Security Correlation Server Backup and Recovery Guide
|
|
- Austen Bennett
- 5 years ago
- Views:
Transcription
1 CorreLog Security Correlation Server Backup and Recovery Guide This guide provides information to assist administrators and operators with backing up the configuration and archive data of the CorreLog server, and restoring this data. The information presented here will be useful to administrators responsible for maintaining the CorreLog system, as well as backup operators, developers, and IT managers, with application in disaster recovery and other areas. CorrreLog Server provides various options to retain backup copies of files and configuration data in an online state. Additionally, CorreLog provides flexible elements that can be configured by a user to backup log data on the system to removable media, including the ability to execute periodic backup scripts, and log the success or failure of these operations for further analysis. These features are described here, to permit easy integration with existing backup software and enterprise operations. Backup and Recovery of Configuration Data CorreLog maintains its primary configuration data in the "CorreLog\config" directory of the system within a series of files that have a ".cnf" extension. The user can backup almost all of the configuration data of the system by simply backing up this single folder. In addition to the "config" directory above, several other locations and folders exist that contain configuration data requiring periodic backup. The following folders contain configuration data items that should be routinely backed up for data storage. Generally, these directories contain a small amount of data, and are easily backed up.
2 Note that files can be copied while CorreLog executes, and backup of these files does not require CorreLog to be stopped. CorreLog\actions Folder This folder contains the "Correlation > Actions" scripts of the system. This folder should be routinely backed up to capture any special files or modifications to existing scripts. The folder typically contains less than 100 Kbytes of data. CorreLog\c-alerts Folder This folder contains the "Alerts > Custom" scripts of the system. This folder should be routinely backed up to capture any special files or modifications to existing scripts. The folder typically contains less than 100 Kbytes of data. CorreLog\config Folder This folder (and all of its subfolders) contains the main configuration data of the system, including templates, installation defaults, and checkpoints. This folder contains virtually all the configuration data of the system (with a few notable exceptions, described here). The folder typically contains less than 1 Mbytes of data. CorreLog\dash Folder This folder (and all of its subfolders) contains the configuration items associated with the dashboard facility, which works with the data in the "CorreLog\config" folder listed above. This folder typically contains less than 100 Kbytes of data. CorreLog\graph Folder This folder contains graph configuration files for use with the CorreLog graph viewer. These files are normally edited via the Graph Screen. The folder typically contains less than 100 Kbytes of data. CorreLog\t-actions Folder This folder contains the "Correlation > Ticket Actions" scripts of the system. This folder should be routinely backed up to capture any special files or modifications to existing scripts. The folder typically contains less than 100 Kbytes of data. CorreLog\tickets Folder This folder contains the ticket data of the system scripts. This folder should be routinely backed up to capture ticket information on the system. The folder typically contains less than 10 Mbytes of data. Note that CorreLog does not need to be stopped in order to backup the above files. However, to restore any file within these directories, CorreLog should be first stopped, and then restarted. (This is because the above files are read by CorreLog processes on service startup, and then periodically overwritten with new data.) Backup and Recovery Guide, Page 2
3 Special Configuration Data Recovery Functions CorreLog provides two other functions to allow rapid restoration of configuration data (as an alternative to restoring a backup of data, as explained above.) These two functions allow the user to quickly restore a particular configuration file, useful if a configuration change needs to be eliminated or reverted to the previous day. These features are explained below in more detail. "Yesterday" Template File. As a standard function, CorreLog will automatically store configuration data items associated with the Correlation Engine each night at midnight. This data is stored in a special "Template" file called "Yesterday", which can be loaded by the operator via the "Correlation > Config > Templates" facility. This allows the operator to quickly revert the "Threads", "Alerts", "Macros", "Address Groups" and other items to their previous version, which existed at midnight. Checkpoint Files. CorreLog creates a checkpoint of all configuration data and status data each night, and stores this data in the "CorreLog\config\$chkpt" directory of the system. Each night, at midnight, all configuration files are copied to this directory, and appended the day of the week (where 0=Sunday and 6=Saturday.) To restore these files, the user must (1) locate the particular configuration file in the CorreLog\config\$chkpt" directory; (2) stop the CorreLog Server; (3) copy the file to the correct location in the "config" directory and; (4) restart the CorreLog server. Backup of Log Data And Archives The vast majority of CorreLog operational data resides in the "log" and "archive" folders of the system. This data can constitute an enormous amount of data (potentially Terabytes of log data) so the backup of this data is an important consideration. CorreLog provides several techniques to accomplish this, described here. Direct Backup Of Log Data The user can perform an incremental backup of the "archive" and "logs" directory to tape or other media, using a variety of commercial software. In this case, an important consideration is to realize that only newly logs should be backed up, to conserve storage. (Otherwise, a full backup may exceed the capacity of most backup systems.) Forwarding Syslog Messages to Other Receiver The administrator can forward log files to a second copy of the CorreLog server that exists strictly for this purpose. In this case, the user configures the master CorreLog server to forward all log messages using the "Messages > Config > Backup and Recovery Guide, Page 3
4 Forwarding" screen of the system. The backup copy of CorreLog can also serve as a "hot swappable" version of the system. Schedule Copy or FTP Push of Archives The administrator can create a simple script that pushes the archive data to another server (possibly a UNIX server, or other windows server) at nightly intervals. This script can be executed via the CorreLog "System > Scheduler" function to perform a daily backup, weekly backup, or monthly backup. Restoration of Log Data Restoration of log data (from an archive file, or system backup) is not particular difficult, but it may be required to re-index this data and regenerate catalogs of this data to fully restore the entire configuration of the CorreLog Server. Restoration of Log Data The user can restore log data to the system from an archive file by simply unzipping the archive into the CorreLog "logs" directory. (The location of the logs data directory is configured on the "Messages > Config > Parms" screen.) The Administrator can execute the "RestoreArc.exe" program (documented below) to simplify this operation. Restoration of Catalog Data Restoration of log data does not necessarily rebuild all the catalogs with this information. To restore the catalog data, the user may have to re-index and regenerate all the catalogs using the "RestoreArc.exe -index" option or the "CGenx.exe" program (in the "cli-bin" directory.) These commands are documented in more detail within the next several sections. Note that, when restoring an archive file, the operator can first search for the appropriate archive via the "Reports > Query" function, which allows the user to search compressed archive files on the system. Once the archive file is located, the operator simply executes "RestoreArc.exe" to place the contents of the compressed file into the "logs" directory. Restoring Archive Data With "RestoreArc.exe" The easiest way to restore a single archive file for a specific date is to use the "RestoreArc.exe" program, which is a standard utility found in the "system" folder of the CorreLog Server. This utility unzips the archive, then re-indexes the keyword list, and optionally re-indexes all the various other index files, used by the "Devices", "Users", "Facilities", "Severities", and "Threads" screens. Backup and Recovery Guide, Page 4
5 To restore a log file from an archive file, the user creates an administrative command prompt, and issues the following command in the "CorreLog\system" directory. (The date below of is substituted for the date of the archive file.) RestoreArc.exe overwrite The above command unzips the archive file, and places it in the correct location in the "logs" directory. The command also re-indexes the keyword list. This enables the " Search", " Query", and the " Graph" screens to access the data. HOWEVER, this does not update any of the catalog data (i.e. the "Devices", "Users", "Facilities", "Severities", or "Threads" screen.) To make data accessible to these screens, also execute the following command. RestoreArc.exe index The above command can take some time to execute; hence it must be explicitly executed. (Depending on the size of the log file, the above command can take several minutes or even several hours to complete) Executing the "RestoreArc.exe" command with no arguments displays brief but complete help on the command usage and argument syntax. Repairing And Re-indexing Data With "CGenx.exe" As an alternative to executing the "RestoreArc.exe" program with the "-index" option, the administrator can also execute the "CGenx.exe" command line utility to rebuild index files. This command is documented in the "Command Line Interface (CLI) User Manual", which is available in the "s-doc" directory of each CorreLog installation. (The "RestoreArc.exe (date) index" command is an alias for the "CGenx.exe all (date)" command. The "CGenx.exe" program permits the operator to individually re-index any catalog on the system, and provides an equivalent (but slightly more flexible) interface than the "RestoreArc.exe" program. The "CGenx.exe" program is also useful for fixing corrupt index files that may cause "Unformatted Text" messages to appear on certain message list screens. Backup of Agent Configurations As a special note, the operator can backup the configuration files of agents using the "rsmconf.exe download" command line utility. This script downloads a configuration file from a specified agent that can later be uploaded to the same agent or some other agent to affect recovery functions. Backup and Recovery Guide, Page 5
6 Detailed notes on the "rsmconf.exe" utility are included in the "Windows Tool Set User Manual", Section 5. (This manual is available from the "Home" screen of the CorreLog Server, after user login.) The agent configuration files reside at the physical location of the managed platforms, and the data is not immediately available for backup at the CorreLog Server. If the CorreLog site has many strategic agent configurations, it may be useful to create a small batch file to backup these agents. For example, the user can create a simple batch file as follows that will copy the agent configurations to an Agent-Backup folder. This script could be launched via the CorreLog "Scheduler" routine at periodic intervals (such as each day.) REM: # BACKUP_AGENTS.bat REM: # Backup strategic CorreLog Agent configurations. if not exist..\agent-backup mkdir..\agent-backup rsmconf.exe download >..\Agent-Backup\1_1_1_1.bak rsmconf.exe download >..\Agent-Backup\1_1_1_2.bak rsmconf.exe download >..\Agent-Backup\1_1_1_3.bak rsmconf.exe download >..\Agent-Backup\1_1_1_4.bak echo Agent Backup completed. REM # Agent config backup complete. No further action is required. REM # Finished The above script can be edited to supply the list of strategic agents, and placed in the "system" directory of the CorreLog Server. Then, the script can be periodically executed (such as with the "Scheduler" function) to copy the agent configurations from remote agents to the local machine. The "Agent-Backup" folder will then retain the latest copies of the agent programs. Agent configurations can then be restored (if needed) by uploading the values back to the agents using the "rsmconf.exe upload" option (or using the "Directly Edit Remote Agent Config" link on the CorreLog Server platform.) The above script can be improved to first download the agent configuration to a temporary file, then copy the files into the "Agent-Backup" folder once all downloads are successful. (This provides a hedge against overwriting a backup with an empty file when the agent is not accessible for some reason.) Executing the "rsmconf.exe" program with no arguments provides brief but complete help on the usage of this program, which can also be used to check configuration data. Backup and Recovery Guide, Page 6
7 Example Configuration Data Backup Script An example configuration data backup script is provided below. The information below can be (1) cut and paste to a batch file; (2) modified by the administrator to adjust parameters; (3) placed in the "CorreLog\System" directory, and then (4) launched by the "System > Schedule" function of CorreLog. As written below, the configuration data backup script places the CorreLog system configuration data onto the "D\:" drive, in a directory with the same name as today's date. The script below can be modified by an administrator to change its operating characteristics. REM # BACKUP_CONFIG.bat REM # This script creates a folder on the "D:" drive with today's REM # date, and copies all config data of the system into that location REM # This is the location where files are stored: set BACKUP_DIRECTORY=D:\CorreLog_Config REM # Get today's date in YYYY-MM-DD format: FOR /F "tokens=1-4 delims=/ " %%I in ('date /t') do ( set FILEDATE=%%L-%%J-%%K ) set MAIN_DIRECTORY=%BACKUP_DIRECTORY%\%FILEDATE% REM # Make subdirectories: mkdir %MAIN_DIRECTORY%\actions mkdir %MAIN_DIRECTORY%\c-alerts mkdir %MAIN_DIRECTORY%\config mkdir %MAIN_DIRECTORY%\dash\config mkdir %MAIN_DIRECTORY%\dash\layouts mkdir %MAIN_DIRECTORY%\graph mkdir %MAIN_DIRECTORY%\t-action mkdir %MAIN_DIRECTORY%\tickets REM # Copy files here. copy..\actions\*.* %MAIN_DIRECTORY%\actions copy..\c-alerts\*.* %MAIN_DIRECTORY%\c-alerts copy..\config\*.* %MAIN_DIRECTORY%\config copy..\dash\config\*.* %MAIN_DIRECTORY%\dash\config copy..\dash\layouts\*.* %MAIN_DIRECTORY%\dash\layouts copy..\graph\*.* %MAIN_DIRECTORY%\graphs copy..\t-actions\*.* %MAIN_DIRECTORY%\t-actions copy..\tickets\*.* %MAIN_DIRECTORY%\tickets REM # Config backup complete. No further action is required. REM # Finished Backup and Recovery Guide, Page 7
8 Example Archive Data Backup Script An example archive data backup script is provided below. The information below can be (1) cut and paste to a batch file; (2) modified by the administrator to adjust parameters; (3) placed in the "CorreLog\System" directory, and then (4) launched by the "System > Schedule" function of CorreLog. As written below, the log data backup script copies CorreLog system archive data onto the "D\:" drive, in a directory with the same directory structure as the CorreLog archive folder. Only archives that have not been previously backed up are copied, to conserve disk space and CPU. The script below can be modified by an administrator to change its operating characteristics, such as to additionally backup message digest files, or the raw log file data of the system. REM # BACKUP_ARC.bat REM # This script backs up all the archive files to a location on REM # the D:\ drive configured by the operator below. The script REM # can be launched by the CorreLog "System > Schedule" function REM # daily basis to copy ONLY new archive files. REM # This is the location where files are stored: set ADIR=D:\CorreLog_Archive REM # Get today's year value: FOR /F "tokens=4 delims=/ " %%I in ('date /t') do set YEAR=%%I REM # Make the backup directory structure. mkdir %ADIR% mkdir %ADIR%\archive\ mkdir %ADIR%\archive\%YEAR% REM # Copy the archive files, only if they have not been previously REM # copied by this script. FOR %%I in (..\archive\%year%\*.gz ) do ( ) if NOT EXIST %ADIR%\archive\%%I COPY %%I %ADIR%\archive\%%I REM # Archive backup complete. No further action is required. REM # Finished. Backup and Recovery Guide, Page 8
9 Remote Configuration Backup via HTTP and ZIP It is fairly easy to configure the HTTP server and ZIP program to backup configuration data, initiated by a remote HTTP request. This technique may be useful for situations such as failover, disaster recovery, or simple remote storage of backups. The script below can be placed in the "x-cg\r-backup.bat" folder, and then an HTTP request (such as via the wget.exe utility) can generate the backup and then download the backup ZIP file. This requires permissions to be modified for the "x-cgi" folder via a modification to the "htaccess.txt" file in that directory. REM: # R-BACKUP.bat REM: # Backup a files to the BACKUP_FILE_NAME zip file REM: # This script can be launched via an HTTP request by REM: # Storing this file in the "CorreLog\x-cgi" folder, REM: # and modifying the "htaccess.txt" file in that folder. set BACKUP_FILE_NAME=..\s-html\BACKUP.zip REM: These are the folders to backup. ( echo../advisory echo../audit echo../c-alerts echo../config echo../dash echo../etext echo../excel echo../graph echo../net-snmp echo../net-user echo../query echo../s-html echo../t-actions echo../temp echo../u-agent )> ziplist.txt REM: # Zip the files here. del /f %BACKUP_FILE_NAME% type ziplist.txt..\system\zip.exe -r -@ %BACKUP_FILE_NAME% del /f ziplist.txt REM: # Finished. The BACKUP_FILE_NAME has been created. Note that the "x-cgi" CGI folder normally requires authentication to execute any program therein. The "htaccess.txt" file in that folder should be modified to permit the R- BACKUP.bat file above to be launched from a specific IP address or machine. The resulting BACKUP.zip file can then be downloaded as a separate operation. Backup and Recovery Guide, Page 9
10 Creating a Custom Configuration Package Using the techniques discussed in this manual, an operator can easily create a custom configuration package that can assist with deployment of the software at multiple sites. For example, if the CorreLog Server is to be installed and configured at may different locations, and a special target configuration exists, the operator can create a zip file (or other archive file) containing the desired configuration data of the system, and then unzip these files into the CorreLog Server root directory to effect an immediate configuration of the system. The configuration data of a site resides in specific folders, similar to the data previously identified, as follows: CorreLog\config Folder This folder (and all of its subfolders) contains the main configuration data of the system, including templates, installation defaults, and checkpoints. The user should include this directory in any custom package. CorreLog\actions Folder This folder contains the "Correlation > Actions" scripts of the system. The user may include these files in a custom package if there are one or more special "bat" programs referenced by the "Correlation Actions" screen. CorreLog\c-alerts Folder This folder contains the "Alerts > Custom" scripts of the system. The user may include these files in a custom configuration package if there are one or more special "bat" programs referenced by the "Custom Alerts" screen. CorreLog\dash Folder This folder (and all of its subfolders) contains the configuration items associated with the dashboard facility, which works with the data in the "CorreLog\config" folder listed above. The user may include these files in a custom package if there are any special dashboard elements. CorreLog\graph Folder This folder contains graph configuration files for use with the CorreLog graph viewer. The user may include these files in a custom package if there are any special graphs. CorreLog\t-actions Folder This folder contains the "Correlation > Ticket Actions" scripts of the system. The user may include these files in a custom package if there are one or more special "bat" files referenced by the "Ticket Actions" screen. Backup and Recovery Guide, Page 10
11 To create a custom package, the operator executes the following procedure. 1. The operator identifies a "Master" CorreLog site, and configures the CorreLog Server as desired, including dashboards, threads, alerts, and other necessary configuration data. 2. The operator creates a Zip file (or other archive file) containing the various directories and files identified at the start of this section. The resulting archive will be a relatively small package, typically less than 100 Kbytes in size, which is easily redistributed to other sites. 3. At a new site, the operator installs the COTS CorreLog Server software using the standard installation procedure documented in the "CorreLog Installation and Quick Start" manual. 4. After installation is complete, the operator stops the CorreLog Server Framework Service, extracts files from the package prepared in step (2) above, and then restarts the CorreLog Server. The above steps are sufficient to configure the CorreLog Server dashboards, threads, alerts, custom actions, and other items represented in the master site, with no other action necessary on the part of the end-user of the site. Note that variations to the above procedure are possible, such as including additional screens and documentation, or dynamic creation of threads and alerts based upon external data, and installation of plug-in components that may be necessary or desireable. Backup and Recovery Guide, Page 11
12 Professional Services CorreLog, Inc. provides professional services to assist in all phases of deployment activities, and assists with all deployment and operational issues through its support division. Prior to deploying CorreLog Server (whether a small single-tier deployment or a large multi-tier deployment) licensed users are encouraged to contact CorreLog for a detailed discussion of options and capabilities. Further information on installation is available from the "Home" page of each CorreLog installation, and is contained in the comprehensive documentation accompanying the product. Refer to the "Installation and Quick Start Guide" for additional information For Additional Help Detailed specifications regarding the CorreLog Server, add-on components, and resources are available from our corporate website. Test software may be downloaded for immediate evaluation. Additionally, CorreLog is pleased to support proof-ofconcepts, and provide technology proposals and demonstrations on request. CorreLog, Inc., a privately held corporation, has produced software and framework components used successfully by hundreds of government and private operations worldwide. We deliver security information and event management (SIEM) software, combined with deep correlation functions, and advanced security solutions. CorreLog markets its solutions directly and through partners. We are committed to advancing and redefining the state-of-art of system management, using open and standards-based protocols and methods. Visit our website today for more information. CorreLog, Inc. mailto:support@correlog.com Backup and Recovery Guide, Page 12
Security Correlation Server Redundancy And Failover Guide
CorreLog Security Correlation Server Redundancy And Failover Guide This document provides a discussion of techniques to implement CorreLog Server redundancy and failover, for high-availability usage of
More informationSecurity Correlation Server System Deployment and Planning Guide
CorreLog Security Correlation Server System Deployment and Planning Guide The CorreLog Server provides a method of collecting security information contained in log messages generated by network devices
More informationCorreLog. SNMP Trap Monitor Software Users Manual
CorreLog SNMP Trap Monitor Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, SNMP Trap Monitor Software Manual Copyright 2008-2017, CorreLog, Inc. All rights reserved. No
More informationCorreLog. LDAP Interface Software Toolkit Users Manual
CorreLog LDAP Interface Software Toolkit Users Manual http://www.correlog.com mailto:support@correlog.com CorreLog, LDAP Interface Software Toolkit Manual Copyright 2008-2018, CorreLog, Inc. All rights
More informationCorreLog. SQL Table Monitor Adapter Users Manual
CorreLog SQL Table Monitor Adapter Users Manual http://www.correlog.com mailto:support@correlog.com CorreLog, SQL Table Monitor Users Manual Copyright 2008-2018, CorreLog, Inc. All rights reserved. No
More informationCorreLog. Ping Monitor Adapter Software Users Manual
CorreLog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, Ping Monitor Users Manual Copyright 2008-2017, CorreLog, Inc. All rights reserved. No part
More informationCorreLog. Command Line Interface (CLI) Users Manual
CorreLog Command Line Interface (CLI) Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, Command Line Interface (CLI) Users Manual Copyright 2008-2018, CorreLog, Inc. All rights reserved.
More informationCorreLog. File Integrity Monitor (FIM) User Reference Manual
CorreLog File Integrity Monitor (FIM) User Reference Manual http://www.correlog.com mailto:info@correlog.com CorreLog FIM, User Reference Manual Copyright 2008-2018, CorreLog, Inc. All rights reserved.
More informationorrelog Security Correlation Server User Reference Manual
orrelog Security Correlation Server User Reference Manual http://www.correlog.com mailto:info@correlog.com CorreLog, User Reference Manual Copyright 2008 2015, CorreLog, Inc. All rights reserved. No part
More informationTechnical Response Logging and Monitoring Requirements December 23, 2010
Technical Response Logging and Monitoring Requirements December 23, 2010 This technical response documents the capabilities of CorreLog, Inc., Logging and Monitoring Summary and Recommendations. A high-level
More informationCorreLog IP Block List and Reputation Database Application Notes
CorreLog IP Block List and Reputation Database Application Notes As a standard feature of the CorreLog Server software, CorreLog Inc. synthesizes and maintains a robust list of IP address subnets with
More informationCommon Management Database Database Definition & User Guide
orrelog Common Management Database Database Definition & User Guide This guide provides brief information on the tables accompanying the Common Management Database (CMDB) Adapter of the CorreLog Server.
More informationWhite Paper Integrating The CorreLog Security Correlation Server with McAfee epolicy Orchestrator (epo)
orrelogtm White Paper Integrating The CorreLog Security Correlation Server with McAfee epolicy Orchestrator (epo) This white paper provides a detailed discussion of objectives and methodologies for integrating
More informationNETWRIX GROUP POLICY CHANGE REPORTER
NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More information8 MANAGING SHARED FOLDERS & DATA
MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to
More informationorrelog File Integrity Monitor (FIM) User Reference Manual
orrelog File Integrity Monitor (FIM) User Reference Manual http://www.correlog.com mailto:info@correlog.com Section 1: Introduction This document contains installation and application notes regarding the
More informationExam : Title : Administration of Symantec Backup Exec 12 for Windows Server. Version : Demo
Exam : 251-312 Title : Administration of Symantec Backup Exec 12 for Windows Server Version : Demo 1. What does the Backup Exec Environment Check utility verify to ensure that the installation process
More informationBacking Up and Restoring Cisco Unity Connection Components
Backing Up and Restoring Cisco Unity Connection Components About Cobras You must take the backup of Cisco Unity Connection components to avoid loosing any data or messages. The following are the tools
More informationUsing the Backup module
Using the Backup module THIS WIKI HAS BEEN UPDATED FOR VERSION 13 OF YOUR PBX GUI. Overview Logging In Menu Items Backups Restores Servers Templates Backup Settings Backup Name Description Status Email
More informationCorreLog. Apache TLS / Crypto Enhanced Encryption Software
CorreLog Apache TLS / Crypto Enhanced Encryption Software http://www.correlog.com mailto:info@correlog.com CorreLog, Enhanced Encryption Software Manual Copyright 2008-2018, CorreLog, Inc. All rights reserved.
More informationDesigning Data Protection Strategies for Lotus Domino
WHITE PAPER Designing Data Protection Strategies for Lotus Domino VERITAS Backup Exec 9.0 for Windows Servers Agent for Lotus Domino VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Introduction...3
More informationAdministration of Symantec Backup Exec 12 fo Windows Server Exam.
SYMANTEC 250-312 Administration of Symantec Backup Exec 12 fo Windows Server Exam TYPE: DEMO http://www.examskey.com/250-312.html Examskey SYMANTEC 250-312 exam demo product is here for you to test the
More informationCisco Unified CM Disaster Recovery System
Cisco Unified CM Disaster Recovery System Disaster Recovery System, page 1 Quick-reference tables for backup and restore procedures, page 3 Supported features and components, page 5 System requirements,
More informationReal4Test. Real IT Certification Exam Study materials/braindumps
Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 250-312 Title : Administration of Symantec Backup Exec 12 for Windows Server Vendors : Symantec Version :
More informationDatabase Administration
Unified CCE, on page 1 Historical Data, on page 2 Database Statistics, on page 3 Tool, on page 3 Database Sizing Estimator Tool, on page 11 Administration & Data Server with Historical Data Server Setup,
More informationIntroduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault
Introduction What is Microsoft Data Protection Manager (DPM)? The Microsoft Data Protection Manager is a member of the Microsoft System Center family of management products. DPM provides continuous data
More informationHP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version :
HP HP0-771 Designing and Implementing HP Enterprise Backup Solutions Download Full Version : http://killexams.com/pass4sure/exam-detail/hp0-771 A. copy backup B. normal backup C. differential backup D.
More informationRazorSafe 7-Series Remote Backup and NAS Support
RazorSafe 7-Series Remote Backup and NAS Support Mirapoint Inc RazorSafe Mirapoint Inc TABLE OF CONTENTS Background... 3 Email Lifecycle... 3 Tape Backup Solution... 4 Raw Email Backup... 4 The Challenges...
More information1. Initial Setting and Installation of ActiveVisor... 1
ActiveVisor Startup Guide 1 st Edition August, 2018 Contents 1. Initial Setting and Installation of ActiveVisor... 1 1.1 System Requirements... 1 1.2 Installation of ActiveVisor... 2 1.3 Initial Settings
More informationBusinessObjects XI Release 2
Overview Contents The purpose of this document is to outline recommended steps to back up and recover data for key BusinessObjects XI Release 2 system components. These procedures are used to mitigate
More informationDesigning Data Protection Strategies for Lotus Domino
WHITE PAPER Designing Data Protection Strategies for Lotus Domino VERITAS Backup Exec 10 for Windows Servers Agent for Lotus Domino 1/17/2005 1 TABLE OF CONTENTS Executive Summary...3 Introduction to Lotus
More informationSAS 9.2 Enterprise Business Intelligence Audit and Performance Measurement for Windows Environments. Last Updated: May 23, 2012
SAS 9.2 Enterprise Business Intelligence Audit and Performance Measurement for Windows Environments Last Updated: May 23, 2012 Copyright Notice The correct bibliographic citation for this manual is as
More informationWhat s New In Sawmill 8 Why Should I Upgrade To Sawmill 8?
What s New In Sawmill 8 Why Should I Upgrade To Sawmill 8? Sawmill 8 is a major new version of Sawmill, the result of several years of development. Nearly every aspect of Sawmill has been enhanced, and
More informationDatabase Administration
Unified CCE, page 1 Historical Data, page 2 Tool, page 3 Database Sizing Estimator Tool, page 11 Administration & Data Server with Historical Data Server Setup, page 14 Database Size Monitoring, page 15
More informationCorreLog. Syslog Windows Tool Set (WTS) User Reference Manual
CorreLog Syslog Windows Tool Set (WTS) User Reference Manual http://www.correlog.com mailto:info@correlog.com CorreLog Syslog WTS, User Reference Manual Copyright 2008-2018, CorreLog, Inc. All rights reserved.
More informationData Domain OpenStorage Primer
White Paper Data Domain OpenStorage Primer Abstract Data Domain s support for Symantec NetBackup OpenStorage enables the use of disk as disk, eliminating the need to emulate tape drives, tape cartridges,
More informationREO SERIES RA2000. Application Note for Creating a Disk-to-Disk (D2D) Backup Strategy Utilizing the RA2000 with VERITAS Backup Exec 8.
Overland Storage REO SERIES RA2000 Application Note for Creating a Disk-to-Disk (D2D) Backup Strategy Utilizing the RA2000 with VERITAS Backup Exec 8.6 Overland Storage REO SERIES RA2000 Creating a D2D
More information1. Overview... 2 Documentation... 2 Licensing... 2 File Archiving requirements... 2
User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers
More informationBackup Tab User Guide
Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...
More informationBackup and Restore Operations
Backup Data Type, page 1 Backup and Restore Repositories, page 2 On-Demand and Scheduled Backups, page 3 Cisco ISE Restore Operation, page 8 Export Authentication and Authorization Policy Configuration,
More informationBack Up and Restore Cisco DNA Center
About Backup and Restore, page 1 Back Up the DNA Center, page 2 Restore DNA Center, page 3 About Backup and Restore The backup and restore procedure for DNA Center can be used for the following purposes:
More informationAuditConfigurationArchiveandSoftwareManagementChanges (Network Audit)
This section contains the following topics: Audit Configuration Archive and Software Management Changes (Network Audit), on page 1 Audit Changes Made By Users (Change Audit), on page 1 Audit Actions Executed
More informationMicrosoft Windows Server Administration Fundamentals. Download Full Version :
Microsoft 98-365 Windows Server Administration Fundamentals Download Full Version : http://killexams.com/pass4sure/exam-detail/98-365 installation from a master computer to the destination computers. The
More informationDocAve 6 Platform Backup and Restore
DocAve 6 Platform Backup and Restore User Guide Service Pack 2, Cumulative Update 2 Revision F Issued June 2013 DocAve 6: Archiver 1 Table of Contents About DocAve Platform Backup and Restore... 5 Complementary
More informationPerceptive TransForm E-Forms Manager
Perceptive TransForm E-Forms Manager Installation and Setup Guide Version: 8.x Date: February 2017 2016-2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International Inc., registered
More informationCorreLog. CorreLog Agent For SAP SAP Audit Log Monitor Interface
CorreLog CorreLog Agent For SAP SAP Audit Log Monitor Interface This application note describes how to install and configure the CorreLog Agent for SAP. The information herein supplements the CorreLog
More informationRhapsody Interface Management and Administration
Rhapsody Interface Management and Administration Welcome The Rhapsody Framework Rhapsody Processing Model Application and persistence store files Web Management Console Backups Route, communication and
More informationGMI-Cmd.exe Reference Manual GMI Command Utility General Management Interface Foundation
GMI-Cmd.exe Reference Manual GMI Command Utility General Management Interface Foundation http://www.gmi-foundation.org Program Description The "GMI-Cmd.exe" program is a standard part of the GMI program
More informationNetwork Configuration Manager
GETTING STARTED GUIDE Network Configuration Manager Version 7.9 Last Updated: Monday, December 10, 2018 GETTING STARTED GUIDE: NETWORK CONFIGURATION MANAGER 2018 SolarWinds Worldwide, LLC. All rights reserved.
More informationCloud Compute. Backup Portal User Guide
Cloud Compute Backup Portal User Guide Contents Service Overview... 4 Gaining Access... 5 Operational Guide... 6 Landing Page... 6 Profile View... 6 Detailed View... 8 Overview... 8 Cloud Backup... 8
More informationUser Guide. Version R95. English
Cloud Backup User Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS
More informationorrelog Sigma Web Framework User And Developer Reference Manual
orrelog Sigma Web Framework User And Developer Reference Manual http://www.correlog.com mailto:info@correlog.com CorreLog Sigma Web Framework, User And Developer Reference Manual Copyright 2008-2015, CorreLog,
More informationConfiguring Cisco TelePresence Manager
CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,
More informationVault Backup Reference -Basic, Workgroup and Professional
Vault Backup Reference -Basic, Workgroup and Professional Contents Introduction... 1 Example backup routine... 2 Explanation of backup routine... 3 Testing... 4 User permissions... 4 Vault Professional
More informationPRODUCT MANUAL. idashboards Reports Admin Manual. Version 9.1
PRODUCT MANUAL idashboards Reports Admin Manual Version 9.1 idashboards Reports Admin Manual Version 9.1 No part of the computer software or this document may be reproduced or transmitted in any form or
More informationUtilities. Introduction. Working with SCE Platform Files. Working with Directories CHAPTER
CHAPTER 4 Revised: September 27, 2012, Introduction This chapter describes the following utilities: Working with SCE Platform Files, page 4-1 The User Log, page 4-5 Managing Syslog, page 4-8 Flow Capture,
More informationDisaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2)
Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2) Published: April 2, 2010 This guide provides an overview of the Disaster Recovery System, describes
More informationModifying IPM Components
CHAPTER 4 This chapter provides information on modifying IPM components. IPM components include collectors, source routers, target devices, and operations. Information is provided on viewing, updating,
More informationContents George Road, Tampa, FL
1 Contents CONTACTING VEEAM SOFTWARE... 5 Customer Support... 5 Online Support... 5 Company Contacts... 5 About this Guide... 6 About VEEAM Endpoint Backup For LabTech... 7 How It Works... 8 Discovery...
More informationVeritas NetBackup for Microsoft SQL Server Administrator's Guide
Veritas NetBackup for Microsoft SQL Server Administrator's Guide for Windows Release 8.1.1 Veritas NetBackup for Microsoft SQL Server Administrator's Guide Last updated: 2018-04-10 Document version:netbackup
More informationNortel Quality Monitoring. Maintenance Guide NN
NN44480-504 Document status: Standard Document version: 0102 Document date: 6 November 2009 All Rights Reserved While the information in this document is believed to be accurate and reliable, except as
More informationSAS 9.2 Enterprise Business Intelligence Audit and Performance Measurement for UNIX Environments. Last Updated: May 23, 2012
SAS 9.2 Enterprise Business Intelligence Audit and Performance Measurement for UNIX Environments Last Updated: May 23, 2012 Copyright Notice The correct bibliographic citation for this manual is as follows:
More informationPearson System of Courses
Pearson System of Courses Deploy with Windows Imaging Last updated: June 2018 Copyright 2018 Pearson, Inc. or its affiliates. All rights reserved. Table of Contents Deployment Process Overview 3 Prerequisites
More informationHelp on the SPECTRUM Control Panel
Help on the SPECTRUM Control Panel The SPECTRUM Control Panel is a convenient Point and Click interface that provides facilities that let you configure SPECTRUM resources, start and stop SpectroSERVER,
More informationBackup and Restore Operations
Backup Data Type Backup Data Type, on page 1 Backup and Restore Repositories, on page 1 On-Demand and Scheduled Backups, on page 3 Cisco ISE Restore Operation, on page 8 Export Authentication and Authorization
More informationHigh Availability for Oracle 8i Using Double-Take
High Availability for Oracle 8i Using Double-Take High Availability for Oracle 8i Using Double-Take Revision number 2.0.0 published July 2003 NSI and Double-Take are registered trademarks of Network Specialists,
More informationNETWRIX ACTIVE DIRECTORY CHANGE REPORTER
NETWRIX ACTIVE DIRECTORY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationUser Manual. Admin Report Kit for IIS 7 (ARKIIS)
User Manual Admin Report Kit for IIS 7 (ARKIIS) Table of Contents 1 Admin Report Kit for IIS 7... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements... 2 1.4 Technical Support...
More informationAbout the SPECTRUM Control Panel
About the SPECTRUM Control Panel The SPECTRUM Control Panel is a convenient Point and Click interface that provides facilities that let you configure SPECTRUM resources, start and stop SpectroSERVER, start
More informationCorreLog. Syslog UNIX Tool Set (UTS) User Reference Manual
CorreLog Syslog UNIX Tool Set (UTS) User Reference Manual http://www.correlog.com mailto:info@correlog.com CorreLog Syslog UTS, User Reference Manual Copyright 2008-2017, CorreLog, Inc. All rights reserved.
More informationNTP Software VFM Administration Web Site
NTP Software VFM Administration Web Site User Manual Version 7.1 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective. Upon completion of
More informationQuick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE
Page 1 of 35 Quick Start Guide TABLE OF CONTENTS This Quick Start Guide is designed to help you install and use a CommCell configuration to which you can later add other components. COMMCELL ARCHITECTURE
More informationBusinessObjects LifeCycle Manager User's Guide
BusinessObjects LifeCycle Manager User's Guide BusinessObjects Enterprise XI 3.1 Service Pack2 windows Copyright 2009 SAP BusinessObjects. All rights reserved. SAP BusinessObjects and its logos, BusinessObjects,
More informationVersion 11. NOVASTOR CORPORATION NovaBACKUP
NOVASTOR CORPORATION NovaBACKUP Version 11 2009 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
More informationDigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Quick Start Guide Version 5 DATA PROTECTION REMOTE ACCESS SECURE COMMUNICATION STRONG AUTHENTICATION ACCESS RECOVERY SINGLE SIGN-ON DigitalPersona Pro Enterprise DigitalPersona
More information1. ECI Hosted Clients Installing Release 6.3 for the First Time (ECI Hosted) Upgrading to Release 6.3SP2 (ECI Hosted)
1. ECI Hosted Clients........................................................................................... 2 1.1 Installing Release 6.3 for the First Time (ECI Hosted)...........................................................
More informationEkran System v Program Overview
Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation
More informationInstalling the DITA CMS Eclipse Client
Installing the DITA CMS Eclipse Client WWW.IIASOFT.COM / DITACMS v. 4.1 / Copyright 2015 IIASOFT Technologies. All rights reserved. Last revised: March 03, 2015 Table of contents 3 Table of contents Packaging
More informationTeam Project Management
TEAM PROJECT MANAGEMENT 149 Team Project Management Tasks of the Project Administrator When working in teams, one person should be the designated administrator. Sets up the Project The project administrator
More informationMEDIASEAL Encryptor Client Manual
MEDIASEAL Encryptor Client Manual May 2018 Version 3.7.1 Fortium Technologies Ltd www.fortiumtech.com Copyright 2018 - Fortium Technologies Ltd Information contained in this document is subject to change
More informationUsing OptiView Console
Using OptiView Console Introduction The OptiView Console application (also referred to as the application ) provides you with the ability to monitor the performance of your Ethernet enterprise network,
More informationSAS Model Manager 2.3
SAS Model Manager 2.3 Administrator's Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2010. SAS Model Manager 2.3: Administrator's Guide. Cary,
More informationBackup Tab. User Guide
Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...
More informationFile Protection Whitepaper
File Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of File Protection over traditional file copy methods... 3
More informationSymantec NetBackup Blueprints
Symantec NetBackup Blueprints Blueprint for SQL Server Symantec Backup and Recovery Technical Services Symantec NetBackup Blueprints 1 Symantec NetBackup Blueprints Preface/disclaimer Notice This NetBackup
More information2013 McAfee, Inc. All Rights Reserved. 1. epolicy Orchestrator 5.1 Essentials
2013 McAfee, Inc. All Rights Reserved. 1 This module covers the essential information on maintaining an epo Server and database. The information presented in this module is not all inclusive. Enterprise
More informationDatabase Management. Understanding Failure Resiliency CHAPTER
CHAPTER 10 This chapter contains information on RDU database management and maintenance. The RDU database is the Broadband Access Center (BAC) central database. The Cisco BAC RDU requires virtually no
More informationVersion 9. Backing Up and Restoring Progeny 9 Databases
Version 9 Backing Up and Restoring Progeny 9 Databases Backing Up and Restoring Progeny 9 Databases Copyright Limit of Liability Trademarks Customer Support 2015. Progeny Genetics, LLC, All rights reserved.
More informationMigration and Building of Data Centers in IBM SoftLayer
Migration and Building of Data Centers in IBM SoftLayer Advantages of IBM SoftLayer and RackWare Together IBM SoftLayer offers customers the advantage of migrating and building complex environments into
More informationManaging, Monitoring, and Reporting Functions
This chapter discusses various types of managing, monitoring, and reporting functions that can be used with Unified CVP. It covers the following areas: Unified CVP Operations Console Server Management,
More informationSoftware Operations Manual
Software Operations Manual Version 5.0 System Requirements PC with 1GHz or higher, Intel Pentium Processor or compatible Microsoft Windows XP Professional or Vista Business Edition Microsoft.NET framework
More informationFile Protection Whitepaper
Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of over traditional file copy methods... 3 2. Backup considerations...
More informationBlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide
BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server
More informationIBM Endpoint Manager Version 9.0. Software Distribution User's Guide
IBM Endpoint Manager Version 9.0 Software Distribution User's Guide IBM Endpoint Manager Version 9.0 Software Distribution User's Guide Note Before using this information and the product it supports,
More informationInstallation Guide Install Guide Centre Park Drive Publication Date: Feb 11, 2010
EventTracker Install Guide 8815 Centre Park Drive Publication Date: Feb 11, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install and configure
More informationArcserve Backup for Windows
Arcserve Backup for Windows Arcserve Replication Integration Guide r16.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
More informationVeritas NetBackup Read This First Guide for Secure Communications
Veritas NetBackup Read This First Guide for Secure Communications Contents... 3 NetBackup Read This First for Secure Communications... 3 About secure communications in NetBackup... 3 How host ID-based
More informationHigh Availability for Oracle 9i Using Double-Take
High Availability for Oracle 9i Using Double-Take High Availability for Oracle 9i Using Double-Take Revision 2.0.0 published July 2003 NSI and Double-Take are registered trademarks of Network Specialists,
More information[SQL MAINTENANCE PLAN] Create a maintenance plan to do integrity check, back up, shrink and clean old file created by the plan on database.
[SQL MAINTENANCE PLAN] Create a maintenance plan to do integrity check, back up, shrink and clean old file created by the plan on database. Maintenance Plan 1. Open Microsoft SQL Management Studio to find
More informationVeeam Agent for Microsoft Windows
Veeam Agent for Microsoft Windows Version 2.1 User Guide December, 2017 2017 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication
More information