Database Management. Understanding Failure Resiliency CHAPTER CHAPTER 14 This chapter contains information on RDU database management and maintenance. The RDU database is the Broadband Access Center (BAC) central database. The BAC RDU requires virtually no maintenance

More information

Performing Administrative Tasks

Performing Administrative Tasks This chapter describes how to perform administrative tasks using Cisco CMX. Users who are assigned administration privileges can perform administrative tasks. Cisco CMX User Accounts, page 1 Backing Up

More information

User Input for Installation and Reinstallation

User Input for Installation and Reinstallation APPENDIX A This appendix provides information on user input for Operations Manager installation, reinstallation, and silent installation. This appendix contains: User Input for a Typical Installation,

More information

Installation and Setup Guide for Resource Manager Essentials on Windows 2000

Installation and Setup Guide for Resource Manager Essentials on Windows 2000 Installation and Setup Guide for Resource Manager Essentials on Windows 2000 Software Release 3.4 CiscoWorks2000 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Configuring Cisco TelePresence Manager

Configuring Cisco TelePresence Manager CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,

More information

Database Management. Understanding Failure Resiliency CHAPTER

Database Management. Understanding Failure Resiliency CHAPTER CHAPTER 10 This chapter contains information on RDU database management and maintenance. The RDU database is the Broadband Access Center (BAC) central database. The Cisco BAC RDU requires virtually no

More information

5 Managing Logins. For Help. In this Chapter... Login Account Concepts, 5-2

5 Managing Logins. For Help. In this Chapter... Login Account Concepts, 5-2 5 Managing Logins In this Chapter... Login Account Concepts, 5-2 The root Login Account, 5-3 Managing User Login Accounts, 5-5 Customizing Login Account Environments, 5-6 Passwords, 5-10 For Help HP-UX

More information

Troubleshooting the Installation

Troubleshooting the Installation APPENDIX A Troubleshooting the Installation This appendix provides troubleshooting information for Essentials installation and setup, and contains the following sections: If the Installer Window Does Not

More information

URL for staff interface (bookmark this address on staff computers):

URL for staff interface (bookmark this address on staff computers): URL for public interface (link to this address): URL for staff interface (bookmark this address on staff computers): Application Name (for IIS): System Maintenance In the following Directory on your web

More information

Oracle Collaboration Suite

Oracle Collaboration Suite Oracle Collaboration Suite Quick Installation Guide Release 2 (9.0.4.1) for hp-ux PA-RISC (64-bit), Linux x86, and Solaris Operating Environment (SPARC 32-bit) September 2003 Part No. B10885-02 This document

More information

Command Reference (Help differences) TopologyCmd LIST TopologyCmd IMPORT TopologyCmd EXPORT. Copyright(C) NEC Corporation All rights reserved.

Command Reference (Help differences) TopologyCmd LIST TopologyCmd IMPORT TopologyCmd EXPORT. Copyright(C) NEC Corporation All rights reserved. Command Reference (Help differences) TopologyCmd LIST TopologyCmd IMPORT TopologyCmd EXPORT Copyright(C) NEC Corporation 2017. All rights reserved. Edition Chapter/Section Details First Edition - - Revision

More information

User Inputs for Installation, Reinstallation, and Upgrade

User Inputs for Installation, Reinstallation, and Upgrade APPENDIXA User Inputs for Installation, Reinstallation, and Upgrade This appendix provides information on the user inputs during Service Monitor installation, reinstallation, and upgrade. This appendix

More information

EMS Installation. Workstation Requirements CHAPTER. EMS Lite (Windows 95/98) EMS NT (Windows NT 4.0)

EMS Installation. Workstation Requirements CHAPTER. EMS Lite (Windows 95/98) EMS NT (Windows NT 4.0) CHAPTER 2 EMS Installation This chapter provides instructions for installing the Element Management System (EMS) software on a user workstation. Workstation Requirements The following sections list the

More information

8 Administering Groups

8 Administering Groups 8 Administering Groups Exam Objectives in this Chapter: Plan a security group hierarchy based on delegation requirements. Plan a security group strategy. Why This Chapter Matters As an administrator, you

More information

Troubleshooting Essentials

Troubleshooting Essentials APPENDIX A This appendix provides information on troubleshooting Essentials applications and Essentials-related CiscoWorks2000 Server problems. Change Audit Configuration Management Contract Connection

More information

Administering LMS Server

Administering LMS Server CHAPTER 3 LMS includes several administrative features to ensure that the server is performing properly. You can manage processes, set up backup parameters, update licensing information, collect server

More information

Using the Offline Diagnostic Monitor Menu

Using the Offline Diagnostic Monitor Menu APPENDIX B Using the Offline Diagnostic Monitor Menu During the boot process, you can access the Offline Diagnostic Monitor (Offline DM) Main menu. The Offline DM Main menu allows you to perform the following

More information

Frequently Asked Questions About Performance Monitor

Frequently Asked Questions About Performance Monitor APPENDIXA Frequently Asked Questions About Performance Monitor The following topics answer common questions about Performance monitor and contain troubleshooting tips: Installation, page A-1 Importing,

More information

EMC DiskXtender File System Manager for UNIX/Linux Release 3.5 Console Client for Microsoft Windows

EMC DiskXtender File System Manager for UNIX/Linux Release 3.5 Console Client for Microsoft Windows EMC DiskXtender File System Manager for UNIX/Linux Release 3.5 Console Client for Microsoft Windows Installation Guide P/N 300-009-578 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103

More information

The NetBackup catalog resides on the disk of the NetBackup master server. The catalog consists of the following parts:

The NetBackup catalog resides on the disk of the NetBackup master server. The catalog consists of the following parts: What is a NetBackup catalog? NetBackup catalogs are the internal databases that contain information about NetBackup backups and configuration. Backup information includes records of the files that have

More information

EMC DiskXtender File System Manager for UNIX/Linux Release 3.5 SP1 Console Client for Microsoft Windows

EMC DiskXtender File System Manager for UNIX/Linux Release 3.5 SP1 Console Client for Microsoft Windows EMC DiskXtender File System Manager for UNIX/Linux Release 3.5 SP1 Console Client for Microsoft Windows P/N 300-012-249 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000

More information

Windows 2000 / XP / Vista User Guide

Windows 2000 / XP / Vista User Guide Windows 2000 / XP / Vista User Guide Version 5.5.1.0 September 2008 Backup Island v5.5 Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited.

More information

User and System Administration

User and System Administration CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays

More information

USING DIRECT DATABASE DRIVERS

USING DIRECT DATABASE DRIVERS USING DIRECT DATABASE 1 DRIVERS Overview 2 S-PLUS Commands for Importing and Exporting 3 Dialogs for Importing and Exporting 6 Import From Database 6 Export to Database 10 How Direct Data Sources are Stored

More information

Installing and Upgrading Cisco Network Registrar Virtual Appliance

Installing and Upgrading Cisco Network Registrar Virtual Appliance CHAPTER 3 Installing and Upgrading Cisco Network Registrar Virtual Appliance The Cisco Network Registrar virtual appliance includes all the functionality available in a version of Cisco Network Registrar

More information

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer ABC-Deploy tyuiopasdfghjklzxcvbnmqwertyuiopas Installation Guide

More information

Performing Maintenance Operations

Performing Maintenance Operations This chapter describes how to back up and restore Cisco Mobility Services Engine (MSE) data and how to update the MSE software. It also describes other maintenance operations. Guidelines and Limitations,

More information

What this Guide Covers. Additional Info. 1. Linux based Servers. 2. Windows Servers. 3. GoldLite and Virtual Servers. 4. Other servers. 5.

What this Guide Covers. Additional Info. 1. Linux based Servers. 2. Windows Servers. 3. GoldLite and Virtual Servers. 4. Other servers. 5. This guide is designed to assist in shutting down the Gold Servers ensuring a clean reboot of the systems. This should be done by the System Administrators with all users logged off the system and any

More information

Extended Search Administration

Extended Search Administration IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using

More information

Configuring Veritas NetBackup Version 5.1 for NDMP Remote Backup on a Solaris

Configuring Veritas NetBackup Version 5.1 for NDMP Remote Backup on a Solaris Configuring Veritas NetBackup Version 5.1 for NDMP Remote Backup on a Solaris About Remote Backup A Mirapoint appliance can be backed up to a tape device (tape library or standalone tape drive) that is

More information

Deploy IBM Spectrum Control Virtual Appliance into VMware ESXi V5.1 IBM

Deploy IBM Spectrum Control Virtual Appliance into VMware ESXi V5.1 IBM Deploy IBM Spectrum Control Virtual Appliance into VMware ESXi V5.1 IBM ii Deploy IBM Spectrum Control Virtual Appliance into VMware ESXi V5.1 Contents Deploy IBM Spectrum Control Virtual Appliance into

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Quick Installation Guide for Oracle Identity Management 11g Release 1 (11.1.1) E10033-01 May 2009 This guide is designed to help you quickly install the most common Oracle Identity

More information

PhonePad Version 4 Admin Reference Guide

PhonePad Version 4 Admin Reference Guide PhonePad Version 4 Admin Reference Guide Copyright 2002-2005 Cybercom Software. All rights reserved. PhonePad Version 4 Admin Reference Guide by Cybercom Software Friday, 16 March 2012 While every precaution

More information

IDP NetScreen-Security Manager Migration Guide

IDP NetScreen-Security Manager Migration Guide Intrusion Detection and Prevention IDP NetScreen-Security Manager Migration Guide Release 4.0r3 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Part

More information

Maintaining the System Software

Maintaining the System Software CHAPTER 7 This chapter describes the tasks required for maintaining the Content Router software: Upgrading the System Software, page 7-1 Recovering the Content Router System Software, page 7-4 Maintaining

More information

Empower 2 Feature Release 5 Upgrade Guide

Empower 2 Feature Release 5 Upgrade Guide Empower 2 Feature Release 5 Upgrade Guide 715001799/Revision A Copyright Waters Corporation 2008 All rights reserved Copyright notice 2008 WATERS CORPORATION. PRINTED IN THE UNITED STATES OF AMERICA AND

More information

Configuring Veritas NetBackup Version 4.5 for NDMP

Configuring Veritas NetBackup Version 4.5 for NDMP Configuring Veritas NetBackup Version 4.5 for NDMP Overview of the Setup Process To configure Veritas NetBackup version 4.5 for Mirapoint NDMP backup, you work in both the Mirapoint appliance command-line

More information

OrbixTalk 3.3 Installation Guide Windows NT, Solaris, and HP/UX

OrbixTalk 3.3 Installation Guide Windows NT, Solaris, and HP/UX OrbixTalk 3.3 Installation Guide Windows NT, Solaris, and HP/UX September 2000 Platforms Product Code Windows NT 4.0 (Service Pack 6a) Solaris 2.7 HP/UX 11.00 Product Code Version s1514 Windows NT 4.0

More information

Active Directory 2000 Plugin Installation for Cisco CallManager

Active Directory 2000 Plugin Installation for Cisco CallManager Active Directory 2000 Plugin Installation for Cisco CallManager Document ID: 15323 Contents Introduction Prerequisites Requirements Components Used Conventions Before You Begin Task 1: Create the Cisco

More information

Administration Guide - Documentum idataagent (DB2)

Administration Guide - Documentum idataagent (DB2) Page 1 of 65 Administration Guide - Documentum idataagent (DB2) TABLE OF CONTENTS OVERVIEW Introduction Key Features Supported Environments Full Range of Backup and Recovery Options Scheduling Efficient

More information

Upgrading to BAMS Release 3.30

Upgrading to BAMS Release 3.30 APPENDIXB Upgrading to BAMS Release 3.30 Revised: April, 2010, Introduction To upgrade Cisco BAMS software to Cisco BAMS 3.30, you must upgrade from BAMS 3.20. If you wish to upgrade from BAMS 3.13 to

More information

Introduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault

Introduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault Introduction What is Microsoft Data Protection Manager (DPM)? The Microsoft Data Protection Manager is a member of the Microsoft System Center family of management products. DPM provides continuous data

More information

StormTracker EMS 2.3 Installation Instructions. Contents. Document Number EMS-A2-GN10-00 July 2002

StormTracker EMS 2.3 Installation Instructions. Contents. Document Number EMS-A2-GN10-00 July 2002 StormTracker EMS 2.3 Installation Instructions Document Number EMS-A2-GN10-00 July 2002 Contents Overview... 2 Basic StormTracker EMS Functionality... 2 Oware and StormTracker EMS... 2 Supported Systems...

More information

HP Intelligent Management Center v7.1 MySQL 5.6 Installation and Configuration Guide (Windows)

HP Intelligent Management Center v7.1 MySQL 5.6 Installation and Configuration Guide (Windows) HP Intelligent Management Center v7.1 MySQL 5.6 Installation and Configuration Guide (Windows) Abstract This document provides installation and configuration information for MySQL. It includes the procedures

More information

HP Data Protector Media Operations 6.11

HP Data Protector Media Operations 6.11 HP Data Protector Media Operations 6.11 Getting started This guide describes installing, starting and configuring Media Operations. Copyright 2009 Hewlett-Packard Development Company, L.P. Part number:

More information

Microsoft Windows NT Microsoft Windows SystemWalker/StorageMGR. Installation Guide V10.0L10

Microsoft Windows NT Microsoft Windows SystemWalker/StorageMGR. Installation Guide V10.0L10 Microsoft Windows NT Microsoft Windows 2000 SystemWalker/StorageMGR Installation Guide V10.0L10 Preface ++Purpose This manual explains the installation and customization of the SystemWalker/StorageMGR.

More information

Managing WCS User Accounts

Managing WCS User Accounts CHAPTER 7 This chapter describes how to manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-2 Changing Passwords, page 7-3 Deleting WCS User Accounts, page 7-3 Creating

More information

unitrends.com MYTH VS. REALITY What you need to know about Microsoft Office 365 Backup

unitrends.com MYTH VS. REALITY What you need to know about Microsoft Office 365 Backup MYTH VS. REALITY What you need to know about Microsoft Office 365 Backup Is Your Office 365 Data Fully Protected? ebook Contents Introduction /1 How data loss occurs in cloud applications Protecting Email:

More information

VERITAS Volume Manager Installation Guide

VERITAS Volume Manager Installation Guide VERITAS Volume Manager Installation Guide Release 3.0.4 PLEASE READ THIS BEFORE INSTALLING THE SOFTWARE! Solaris April, 2000 P/N 100-001634 1999-2000 VERITAS Software Corporation. All rights reserved.

More information

Performing an ObserveIT Upgrade Using the Interactive Installer

Performing an ObserveIT Upgrade Using the Interactive Installer Performing an ObserveIT Upgrade Using the Interactive Installer ABOUT THIS DOCUMENT This document contains detailed procedures and instructions on how to upgrade ObserveIT by using the interactive "One

More information

BACKUP APP V7 MICROSOFT SYSTEM BACKUP AND RESTORE GUIDE

BACKUP APP V7 MICROSOFT SYSTEM BACKUP AND RESTORE GUIDE V7 MICROSOFT SYSTEM BACKUP AND RESTORE GUIDE Revision History Date Descriptions Type of modification 27 July 2016 First Draft New 3 Feb 2017 Added instructions and screen shots for Encryption New key handling

More information

Upgrading an ObserveIT One-Click Installation

Upgrading an ObserveIT One-Click Installation Upgrading an ObserveIT One-Click Installation This document was written for ObserveIT Enterprise version 7.6.1. This document uses screenshots and procedures written for Windows Server 2012 R2 and SQL

More information

Polycom CMA System Upgrade Guide

Polycom CMA System Upgrade Guide Polycom CMA System Upgrade Guide 4.1.2 June 2009 3725-77606-001B2 Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or

More information

Road Map for the Typical Installation Option of IBM Tivoli Monitoring Products, Version 5.1.0

Road Map for the Typical Installation Option of IBM Tivoli Monitoring Products, Version 5.1.0 Road Map for the Typical Installation Option of IBM Tioli Monitoring Products, Version 5.1.0 Objectie Who should use the Typical installation method? To use the Typical installation option to deploy an

More information

NetBackup & Backup Exec OST Configuration Guide Instructions

NetBackup & Backup Exec OST Configuration Guide Instructions NetBackup & Backup Exec OST Configuration Guide Instructions This document contains the following topics: Introduction 2 Installing the License Key and OST Plug-in 3 Configuring the DXi 5 Configuring Veritas

More information

STRM Log Manager Administration Guide

STRM Log Manager Administration Guide Security Threat Response Manager STRM Log Manager Administration Guide Release 2010.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2011-10-10

More information

HOW-TO GUIDE: How to install Mazda Toolbox? For Windows HOW-TO GUIDE: How to install Mazda Toolbox? For OSX (Mac) HOW-TO GUIDE: How to start using

HOW-TO GUIDE: How to install Mazda Toolbox? For Windows HOW-TO GUIDE: How to install Mazda Toolbox? For OSX (Mac) HOW-TO GUIDE: How to start using HOW-TO GUIDE: How to install Mazda Toolbox? For Windows HOW-TO GUIDE: How to install Mazda Toolbox? For OSX (Mac) HOW-TO GUIDE: How to start using Mazda Toolbox? For Windows HOW-TO GUIDE: How to start

More information

NetBackup & Backup Exec OST Configuration Guide Instructions

NetBackup & Backup Exec OST Configuration Guide Instructions NetBackup & Backup Exec OST Configuration Guide Instructions This document contains the following topics: Introduction 2 Installing the License Key and OST Plug-in 2 Configuring the DXi 6 Configuring Veritas

More information

Subject: VP Agent Installation and Configuration Date: April 23, 2008 From: Magpie Telecom Insiders

Subject: VP Agent Installation and Configuration Date: April 23, 2008 From: Magpie Telecom Insiders Subject: VP Agent Installation and Configuration Date: April 23, 2008 From: Magpie Telecom Insiders 1 Introduction This document describes the installation and configuration for all VP Agent components

More information

Ahsay Online Backup. MS Exchange Mail Level Backup

Ahsay Online Backup. MS Exchange Mail Level Backup Version 5.1 May 2006 Table of Content 1 Introduction...3 2 How To - Backup Individual Emails...3 2.1 Granting Full Mailbox Access Privileges...3 2.1.1 For one specific mailbox...3 2.1.2 For mailboxes located

More information

HP Virtual Connect Enterprise Manager

HP Virtual Connect Enterprise Manager HP Virtual Connect Enterprise Manager Data Migration Guide HP Part Number: 487488-001 Published: April 2008, first edition Copyright 2008 Hewlett-Packard Development Company, L.P. Legal Notices Confidential

More information

Table of Contents. Page 1 of 130

Table of Contents. Page 1 of 130 Page 1 of 130 Features - DB2 idataagent Table of Contents Overview System Requirements - DB2 idataagent Installation Install the DB2 idataagent - Windows Install the DB2 idataagent - Unix Install the DB2

More information

Database Backup Restore

Database Backup Restore The following describes how to restore the controller database after a failed upgrade, and reinstall the upgrade., page 1 If a controller upgrade fails, you can uninstall the upgrade, restore the controller

More information

How to recover from a forgotten administrator password

How to recover from a forgotten administrator password How to recover from a forgotten administrator password By default, Tekron clocks do not provide any means to bypass the password requirement to gain access. This means that in the case of a forgotten administrator

More information

Data Manager. Scheduling Data Backup CHAPTER

Data Manager. Scheduling Data Backup CHAPTER CHAPTER 9 To access Data management tasks, log into the system (see Logging In section on page 2-1). Then, from the Home page, click the Tools tab. The Tools page appears. From the Tools page, click. The

More information

29 March 2017 SECURITY SERVER INSTALLATION GUIDE

29 March 2017 SECURITY SERVER INSTALLATION GUIDE 29 March 2017 SECURITY SERVER INSTALLATION GUIDE Contents 1. Introduction... 2 1.1 Assumptions... 2 1.2 Prerequisites... 2 2. Required setups prior the Security Server Installation... 3 1.1 Create domain

More information

ADSM Operation & Management Experiences With TME 10

ADSM Operation & Management Experiences With TME 10 International Technical Support Organization Center ADSM Operation & Management Experiences With TME 10 Tim Mortimer Center MORTIMT@US.IBM.COM 1 of 18 Agenda ADSM operational challenges Tivoli introduction

More information

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts,

More information

Manual HR & Payroll v2011 Restores Using Tape Backups

Manual HR & Payroll v2011 Restores Using Tape Backups Manual HR & Payroll v2011 Restores Using Tape Backups Introduction Sage provides multiple scripts for performing backups of your Payroll v2011 system. Details of these scripts and how they work can be

More information

Deploy IBM Spectrum Control Virtual Appliance into VMware Workstation V10.0 or later IBM

Deploy IBM Spectrum Control Virtual Appliance into VMware Workstation V10.0 or later IBM Deploy IBM Spectrum Control Virtual Appliance into VMware Workstation V10.0 or later IBM ii Deploy IBM Spectrum Control Virtual Appliance into VMware Workstation V10.0 or later Contents Deploy IBM Spectrum

More information

Inventory File Data with Snap Enterprise Data Replicator (Snap EDR)

Inventory File Data with Snap Enterprise Data Replicator (Snap EDR) TECHNICAL OVERVIEW File Data with Snap Enterprise Data Replicator (Snap EDR) Contents 1. Abstract...1 2. Introduction to Snap EDR...1 2.1. Product Architecture...2 3. System Setup and Software Installation...3

More information

Troubleshooting Cisco APIC-EM Single and Multi-Host

Troubleshooting Cisco APIC-EM Single and Multi-Host Troubleshooting Cisco APIC-EM Single and Multi-Host The following information may be used to troubleshoot Cisco APIC-EM single and multi-host: Recovery Procedures for Cisco APIC-EM Node Failures, page

More information

Configuring the Management Interface and Security

Configuring the Management Interface and Security CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various

More information

Esko. Suite 12 Engines Installation (Beta)

Esko. Suite 12 Engines Installation (Beta) Suite 12 Engines Installation (Beta) Contents 1. Before installing Suite 12... 3 1.1 How to change Data Execution Prevention (DEP) Settings...3 1.2 How to change the password policy... 4 2. How to install

More information

User and System Administration

User and System Administration CHAPTER 5 This chapter provides information about performing user and system administration tasks in Cisco Prime Network Analysis Module 5.1and generating diagnostic information for obtaining technical

More information

Copyright(C) NEC Corporation All rights reserved.

Copyright(C) NEC Corporation All rights reserved. MasterScope MISSION CRITICAL OPERATIONS /SystemManager/Application Navigator Command Reference (Help differences) TopologyCmd LIST TopologyCmd IMPORT TopologyCmd EXPORT Copyright(C) NEC Corporation 2015.

More information

INSTALL VERITAS BACKUP EXEC v ON WINDOWS SERVER 2019 DOMAIN CONTROLLER

INSTALL VERITAS BACKUP EXEC v ON WINDOWS SERVER 2019 DOMAIN CONTROLLER INSTALL VERITAS BACKUP EXEC v20.3.1188 ON WINDOWS SERVER 2019 DOMAIN CONTROLLER First download trial copy from Veritas site or from this link https://www.teamos-hkrg.com/index.php?threads/symantec-veritas-backup-exec-20-2-1188-1650-

More information

AccessData FTK Quick Installation Guide

AccessData FTK Quick Installation Guide AccessData FTK Quick Installation Guide Document date: May 20, 2014 2014 AccessData Group, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system,

More information

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page. Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator

More information

ClearCase VOB Database Troubleshooting

ClearCase VOB Database Troubleshooting file:///c /Documents%20and%20Settings/avaughan/Desktop/getstart/la...tm/Rational%20-%20ClearCase%20VOB%20Database%20.htm ClearCase VOB Database By Carem Bennett ClearCase VOBs use a proprietary database

More information

Tivoli Web Solutions. Upgrade Notes

Tivoli Web Solutions. Upgrade Notes Tivoli Web Solutions Upgrade Notes Tivoli Web Solutions Upgrade Notes Note Before using this information and the product it supports, read the information in Notices on page 7. IBM Tivoli Web Solutions

More information

Pension System/Windows. Installation Guide

Pension System/Windows. Installation Guide Pension System/Windows Installation Guide Updated for Microsoft SQL Server 2014 & MS SQL Express 2014 DATAIR Employee Benefit Systems, Inc. 735 N. Cass Ave. Westmont, IL 60559-1100 V: (630) 325-2600 F:

More information

Recycle Bin. Overview. Recycling Files

Recycle Bin. Overview. Recycling Files Recycle Bin Overview The Recycle Bin is a tool inside OU Campus that allows users to "recycle" files on the staging server as opposed to permanently deleting them. This is helpful, as it reduces the damage

More information

Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration

Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Modified 2-22-14 Objectives Describe the enumeration step of security testing Enumerate Microsoft OS targets Enumerate NetWare OS targets

More information

UPGRADE GUIDE. Campaign Manager 6.0

UPGRADE GUIDE. Campaign Manager 6.0 UPGRADE GUIDE Campaign Manager 6.0 VERSION CONTROL Version Date Author Changes 1.0 28 April 2017 D Cooper Release RELATED DOCUMENTS The related documents are located in the Alterian product help. Name

More information

ProductCenter Database Merge Utility Release Notes

ProductCenter Database Merge Utility Release Notes ProductCenter Database Merge Utility Release Notes Release 8.4.0 January, 2006 NorthRidge Software, LLC www.nridge.com (603) 434-2525 CONTENTS Introduction... 3 Database Roles... 3 How it Works... 4 Importance

More information

Administrator for Enterprise Clients: User s Guide. Second Edition

Administrator for Enterprise Clients: User s Guide. Second Edition Administrator for Enterprise Clients: User s Guide Second Edition The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2002. Administrator for Enterprise Clients: User s

More information

Road map for a Typical installation of IBM Tivoli Monitoring, Version 5.1.0

Road map for a Typical installation of IBM Tivoli Monitoring, Version 5.1.0 Road map for a Typical installation of IBM Tivoli Monitoring, Version 5.1.0 Objective To use an installation wizard to deploy IBM Tivoli Monitoring and the Tivoli Management Framework in a typical Tivoli

More information

Configuration Store Setup Guide

Configuration Store Setup Guide Configuration Store Setup Guide Version 1.6 Corresponding Software Version Celonis 4.3 This document is copyright of the Celonis SE. Distribution or reproduction are only permitted by written approval

More information

Housekeeping for SAP HANA Platform

Housekeeping for SAP HANA Platform RollOut Guide SAP Business One, version for SAP HANA Document Version: 1.0 2018-11-07 Typographic Conventions Type Style Example Example EXAMPLE Example Example Description Words or characters

More information

Contents. 1 Introduction... 2 Introduction to Installing and Configuring LEI... 4 Upgrading NotesPump to LEI...

Contents. 1 Introduction... 2 Introduction to Installing and Configuring LEI... 4 Upgrading NotesPump to LEI... Contents 1 Introduction... Organization of this Manual... Related Documentation... LEI and DECS Documentation... Other Documentation... Getting Started with Lotus Enterprise Integrator... 2 Introduction

More information

Traverse Intelligent Tracking by PCS. Installation Guide for Traverse.

Traverse Intelligent Tracking by PCS. Installation Guide for Traverse. Traverse Intelligent Tracking by PCS Installation Guide for Traverse. Tom Romeo 6/10/2011 The information in this documentation is not contractual in nature. It is subject to modification without notice.

More information