Security Correlation Server Backup and Recovery Guide

Size: px
Start display at page:

Download "Security Correlation Server Backup and Recovery Guide"

Transcription

1 CorreLog Security Correlation Server Backup and Recovery Guide This guide provides information to assist administrators and operators with backing up the configuration and archive data of the CorreLog server, and restoring this data. The information presented here will be useful to administrators responsible for maintaining the CorreLog system, as well as backup operators, developers, and IT managers, with application in disaster recovery and other areas. CorrreLog Server provides various options to retain backup copies of files and configuration data in an online state. Additionally, CorreLog provides flexible elements that can be configured by a user to backup log data on the system to removable media, including the ability to execute periodic backup scripts, and log the success or failure of these operations for further analysis. These features are described here, to permit easy integration with existing backup software and enterprise operations. Backup and Recovery of Configuration Data CorreLog maintains its primary configuration data in the "CorreLog\config" directory of the system within a series of files that have a ".cnf" extension. The user can backup almost all of the configuration data of the system by simply backing up this single folder. In addition to the "config" directory above, several other locations and folders exist that contain configuration data requiring periodic backup. The following folders contain configuration data items that should be routinely backed up for data storage. Generally, these directories contain a small amount of data, and are easily backed up.

2 Note that files can be copied while CorreLog executes, and backup of these files does not require CorreLog to be stopped. CorreLog\actions Folder This folder contains the "Correlation > Actions" scripts of the system. This folder should be routinely backed up to capture any special files or modifications to existing scripts. The folder typically contains less than 100 Kbytes of data. CorreLog\c-alerts Folder This folder contains the "Alerts > Custom" scripts of the system. This folder should be routinely backed up to capture any special files or modifications to existing scripts. The folder typically contains less than 100 Kbytes of data. CorreLog\config Folder This folder (and all of its subfolders) contains the main configuration data of the system, including templates, installation defaults, and checkpoints. This folder contains virtually all the configuration data of the system (with a few notable exceptions, described here). The folder typically contains less than 1 Mbytes of data. CorreLog\dash Folder This folder (and all of its subfolders) contains the configuration items associated with the dashboard facility, which works with the data in the "CorreLog\config" folder listed above. This folder typically contains less than 100 Kbytes of data. CorreLog\graph Folder This folder contains graph configuration files for use with the CorreLog graph viewer. These files are normally edited via the Graph Screen. The folder typically contains less than 100 Kbytes of data. CorreLog\t-actions Folder This folder contains the "Correlation > Ticket Actions" scripts of the system. This folder should be routinely backed up to capture any special files or modifications to existing scripts. The folder typically contains less than 100 Kbytes of data. CorreLog\tickets Folder This folder contains the ticket data of the system scripts. This folder should be routinely backed up to capture ticket information on the system. The folder typically contains less than 10 Mbytes of data. Note that CorreLog does not need to be stopped in order to backup the above files. However, to restore any file within these directories, CorreLog should be first stopped, and then restarted. (This is because the above files are read by CorreLog processes on service startup, and then periodically overwritten with new data.) Backup and Recovery Guide, Page 2

3 Special Configuration Data Recovery Functions CorreLog provides two other functions to allow rapid restoration of configuration data (as an alternative to restoring a backup of data, as explained above.) These two functions allow the user to quickly restore a particular configuration file, useful if a configuration change needs to be eliminated or reverted to the previous day. These features are explained below in more detail. "Yesterday" Template File. As a standard function, CorreLog will automatically store configuration data items associated with the Correlation Engine each night at midnight. This data is stored in a special "Template" file called "Yesterday", which can be loaded by the operator via the "Correlation > Config > Templates" facility. This allows the operator to quickly revert the "Threads", "Alerts", "Macros", "Address Groups" and other items to their previous version, which existed at midnight. Checkpoint Files. CorreLog creates a checkpoint of all configuration data and status data each night, and stores this data in the "CorreLog\config\$chkpt" directory of the system. Each night, at midnight, all configuration files are copied to this directory, and appended the day of the week (where 0=Sunday and 6=Saturday.) To restore these files, the user must (1) locate the particular configuration file in the CorreLog\config\$chkpt" directory; (2) stop the CorreLog Server; (3) copy the file to the correct location in the "config" directory and; (4) restart the CorreLog server. Backup of Log Data And Archives The vast majority of CorreLog operational data resides in the "log" and "archive" folders of the system. This data can constitute an enormous amount of data (potentially Terabytes of log data) so the backup of this data is an important consideration. CorreLog provides several techniques to accomplish this, described here. Direct Backup Of Log Data The user can perform an incremental backup of the "archive" and "logs" directory to tape or other media, using a variety of commercial software. In this case, an important consideration is to realize that only newly logs should be backed up, to conserve storage. (Otherwise, a full backup may exceed the capacity of most backup systems.) Forwarding Syslog Messages to Other Receiver The administrator can forward log files to a second copy of the CorreLog server that exists strictly for this purpose. In this case, the user configures the master CorreLog server to forward all log messages using the "Messages > Config > Backup and Recovery Guide, Page 3

4 Forwarding" screen of the system. The backup copy of CorreLog can also serve as a "hot swappable" version of the system. Schedule Copy or FTP Push of Archives The administrator can create a simple script that pushes the archive data to another server (possibly a UNIX server, or other windows server) at nightly intervals. This script can be executed via the CorreLog "System > Scheduler" function to perform a daily backup, weekly backup, or monthly backup. Restoration of Log Data Restoration of log data (from an archive file, or system backup) is not particular difficult, but it may be required to re-index this data and regenerate catalogs of this data to fully restore the entire configuration of the CorreLog Server. Restoration of Log Data The user can restore log data to the system from an archive file by simply unzipping the archive into the CorreLog "logs" directory. (The location of the logs data directory is configured on the "Messages > Config > Parms" screen.) The Administrator can execute the "RestoreArc.exe" program (documented below) to simplify this operation. Restoration of Catalog Data Restoration of log data does not necessarily rebuild all the catalogs with this information. To restore the catalog data, the user may have to re-index and regenerate all the catalogs using the "RestoreArc.exe -index" option or the "CGenx.exe" program (in the "cli-bin" directory.) These commands are documented in more detail within the next several sections. Note that, when restoring an archive file, the operator can first search for the appropriate archive via the "Reports > Query" function, which allows the user to search compressed archive files on the system. Once the archive file is located, the operator simply executes "RestoreArc.exe" to place the contents of the compressed file into the "logs" directory. Restoring Archive Data With "RestoreArc.exe" The easiest way to restore a single archive file for a specific date is to use the "RestoreArc.exe" program, which is a standard utility found in the "system" folder of the CorreLog Server. This utility unzips the archive, then re-indexes the keyword list, and optionally re-indexes all the various other index files, used by the "Devices", "Users", "Facilities", "Severities", and "Threads" screens. Backup and Recovery Guide, Page 4

5 To restore a log file from an archive file, the user creates an administrative command prompt, and issues the following command in the "CorreLog\system" directory. (The date below of is substituted for the date of the archive file.) RestoreArc.exe overwrite The above command unzips the archive file, and places it in the correct location in the "logs" directory. The command also re-indexes the keyword list. This enables the " Search", " Query", and the " Graph" screens to access the data. HOWEVER, this does not update any of the catalog data (i.e. the "Devices", "Users", "Facilities", "Severities", or "Threads" screen.) To make data accessible to these screens, also execute the following command. RestoreArc.exe index The above command can take some time to execute; hence it must be explicitly executed. (Depending on the size of the log file, the above command can take several minutes or even several hours to complete) Executing the "RestoreArc.exe" command with no arguments displays brief but complete help on the command usage and argument syntax. Repairing And Re-indexing Data With "CGenx.exe" As an alternative to executing the "RestoreArc.exe" program with the "-index" option, the administrator can also execute the "CGenx.exe" command line utility to rebuild index files. This command is documented in the "Command Line Interface (CLI) User Manual", which is available in the "s-doc" directory of each CorreLog installation. (The "RestoreArc.exe (date) index" command is an alias for the "CGenx.exe all (date)" command. The "CGenx.exe" program permits the operator to individually re-index any catalog on the system, and provides an equivalent (but slightly more flexible) interface than the "RestoreArc.exe" program. The "CGenx.exe" program is also useful for fixing corrupt index files that may cause "Unformatted Text" messages to appear on certain message list screens. Backup of Agent Configurations As a special note, the operator can backup the configuration files of agents using the "rsmconf.exe download" command line utility. This script downloads a configuration file from a specified agent that can later be uploaded to the same agent or some other agent to affect recovery functions. Backup and Recovery Guide, Page 5

6 Detailed notes on the "rsmconf.exe" utility are included in the "Windows Tool Set User Manual", Section 5. (This manual is available from the "Home" screen of the CorreLog Server, after user login.) The agent configuration files reside at the physical location of the managed platforms, and the data is not immediately available for backup at the CorreLog Server. If the CorreLog site has many strategic agent configurations, it may be useful to create a small batch file to backup these agents. For example, the user can create a simple batch file as follows that will copy the agent configurations to an Agent-Backup folder. This script could be launched via the CorreLog "Scheduler" routine at periodic intervals (such as each day.) REM: # BACKUP_AGENTS.bat REM: # Backup strategic CorreLog Agent configurations. if not exist..\agent-backup mkdir..\agent-backup rsmconf.exe download >..\Agent-Backup\1_1_1_1.bak rsmconf.exe download >..\Agent-Backup\1_1_1_2.bak rsmconf.exe download >..\Agent-Backup\1_1_1_3.bak rsmconf.exe download >..\Agent-Backup\1_1_1_4.bak echo Agent Backup completed. REM # Agent config backup complete. No further action is required. REM # Finished The above script can be edited to supply the list of strategic agents, and placed in the "system" directory of the CorreLog Server. Then, the script can be periodically executed (such as with the "Scheduler" function) to copy the agent configurations from remote agents to the local machine. The "Agent-Backup" folder will then retain the latest copies of the agent programs. Agent configurations can then be restored (if needed) by uploading the values back to the agents using the "rsmconf.exe upload" option (or using the "Directly Edit Remote Agent Config" link on the CorreLog Server platform.) The above script can be improved to first download the agent configuration to a temporary file, then copy the files into the "Agent-Backup" folder once all downloads are successful. (This provides a hedge against overwriting a backup with an empty file when the agent is not accessible for some reason.) Executing the "rsmconf.exe" program with no arguments provides brief but complete help on the usage of this program, which can also be used to check configuration data. Backup and Recovery Guide, Page 6

7 Example Configuration Data Backup Script An example configuration data backup script is provided below. The information below can be (1) cut and paste to a batch file; (2) modified by the administrator to adjust parameters; (3) placed in the "CorreLog\System" directory, and then (4) launched by the "System > Schedule" function of CorreLog. As written below, the configuration data backup script places the CorreLog system configuration data onto the "D\:" drive, in a directory with the same name as today's date. The script below can be modified by an administrator to change its operating characteristics. REM # BACKUP_CONFIG.bat REM # This script creates a folder on the "D:" drive with today's REM # date, and copies all config data of the system into that location REM # This is the location where files are stored: set BACKUP_DIRECTORY=D:\CorreLog_Config REM # Get today's date in YYYY-MM-DD format: FOR /F "tokens=1-4 delims=/ " %%I in ('date /t') do ( set FILEDATE=%%L-%%J-%%K ) set MAIN_DIRECTORY=%BACKUP_DIRECTORY%\%FILEDATE% REM # Make subdirectories: mkdir %MAIN_DIRECTORY%\actions mkdir %MAIN_DIRECTORY%\c-alerts mkdir %MAIN_DIRECTORY%\config mkdir %MAIN_DIRECTORY%\dash\config mkdir %MAIN_DIRECTORY%\dash\layouts mkdir %MAIN_DIRECTORY%\graph mkdir %MAIN_DIRECTORY%\t-action mkdir %MAIN_DIRECTORY%\tickets REM # Copy files here. copy..\actions\*.* %MAIN_DIRECTORY%\actions copy..\c-alerts\*.* %MAIN_DIRECTORY%\c-alerts copy..\config\*.* %MAIN_DIRECTORY%\config copy..\dash\config\*.* %MAIN_DIRECTORY%\dash\config copy..\dash\layouts\*.* %MAIN_DIRECTORY%\dash\layouts copy..\graph\*.* %MAIN_DIRECTORY%\graphs copy..\t-actions\*.* %MAIN_DIRECTORY%\t-actions copy..\tickets\*.* %MAIN_DIRECTORY%\tickets REM # Config backup complete. No further action is required. REM # Finished Backup and Recovery Guide, Page 7

8 Example Archive Data Backup Script An example archive data backup script is provided below. The information below can be (1) cut and paste to a batch file; (2) modified by the administrator to adjust parameters; (3) placed in the "CorreLog\System" directory, and then (4) launched by the "System > Schedule" function of CorreLog. As written below, the log data backup script copies CorreLog system archive data onto the "D\:" drive, in a directory with the same directory structure as the CorreLog archive folder. Only archives that have not been previously backed up are copied, to conserve disk space and CPU. The script below can be modified by an administrator to change its operating characteristics, such as to additionally backup message digest files, or the raw log file data of the system. REM # BACKUP_ARC.bat REM # This script backs up all the archive files to a location on REM # the D:\ drive configured by the operator below. The script REM # can be launched by the CorreLog "System > Schedule" function REM # daily basis to copy ONLY new archive files. REM # This is the location where files are stored: set ADIR=D:\CorreLog_Archive REM # Get today's year value: FOR /F "tokens=4 delims=/ " %%I in ('date /t') do set YEAR=%%I REM # Make the backup directory structure. mkdir %ADIR% mkdir %ADIR%\archive\ mkdir %ADIR%\archive\%YEAR% REM # Copy the archive files, only if they have not been previously REM # copied by this script. FOR %%I in (..\archive\%year%\*.gz ) do ( ) if NOT EXIST %ADIR%\archive\%%I COPY %%I %ADIR%\archive\%%I REM # Archive backup complete. No further action is required. REM # Finished. Backup and Recovery Guide, Page 8

9 Remote Configuration Backup via HTTP and ZIP It is fairly easy to configure the HTTP server and ZIP program to backup configuration data, initiated by a remote HTTP request. This technique may be useful for situations such as failover, disaster recovery, or simple remote storage of backups. The script below can be placed in the "x-cg\r-backup.bat" folder, and then an HTTP request (such as via the wget.exe utility) can generate the backup and then download the backup ZIP file. This requires permissions to be modified for the "x-cgi" folder via a modification to the "htaccess.txt" file in that directory. REM: # R-BACKUP.bat REM: # Backup a files to the BACKUP_FILE_NAME zip file REM: # This script can be launched via an HTTP request by REM: # Storing this file in the "CorreLog\x-cgi" folder, REM: # and modifying the "htaccess.txt" file in that folder. set BACKUP_FILE_NAME=..\s-html\BACKUP.zip REM: These are the folders to backup. ( echo../advisory echo../audit echo../c-alerts echo../config echo../dash echo../etext echo../excel echo../graph echo../net-snmp echo../net-user echo../query echo../s-html echo../t-actions echo../temp echo../u-agent )> ziplist.txt REM: # Zip the files here. del /f %BACKUP_FILE_NAME% type ziplist.txt..\system\zip.exe -r -@ %BACKUP_FILE_NAME% del /f ziplist.txt REM: # Finished. The BACKUP_FILE_NAME has been created. Note that the "x-cgi" CGI folder normally requires authentication to execute any program therein. The "htaccess.txt" file in that folder should be modified to permit the R- BACKUP.bat file above to be launched from a specific IP address or machine. The resulting BACKUP.zip file can then be downloaded as a separate operation. Backup and Recovery Guide, Page 9

10 Creating a Custom Configuration Package Using the techniques discussed in this manual, an operator can easily create a custom configuration package that can assist with deployment of the software at multiple sites. For example, if the CorreLog Server is to be installed and configured at may different locations, and a special target configuration exists, the operator can create a zip file (or other archive file) containing the desired configuration data of the system, and then unzip these files into the CorreLog Server root directory to effect an immediate configuration of the system. The configuration data of a site resides in specific folders, similar to the data previously identified, as follows: CorreLog\config Folder This folder (and all of its subfolders) contains the main configuration data of the system, including templates, installation defaults, and checkpoints. The user should include this directory in any custom package. CorreLog\actions Folder This folder contains the "Correlation > Actions" scripts of the system. The user may include these files in a custom package if there are one or more special "bat" programs referenced by the "Correlation Actions" screen. CorreLog\c-alerts Folder This folder contains the "Alerts > Custom" scripts of the system. The user may include these files in a custom configuration package if there are one or more special "bat" programs referenced by the "Custom Alerts" screen. CorreLog\dash Folder This folder (and all of its subfolders) contains the configuration items associated with the dashboard facility, which works with the data in the "CorreLog\config" folder listed above. The user may include these files in a custom package if there are any special dashboard elements. CorreLog\graph Folder This folder contains graph configuration files for use with the CorreLog graph viewer. The user may include these files in a custom package if there are any special graphs. CorreLog\t-actions Folder This folder contains the "Correlation > Ticket Actions" scripts of the system. The user may include these files in a custom package if there are one or more special "bat" files referenced by the "Ticket Actions" screen. Backup and Recovery Guide, Page 10

11 To create a custom package, the operator executes the following procedure. 1. The operator identifies a "Master" CorreLog site, and configures the CorreLog Server as desired, including dashboards, threads, alerts, and other necessary configuration data. 2. The operator creates a Zip file (or other archive file) containing the various directories and files identified at the start of this section. The resulting archive will be a relatively small package, typically less than 100 Kbytes in size, which is easily redistributed to other sites. 3. At a new site, the operator installs the COTS CorreLog Server software using the standard installation procedure documented in the "CorreLog Installation and Quick Start" manual. 4. After installation is complete, the operator stops the CorreLog Server Framework Service, extracts files from the package prepared in step (2) above, and then restarts the CorreLog Server. The above steps are sufficient to configure the CorreLog Server dashboards, threads, alerts, custom actions, and other items represented in the master site, with no other action necessary on the part of the end-user of the site. Note that variations to the above procedure are possible, such as including additional screens and documentation, or dynamic creation of threads and alerts based upon external data, and installation of plug-in components that may be necessary or desireable. Backup and Recovery Guide, Page 11

12 Professional Services CorreLog, Inc. provides professional services to assist in all phases of deployment activities, and assists with all deployment and operational issues through its support division. Prior to deploying CorreLog Server (whether a small single-tier deployment or a large multi-tier deployment) licensed users are encouraged to contact CorreLog for a detailed discussion of options and capabilities. Further information on installation is available from the "Home" page of each CorreLog installation, and is contained in the comprehensive documentation accompanying the product. Refer to the "Installation and Quick Start Guide" for additional information For Additional Help Detailed specifications regarding the CorreLog Server, add-on components, and resources are available from our corporate website. Test software may be downloaded for immediate evaluation. Additionally, CorreLog is pleased to support proof-ofconcepts, and provide technology proposals and demonstrations on request. CorreLog, Inc., a privately held corporation, has produced software and framework components used successfully by hundreds of government and private operations worldwide. We deliver security information and event management (SIEM) software, combined with deep correlation functions, and advanced security solutions. CorreLog markets its solutions directly and through partners. We are committed to advancing and redefining the state-of-art of system management, using open and standards-based protocols and methods. Visit our website today for more information. CorreLog, Inc. mailto:support@correlog.com Backup and Recovery Guide, Page 12

Security Correlation Server Redundancy And Failover Guide

Security Correlation Server Redundancy And Failover Guide CorreLog Security Correlation Server Redundancy And Failover Guide This document provides a discussion of techniques to implement CorreLog Server redundancy and failover, for high-availability usage of

More information

Security Correlation Server System Deployment and Planning Guide

Security Correlation Server System Deployment and Planning Guide CorreLog Security Correlation Server System Deployment and Planning Guide The CorreLog Server provides a method of collecting security information contained in log messages generated by network devices

More information

CorreLog. SNMP Trap Monitor Software Users Manual

CorreLog. SNMP Trap Monitor Software Users Manual CorreLog SNMP Trap Monitor Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, SNMP Trap Monitor Software Manual Copyright 2008-2017, CorreLog, Inc. All rights reserved. No

More information

CorreLog. LDAP Interface Software Toolkit Users Manual

CorreLog. LDAP Interface Software Toolkit Users Manual CorreLog LDAP Interface Software Toolkit Users Manual http://www.correlog.com mailto:support@correlog.com CorreLog, LDAP Interface Software Toolkit Manual Copyright 2008-2018, CorreLog, Inc. All rights

More information

CorreLog. SQL Table Monitor Adapter Users Manual

CorreLog. SQL Table Monitor Adapter Users Manual CorreLog SQL Table Monitor Adapter Users Manual http://www.correlog.com mailto:support@correlog.com CorreLog, SQL Table Monitor Users Manual Copyright 2008-2018, CorreLog, Inc. All rights reserved. No

More information

CorreLog. Ping Monitor Adapter Software Users Manual

CorreLog. Ping Monitor Adapter Software Users Manual CorreLog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, Ping Monitor Users Manual Copyright 2008-2017, CorreLog, Inc. All rights reserved. No part

More information

CorreLog. Command Line Interface (CLI) Users Manual

CorreLog. Command Line Interface (CLI) Users Manual CorreLog Command Line Interface (CLI) Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, Command Line Interface (CLI) Users Manual Copyright 2008-2018, CorreLog, Inc. All rights reserved.

More information

CorreLog. File Integrity Monitor (FIM) User Reference Manual

CorreLog. File Integrity Monitor (FIM) User Reference Manual CorreLog File Integrity Monitor (FIM) User Reference Manual http://www.correlog.com mailto:info@correlog.com CorreLog FIM, User Reference Manual Copyright 2008-2018, CorreLog, Inc. All rights reserved.

More information

orrelog Security Correlation Server User Reference Manual

orrelog Security Correlation Server User Reference Manual orrelog Security Correlation Server User Reference Manual http://www.correlog.com mailto:info@correlog.com CorreLog, User Reference Manual Copyright 2008 2015, CorreLog, Inc. All rights reserved. No part

More information

Technical Response Logging and Monitoring Requirements December 23, 2010

Technical Response Logging and Monitoring Requirements December 23, 2010 Technical Response Logging and Monitoring Requirements December 23, 2010 This technical response documents the capabilities of CorreLog, Inc., Logging and Monitoring Summary and Recommendations. A high-level

More information

CorreLog IP Block List and Reputation Database Application Notes

CorreLog IP Block List and Reputation Database Application Notes CorreLog IP Block List and Reputation Database Application Notes As a standard feature of the CorreLog Server software, CorreLog Inc. synthesizes and maintains a robust list of IP address subnets with

More information

Common Management Database Database Definition & User Guide

Common Management Database Database Definition & User Guide orrelog Common Management Database Database Definition & User Guide This guide provides brief information on the tables accompanying the Common Management Database (CMDB) Adapter of the CorreLog Server.

More information

White Paper Integrating The CorreLog Security Correlation Server with McAfee epolicy Orchestrator (epo)

White Paper Integrating The CorreLog Security Correlation Server with McAfee epolicy Orchestrator (epo) orrelogtm White Paper Integrating The CorreLog Security Correlation Server with McAfee epolicy Orchestrator (epo) This white paper provides a detailed discussion of objectives and methodologies for integrating

More information

NETWRIX GROUP POLICY CHANGE REPORTER

NETWRIX GROUP POLICY CHANGE REPORTER NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

orrelog File Integrity Monitor (FIM) User Reference Manual

orrelog File Integrity Monitor (FIM) User Reference Manual orrelog File Integrity Monitor (FIM) User Reference Manual http://www.correlog.com mailto:info@correlog.com Section 1: Introduction This document contains installation and application notes regarding the

More information

Exam : Title : Administration of Symantec Backup Exec 12 for Windows Server. Version : Demo

Exam : Title : Administration of Symantec Backup Exec 12 for Windows Server. Version : Demo Exam : 251-312 Title : Administration of Symantec Backup Exec 12 for Windows Server Version : Demo 1. What does the Backup Exec Environment Check utility verify to ensure that the installation process

More information

Backing Up and Restoring Cisco Unity Connection Components

Backing Up and Restoring Cisco Unity Connection Components Backing Up and Restoring Cisco Unity Connection Components About Cobras You must take the backup of Cisco Unity Connection components to avoid loosing any data or messages. The following are the tools

More information

Using the Backup module

Using the Backup module Using the Backup module THIS WIKI HAS BEEN UPDATED FOR VERSION 13 OF YOUR PBX GUI. Overview Logging In Menu Items Backups Restores Servers Templates Backup Settings Backup Name Description Status Email

More information

CorreLog. Apache TLS / Crypto Enhanced Encryption Software

CorreLog. Apache TLS / Crypto Enhanced Encryption Software CorreLog Apache TLS / Crypto Enhanced Encryption Software http://www.correlog.com mailto:info@correlog.com CorreLog, Enhanced Encryption Software Manual Copyright 2008-2018, CorreLog, Inc. All rights reserved.

More information

Designing Data Protection Strategies for Lotus Domino

Designing Data Protection Strategies for Lotus Domino WHITE PAPER Designing Data Protection Strategies for Lotus Domino VERITAS Backup Exec 9.0 for Windows Servers Agent for Lotus Domino VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Introduction...3

More information

Administration of Symantec Backup Exec 12 fo Windows Server Exam.

Administration of Symantec Backup Exec 12 fo Windows Server Exam. SYMANTEC 250-312 Administration of Symantec Backup Exec 12 fo Windows Server Exam TYPE: DEMO http://www.examskey.com/250-312.html Examskey SYMANTEC 250-312 exam demo product is here for you to test the

More information

Cisco Unified CM Disaster Recovery System

Cisco Unified CM Disaster Recovery System Cisco Unified CM Disaster Recovery System Disaster Recovery System, page 1 Quick-reference tables for backup and restore procedures, page 3 Supported features and components, page 5 System requirements,

More information

Real4Test. Real IT Certification Exam Study materials/braindumps

Real4Test.   Real IT Certification Exam Study materials/braindumps Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 250-312 Title : Administration of Symantec Backup Exec 12 for Windows Server Vendors : Symantec Version :

More information

Database Administration

Database Administration Unified CCE, on page 1 Historical Data, on page 2 Database Statistics, on page 3 Tool, on page 3 Database Sizing Estimator Tool, on page 11 Administration & Data Server with Historical Data Server Setup,

More information

Introduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault

Introduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault Introduction What is Microsoft Data Protection Manager (DPM)? The Microsoft Data Protection Manager is a member of the Microsoft System Center family of management products. DPM provides continuous data

More information

HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version :

HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version : HP HP0-771 Designing and Implementing HP Enterprise Backup Solutions Download Full Version : http://killexams.com/pass4sure/exam-detail/hp0-771 A. copy backup B. normal backup C. differential backup D.

More information

RazorSafe 7-Series Remote Backup and NAS Support

RazorSafe 7-Series Remote Backup and NAS Support RazorSafe 7-Series Remote Backup and NAS Support Mirapoint Inc RazorSafe Mirapoint Inc TABLE OF CONTENTS Background... 3 Email Lifecycle... 3 Tape Backup Solution... 4 Raw Email Backup... 4 The Challenges...

More information

1. Initial Setting and Installation of ActiveVisor... 1

1. Initial Setting and Installation of ActiveVisor... 1 ActiveVisor Startup Guide 1 st Edition August, 2018 Contents 1. Initial Setting and Installation of ActiveVisor... 1 1.1 System Requirements... 1 1.2 Installation of ActiveVisor... 2 1.3 Initial Settings

More information

BusinessObjects XI Release 2

BusinessObjects XI Release 2 Overview Contents The purpose of this document is to outline recommended steps to back up and recover data for key BusinessObjects XI Release 2 system components. These procedures are used to mitigate

More information

Designing Data Protection Strategies for Lotus Domino

Designing Data Protection Strategies for Lotus Domino WHITE PAPER Designing Data Protection Strategies for Lotus Domino VERITAS Backup Exec 10 for Windows Servers Agent for Lotus Domino 1/17/2005 1 TABLE OF CONTENTS Executive Summary...3 Introduction to Lotus

More information

SAS 9.2 Enterprise Business Intelligence Audit and Performance Measurement for Windows Environments. Last Updated: May 23, 2012

SAS 9.2 Enterprise Business Intelligence Audit and Performance Measurement for Windows Environments. Last Updated: May 23, 2012 SAS 9.2 Enterprise Business Intelligence Audit and Performance Measurement for Windows Environments Last Updated: May 23, 2012 Copyright Notice The correct bibliographic citation for this manual is as

More information

What s New In Sawmill 8 Why Should I Upgrade To Sawmill 8?

What s New In Sawmill 8 Why Should I Upgrade To Sawmill 8? What s New In Sawmill 8 Why Should I Upgrade To Sawmill 8? Sawmill 8 is a major new version of Sawmill, the result of several years of development. Nearly every aspect of Sawmill has been enhanced, and

More information

Database Administration

Database Administration Unified CCE, page 1 Historical Data, page 2 Tool, page 3 Database Sizing Estimator Tool, page 11 Administration & Data Server with Historical Data Server Setup, page 14 Database Size Monitoring, page 15

More information

CorreLog. Syslog Windows Tool Set (WTS) User Reference Manual

CorreLog. Syslog Windows Tool Set (WTS) User Reference Manual CorreLog Syslog Windows Tool Set (WTS) User Reference Manual http://www.correlog.com mailto:info@correlog.com CorreLog Syslog WTS, User Reference Manual Copyright 2008-2018, CorreLog, Inc. All rights reserved.

More information

Data Domain OpenStorage Primer

Data Domain OpenStorage Primer White Paper Data Domain OpenStorage Primer Abstract Data Domain s support for Symantec NetBackup OpenStorage enables the use of disk as disk, eliminating the need to emulate tape drives, tape cartridges,

More information

REO SERIES RA2000. Application Note for Creating a Disk-to-Disk (D2D) Backup Strategy Utilizing the RA2000 with VERITAS Backup Exec 8.

REO SERIES RA2000. Application Note for Creating a Disk-to-Disk (D2D) Backup Strategy Utilizing the RA2000 with VERITAS Backup Exec 8. Overland Storage REO SERIES RA2000 Application Note for Creating a Disk-to-Disk (D2D) Backup Strategy Utilizing the RA2000 with VERITAS Backup Exec 8.6 Overland Storage REO SERIES RA2000 Creating a D2D

More information

1. Overview... 2 Documentation... 2 Licensing... 2 File Archiving requirements... 2

1. Overview... 2 Documentation... 2 Licensing... 2 File Archiving requirements... 2 User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information

Backup Tab User Guide

Backup Tab User Guide Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...

More information

Backup and Restore Operations

Backup and Restore Operations Backup Data Type, page 1 Backup and Restore Repositories, page 2 On-Demand and Scheduled Backups, page 3 Cisco ISE Restore Operation, page 8 Export Authentication and Authorization Policy Configuration,

More information

Back Up and Restore Cisco DNA Center

Back Up and Restore Cisco DNA Center About Backup and Restore, page 1 Back Up the DNA Center, page 2 Restore DNA Center, page 3 About Backup and Restore The backup and restore procedure for DNA Center can be used for the following purposes:

More information

AuditConfigurationArchiveandSoftwareManagementChanges (Network Audit)

AuditConfigurationArchiveandSoftwareManagementChanges (Network Audit) This section contains the following topics: Audit Configuration Archive and Software Management Changes (Network Audit), on page 1 Audit Changes Made By Users (Change Audit), on page 1 Audit Actions Executed

More information

Microsoft Windows Server Administration Fundamentals. Download Full Version :

Microsoft Windows Server Administration Fundamentals. Download Full Version : Microsoft 98-365 Windows Server Administration Fundamentals Download Full Version : http://killexams.com/pass4sure/exam-detail/98-365 installation from a master computer to the destination computers. The

More information

DocAve 6 Platform Backup and Restore

DocAve 6 Platform Backup and Restore DocAve 6 Platform Backup and Restore User Guide Service Pack 2, Cumulative Update 2 Revision F Issued June 2013 DocAve 6: Archiver 1 Table of Contents About DocAve Platform Backup and Restore... 5 Complementary

More information

Perceptive TransForm E-Forms Manager

Perceptive TransForm E-Forms Manager Perceptive TransForm E-Forms Manager Installation and Setup Guide Version: 8.x Date: February 2017 2016-2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International Inc., registered

More information

CorreLog. CorreLog Agent For SAP SAP Audit Log Monitor Interface

CorreLog. CorreLog Agent For SAP SAP Audit Log Monitor Interface CorreLog CorreLog Agent For SAP SAP Audit Log Monitor Interface This application note describes how to install and configure the CorreLog Agent for SAP. The information herein supplements the CorreLog

More information

Rhapsody Interface Management and Administration

Rhapsody Interface Management and Administration Rhapsody Interface Management and Administration Welcome The Rhapsody Framework Rhapsody Processing Model Application and persistence store files Web Management Console Backups Route, communication and

More information

GMI-Cmd.exe Reference Manual GMI Command Utility General Management Interface Foundation

GMI-Cmd.exe Reference Manual GMI Command Utility General Management Interface Foundation GMI-Cmd.exe Reference Manual GMI Command Utility General Management Interface Foundation http://www.gmi-foundation.org Program Description The "GMI-Cmd.exe" program is a standard part of the GMI program

More information

Network Configuration Manager

Network Configuration Manager GETTING STARTED GUIDE Network Configuration Manager Version 7.9 Last Updated: Monday, December 10, 2018 GETTING STARTED GUIDE: NETWORK CONFIGURATION MANAGER 2018 SolarWinds Worldwide, LLC. All rights reserved.

More information

Cloud Compute. Backup Portal User Guide

Cloud Compute. Backup Portal User Guide Cloud Compute Backup Portal User Guide Contents Service Overview... 4 Gaining Access... 5 Operational Guide... 6 Landing Page... 6 Profile View... 6 Detailed View... 8 Overview... 8 Cloud Backup... 8

More information

User Guide. Version R95. English

User Guide. Version R95. English Cloud Backup User Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

orrelog Sigma Web Framework User And Developer Reference Manual

orrelog Sigma Web Framework User And Developer Reference Manual orrelog Sigma Web Framework User And Developer Reference Manual http://www.correlog.com mailto:info@correlog.com CorreLog Sigma Web Framework, User And Developer Reference Manual Copyright 2008-2015, CorreLog,

More information

Configuring Cisco TelePresence Manager

Configuring Cisco TelePresence Manager CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,

More information

Vault Backup Reference -Basic, Workgroup and Professional

Vault Backup Reference -Basic, Workgroup and Professional Vault Backup Reference -Basic, Workgroup and Professional Contents Introduction... 1 Example backup routine... 2 Explanation of backup routine... 3 Testing... 4 User permissions... 4 Vault Professional

More information

PRODUCT MANUAL. idashboards Reports Admin Manual. Version 9.1

PRODUCT MANUAL. idashboards Reports Admin Manual. Version 9.1 PRODUCT MANUAL idashboards Reports Admin Manual Version 9.1 idashboards Reports Admin Manual Version 9.1 No part of the computer software or this document may be reproduced or transmitted in any form or

More information

Utilities. Introduction. Working with SCE Platform Files. Working with Directories CHAPTER

Utilities. Introduction. Working with SCE Platform Files. Working with Directories CHAPTER CHAPTER 4 Revised: September 27, 2012, Introduction This chapter describes the following utilities: Working with SCE Platform Files, page 4-1 The User Log, page 4-5 Managing Syslog, page 4-8 Flow Capture,

More information

Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2)

Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2) Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2) Published: April 2, 2010 This guide provides an overview of the Disaster Recovery System, describes

More information

Modifying IPM Components

Modifying IPM Components CHAPTER 4 This chapter provides information on modifying IPM components. IPM components include collectors, source routers, target devices, and operations. Information is provided on viewing, updating,

More information

Contents George Road, Tampa, FL

Contents George Road, Tampa, FL 1 Contents CONTACTING VEEAM SOFTWARE... 5 Customer Support... 5 Online Support... 5 Company Contacts... 5 About this Guide... 6 About VEEAM Endpoint Backup For LabTech... 7 How It Works... 8 Discovery...

More information

Veritas NetBackup for Microsoft SQL Server Administrator's Guide

Veritas NetBackup for Microsoft SQL Server Administrator's Guide Veritas NetBackup for Microsoft SQL Server Administrator's Guide for Windows Release 8.1.1 Veritas NetBackup for Microsoft SQL Server Administrator's Guide Last updated: 2018-04-10 Document version:netbackup

More information

Nortel Quality Monitoring. Maintenance Guide NN

Nortel Quality Monitoring. Maintenance Guide NN NN44480-504 Document status: Standard Document version: 0102 Document date: 6 November 2009 All Rights Reserved While the information in this document is believed to be accurate and reliable, except as

More information

SAS 9.2 Enterprise Business Intelligence Audit and Performance Measurement for UNIX Environments. Last Updated: May 23, 2012

SAS 9.2 Enterprise Business Intelligence Audit and Performance Measurement for UNIX Environments. Last Updated: May 23, 2012 SAS 9.2 Enterprise Business Intelligence Audit and Performance Measurement for UNIX Environments Last Updated: May 23, 2012 Copyright Notice The correct bibliographic citation for this manual is as follows:

More information

Pearson System of Courses

Pearson System of Courses Pearson System of Courses Deploy with Windows Imaging Last updated: June 2018 Copyright 2018 Pearson, Inc. or its affiliates. All rights reserved. Table of Contents Deployment Process Overview 3 Prerequisites

More information

Help on the SPECTRUM Control Panel

Help on the SPECTRUM Control Panel Help on the SPECTRUM Control Panel The SPECTRUM Control Panel is a convenient Point and Click interface that provides facilities that let you configure SPECTRUM resources, start and stop SpectroSERVER,

More information

Backup and Restore Operations

Backup and Restore Operations Backup Data Type Backup Data Type, on page 1 Backup and Restore Repositories, on page 1 On-Demand and Scheduled Backups, on page 3 Cisco ISE Restore Operation, on page 8 Export Authentication and Authorization

More information

High Availability for Oracle 8i Using Double-Take

High Availability for Oracle 8i Using Double-Take High Availability for Oracle 8i Using Double-Take High Availability for Oracle 8i Using Double-Take Revision number 2.0.0 published July 2003 NSI and Double-Take are registered trademarks of Network Specialists,

More information

NETWRIX ACTIVE DIRECTORY CHANGE REPORTER

NETWRIX ACTIVE DIRECTORY CHANGE REPORTER NETWRIX ACTIVE DIRECTORY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

User Manual. Admin Report Kit for IIS 7 (ARKIIS)

User Manual. Admin Report Kit for IIS 7 (ARKIIS) User Manual Admin Report Kit for IIS 7 (ARKIIS) Table of Contents 1 Admin Report Kit for IIS 7... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements... 2 1.4 Technical Support...

More information

About the SPECTRUM Control Panel

About the SPECTRUM Control Panel About the SPECTRUM Control Panel The SPECTRUM Control Panel is a convenient Point and Click interface that provides facilities that let you configure SPECTRUM resources, start and stop SpectroSERVER, start

More information

CorreLog. Syslog UNIX Tool Set (UTS) User Reference Manual

CorreLog. Syslog UNIX Tool Set (UTS) User Reference Manual CorreLog Syslog UNIX Tool Set (UTS) User Reference Manual http://www.correlog.com mailto:info@correlog.com CorreLog Syslog UTS, User Reference Manual Copyright 2008-2017, CorreLog, Inc. All rights reserved.

More information

NTP Software VFM Administration Web Site

NTP Software VFM Administration Web Site NTP Software VFM Administration Web Site User Manual Version 7.1 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective. Upon completion of

More information

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE Page 1 of 35 Quick Start Guide TABLE OF CONTENTS This Quick Start Guide is designed to help you install and use a CommCell configuration to which you can later add other components. COMMCELL ARCHITECTURE

More information

BusinessObjects LifeCycle Manager User's Guide

BusinessObjects LifeCycle Manager User's Guide BusinessObjects LifeCycle Manager User's Guide BusinessObjects Enterprise XI 3.1 Service Pack2 windows Copyright 2009 SAP BusinessObjects. All rights reserved. SAP BusinessObjects and its logos, BusinessObjects,

More information

Version 11. NOVASTOR CORPORATION NovaBACKUP

Version 11. NOVASTOR CORPORATION NovaBACKUP NOVASTOR CORPORATION NovaBACKUP Version 11 2009 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise DigitalPersona Pro Enterprise Quick Start Guide Version 5 DATA PROTECTION REMOTE ACCESS SECURE COMMUNICATION STRONG AUTHENTICATION ACCESS RECOVERY SINGLE SIGN-ON DigitalPersona Pro Enterprise DigitalPersona

More information

1. ECI Hosted Clients Installing Release 6.3 for the First Time (ECI Hosted) Upgrading to Release 6.3SP2 (ECI Hosted)

1. ECI Hosted Clients Installing Release 6.3 for the First Time (ECI Hosted) Upgrading to Release 6.3SP2 (ECI Hosted) 1. ECI Hosted Clients........................................................................................... 2 1.1 Installing Release 6.3 for the First Time (ECI Hosted)...........................................................

More information

Ekran System v Program Overview

Ekran System v Program Overview Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation

More information

Installing the DITA CMS Eclipse Client

Installing the DITA CMS Eclipse Client Installing the DITA CMS Eclipse Client WWW.IIASOFT.COM / DITACMS v. 4.1 / Copyright 2015 IIASOFT Technologies. All rights reserved. Last revised: March 03, 2015 Table of contents 3 Table of contents Packaging

More information

Team Project Management

Team Project Management TEAM PROJECT MANAGEMENT 149 Team Project Management Tasks of the Project Administrator When working in teams, one person should be the designated administrator. Sets up the Project The project administrator

More information

MEDIASEAL Encryptor Client Manual

MEDIASEAL Encryptor Client Manual MEDIASEAL Encryptor Client Manual May 2018 Version 3.7.1 Fortium Technologies Ltd www.fortiumtech.com Copyright 2018 - Fortium Technologies Ltd Information contained in this document is subject to change

More information

Using OptiView Console

Using OptiView Console Using OptiView Console Introduction The OptiView Console application (also referred to as the application ) provides you with the ability to monitor the performance of your Ethernet enterprise network,

More information

SAS Model Manager 2.3

SAS Model Manager 2.3 SAS Model Manager 2.3 Administrator's Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2010. SAS Model Manager 2.3: Administrator's Guide. Cary,

More information

Backup Tab. User Guide

Backup Tab. User Guide Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...

More information

File Protection Whitepaper

File Protection Whitepaper File Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of File Protection over traditional file copy methods... 3

More information

Symantec NetBackup Blueprints

Symantec NetBackup Blueprints Symantec NetBackup Blueprints Blueprint for SQL Server Symantec Backup and Recovery Technical Services Symantec NetBackup Blueprints 1 Symantec NetBackup Blueprints Preface/disclaimer Notice This NetBackup

More information

2013 McAfee, Inc. All Rights Reserved. 1. epolicy Orchestrator 5.1 Essentials

2013 McAfee, Inc. All Rights Reserved. 1. epolicy Orchestrator 5.1 Essentials 2013 McAfee, Inc. All Rights Reserved. 1 This module covers the essential information on maintaining an epo Server and database. The information presented in this module is not all inclusive. Enterprise

More information

Database Management. Understanding Failure Resiliency CHAPTER

Database Management. Understanding Failure Resiliency CHAPTER CHAPTER 10 This chapter contains information on RDU database management and maintenance. The RDU database is the Broadband Access Center (BAC) central database. The Cisco BAC RDU requires virtually no

More information

Version 9. Backing Up and Restoring Progeny 9 Databases

Version 9. Backing Up and Restoring Progeny 9 Databases Version 9 Backing Up and Restoring Progeny 9 Databases Backing Up and Restoring Progeny 9 Databases Copyright Limit of Liability Trademarks Customer Support 2015. Progeny Genetics, LLC, All rights reserved.

More information

Migration and Building of Data Centers in IBM SoftLayer

Migration and Building of Data Centers in IBM SoftLayer Migration and Building of Data Centers in IBM SoftLayer Advantages of IBM SoftLayer and RackWare Together IBM SoftLayer offers customers the advantage of migrating and building complex environments into

More information

Managing, Monitoring, and Reporting Functions

Managing, Monitoring, and Reporting Functions This chapter discusses various types of managing, monitoring, and reporting functions that can be used with Unified CVP. It covers the following areas: Unified CVP Operations Console Server Management,

More information

Software Operations Manual

Software Operations Manual Software Operations Manual Version 5.0 System Requirements PC with 1GHz or higher, Intel Pentium Processor or compatible Microsoft Windows XP Professional or Vista Business Edition Microsoft.NET framework

More information

File Protection Whitepaper

File Protection Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of over traditional file copy methods... 3 2. Backup considerations...

More information

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server

More information

IBM Endpoint Manager Version 9.0. Software Distribution User's Guide

IBM Endpoint Manager Version 9.0. Software Distribution User's Guide IBM Endpoint Manager Version 9.0 Software Distribution User's Guide IBM Endpoint Manager Version 9.0 Software Distribution User's Guide Note Before using this information and the product it supports,

More information

Installation Guide Install Guide Centre Park Drive Publication Date: Feb 11, 2010

Installation Guide Install Guide Centre Park Drive Publication Date: Feb 11, 2010 EventTracker Install Guide 8815 Centre Park Drive Publication Date: Feb 11, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install and configure

More information

Arcserve Backup for Windows

Arcserve Backup for Windows Arcserve Backup for Windows Arcserve Replication Integration Guide r16.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the

More information

Veritas NetBackup Read This First Guide for Secure Communications

Veritas NetBackup Read This First Guide for Secure Communications Veritas NetBackup Read This First Guide for Secure Communications Contents... 3 NetBackup Read This First for Secure Communications... 3 About secure communications in NetBackup... 3 How host ID-based

More information

High Availability for Oracle 9i Using Double-Take

High Availability for Oracle 9i Using Double-Take High Availability for Oracle 9i Using Double-Take High Availability for Oracle 9i Using Double-Take Revision 2.0.0 published July 2003 NSI and Double-Take are registered trademarks of Network Specialists,

More information

[SQL MAINTENANCE PLAN] Create a maintenance plan to do integrity check, back up, shrink and clean old file created by the plan on database.

[SQL MAINTENANCE PLAN] Create a maintenance plan to do integrity check, back up, shrink and clean old file created by the plan on database. [SQL MAINTENANCE PLAN] Create a maintenance plan to do integrity check, back up, shrink and clean old file created by the plan on database. Maintenance Plan 1. Open Microsoft SQL Management Studio to find

More information

Veeam Agent for Microsoft Windows

Veeam Agent for Microsoft Windows Veeam Agent for Microsoft Windows Version 2.1 User Guide December, 2017 2017 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information