5nine Cloud Monitor for Hyper-V

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "5nine Cloud Monitor for Hyper-V"

Transcription

1 5nine Cloud Monitor for Hyper-V Getting Started Guide Table of Contents System Requirements... 2 Installation... 3 Getting Started... 8 Settings... 9 Authentication nine Cloud Monitor for Hyper-V objects Monitoring settings Alert settings Monitoring Datacenter Level Cluster level Host level Virtual machine level Port level Service level Uninstallation... 44

2 System Requirements Supported Operating Systems: Microsoft Windows Server 2008 R2 SP1 Microsoft Windows Server 2008 R2 Core SP1 Microsoft Hyper-V Server 2008 R2 SP1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 Core Microsoft Hyper-V Server 2012 Prerequisites:.NET Framework 4.0, Microsoft SQL Server.

3 Installation Before installing 5nine Cloud Monitor for Hyper-V on Server Core/Hyper-V operating systems you must perform the following steps: 1) Confirm you have Server 2008 R2 SP1 or later 2) Enable the following features on your Operating System: DISM.exe /online /enable-feature /featurename:servercore-wow64 DISM.exe /online /enable-feature /featurename:netfx2-servercore DISM.exe /online /enable-feature /featurename:netfx3-servercore DISM.exe /online /enable-feature /featurename:netfx2-servercore-wow64 DISM.exe /online /enable-feature /featurename:netfx3-servercore-wow64 DISM.exe /online /enable-feature /featurename:microsoftwindowspowershell DISM.exe /online /enable-feature /featurename:microsoftwindowspowershell-wow64 3) Install.NET 4.0 for Server Core. You can download it at: 4) Use the command net share (or Remote Management) to share folder on Server Core machine, and copy the setup.exe, MainSetup.msi and the license.txt files 5) Execute setup.exe on Server Core machine and follow instructions described below. The Web application will be installed by default to You can then navigate to the console from any machine with a browser:

4 All necessary firewall rules will be added automatically during the installation. Installation package consists of 2 files: 1.) Web application console setup and 2.) agent setup. The agent setup is only needed for a virtual machine inbound and outbound traffic statistics on remote hosts. For other indicators Management console setup is enough, solution is agentless. To setup the Web application the administrator needs to run setup.exe application from the downloaded 5nine Cloud Monitor for Hyper-V archive on the host server or virtual machine that matches the 5nine Cloud Monitor for Hyper-V System Requirements and enter the appropriate license when prompted: Then the 5nine Cloud Monitor for Hyper-V Setup Wizard will be opened, click Next on the dialog window to start installation:

5 Read the 5nine Cloud Monitor for Hyper-V License Agreement and then click Next: Select the folder where 5nine Cloud Monitor for Hyper-V will be installed:

6 You can check the physical space available on your drives and the space required for the installation by pressing the Disk Cost button on the window shown above: Confirm installation and click Next:

7 Enter the credentials of the domain user who has access to Hyper-V machines for the service account: Note: A best practice is to avoid using an existing real user account, but to create a dedicated user with corresponding rights and assign it to the service. Set the SQL Server instance that will be used and connect to it by entering user name and password. There could be either SQL Server Authentication or Windows Authentication used while gaining access to your database. To find out which authentication is used and get the user name and password contact your database administrator. After setup finishes the 5nine Hyper-V Cloud vmonitor service will be started automatically.

8 Getting Started To get 5nine Cloud Monitor for Hyper-V Web application ready to work, the following actions are required: First, the authentication is required prior to do anything further. The authentication as well as master credentials setting processes are described in the Authentication section of Settings chapter. Then, the objects are required to be added for monitoring. This is described in 5nine Cloud Monitor for Hyper-V objects section of the Settings chapter. Monitoring settings adjustment process is described in Monitoring settings section of the Settings chapter. Alert settings adjustment process is described in Alert settings section of the Settings chapter. Monitoring of the objects on the different levels is described in the Monitoring chapter.

9 Settings This chapter describes the necessary settings for preparing 5nine Cloud Monitor for Hyper-V Web application to perfrom as desired. Authentication Upon opening in your browser you will be prompted to enter your authentication credentials: To first logon you should use the credentials under which the service was installed. It s highly recommended to execute the action Master Credentials and set a predefined internal Admin user password. Then for security reasons use only these Master credentials to log on to the console. You can use these Master credentials for direct authentication to REST, OData and PowerShell API in the case of building integration with own systems and when it is not desirable to use/store windows user credentials anywhere. For details about the API integration see the 5nine Hyper-V Cloud vmonitor API.docx file also installed in application folder.

10 5nine Cloud Monitor for Hyper-V objects The monitoring process in 5nine Cloud Monitor for Hyper-V means controlling the certain physical and logical objects by monitoring their state parameters on the corresponding diagrams and checking the alerts. The object types that are monitored by 5nine Cloud Monitor for Hyper-V are described below. Object Types The following objects exist in 5nine Cloud Monitor for Hyper-V: DataCenter. This is the necessary object required to be added prior to any further objects. DataCenter is a formal aggregating entity that exists for the purpose of joining the other objects into the process as its as subsidiaries. Cluster. Cluster object represents multiple servers, two or more, joined into a cluster. Host. Host object represents a single server, which normally hosts virtual machines. Port. Port object represents a standard TCP port, e.g., :3389. Service. Service object represents any OS Windows service, e.g., 59CBTService. Adding objects for monitoring To begin monitoring objects first you must add the DataCenter object. There is a panel menu on the left upper corner: You must specify the name of DataCenter, and optionally Login and Password of windows (domain) user under which performance information will be collected from objects. In most cases you can leave these

11 fields empty then those credentials under which service is running will be used. In the case in which you have several datacenters belonging to different domains then of course you must specify credentials for each of these datacenters. During monitoring these credentials will flow from the root objects to their descendants, however you can always specify some of the descendants have their own credentials. After DataCenter is added, you can select it in the tree view and then the other menus will be un-grayed. On selecting the DataCenter item, there will be un-grayed dropdown menus for adding other types of objects. Click on Add Cluster and enter name, address, login and password in the appropriate fields of the appeared dialog:

12 After a short time (less than 1 minute) you can expand the tree and see its nodes and VMs: Then add host(s):

13 port(s): and service(s):

14 Note: Make sure to enter exactly windows Service name value in the Service Name field of the dialog (do not confuse it with Display Name that is shown in the services list and does not identify the Windows service)! Clicking on the node will display the information summary for the selected object at the main Summary tab. The current status of the selected object is also displayed on the Summary tab. You can also Enable or Disable monitoring of the selected object by simply clicking the Enable/Disable Monitoring button which appears on the right-upper spot of the window depending on the current status: The view will differ depending on which object is selected. The sections of the Monitoring chapter below will describe the monitoring tabs view on all levels.

15 Other panel menu commands If you want to edit the selected object, click Edit Object button on the left panel: Then enter new parameters in the corresponding dialog that will appear depending on what object is selected: for datacenter: for cluster:

16 for host: for port: for service:

17 If you want to set or change credentials for the selected object, click the Set Credentials button on the left panel: Then enter your login and password in the appeared dialog as required and click OK. If you want to remove the selected object, click the Remove Object button on the left panel: Then confirm the removal of the object in the dialog shown: If you want to refresh the list of monitored objects, click the Refresh List button on the left panel: If you want to refresh the information of the selected object, click the Refresh Information button on the right panel:

18 If you finished working with the application you can close the session, by clicking the Log Out button in right-upper corner of the 5nine Hyper-V Cloud vmonitor main window: By default if there is no any activity for a period of 20 minutes thesession will be closed automatically.

19 Monitoring settings You can change the global monitoring settings, set up SMTP alert actions and mail settings by clicking the Monitoring Settings button in right-upper corner of the 5nine Cloud Monitor for Hyper-V main window:

20 Set the monitoring parameters as follows: Clear the Enable Guest Monitoring checkbox if you wish to exclude virtual machines from monitoring. All the other added objects will still be monitored. Set the monitoring frequency: the values are chosen from the Poll frequency list box (1,2,3,4,5,10,15 minutes): Enter credentials in the fields Login and Password, if needed. It is not necessarily to do this in the case in which the service is installed already has permissions to collect information on monitored objects. Set alert actions for warnings and errors. There are two similar list boxes for each alert type with the following choices: None do not document alerts. Add Event to Event Log add events to log (will be displayed on Alerts tab of main window). Send Notification send to the chosen recipients (settings described below). Add Event and Send Notification perform both of the actions above. Set up mail parameters for notifications: Specify SMTP server address (e.g., mail.crossinform.ru or ). Enter the port. Tick Requires Authentication box if authentication is necessary. Tick SSL box if security socket layer usage required when sending notification s. Enter credentials user name and password if SMTP server requires authentication (Requires Authentication box was ticked as described above). Specify address from which notification s will be sent. Enter addresses of recipients, separated by a semicolon (;).

21 Alert settings You can browse alerts on a per object basis by clicking the corresponding objects in the tree, or you can select datacenter and see all alerts for the datacenter s descendant objects: You can dismiss some of alerts or all at once by clicking corresponding clear alerts buttons: All of the actions with alerts are similar no matter which object is selected.

22 If you want to overview the current alert settings click Alert Settings button in right-upper corner of the 5nine Cloud Monitor for Hyper-V main window: If you want to change the setting of the alert then just click the pencil button icon on the left of the alert list. The following dialog will appear:

23 Set the alert parameters as follows and (change predefined values if necessary): Enter the alert name. There are predefined names for all the factors, though you can alter them at your own wish. The new alert name will be shown then in all other places. Enter the new description. Choose the new category. Values are chosen from the Category list box: None neither of the parameters will be monitored. Health parameter health will be monitored. Processor processor state/usage will be monitored. Memory memory utilization/availability will be monitored. Network network utilization/performance will be monitored. Storage disk utilization/performance will be monitored. Chose the scope for monitoring. Values are chosen from the Scope list box: None neither level will be read. Host parameters will be read on the host level. Guest parameters will be read on the VM level. Cluster parameters will be read on the cluster level. Node parameters will be read on the node level. Port parameters will be read on the port level. Service parameters will be read on the service level. DataCenter parameters will be read on Data Center level. Global parameters will be read on the global level. Choose the alert condition from the Condition list box: Equals the reading must be equal to the set threshold value for the alert. Above the reading must exceed the set threshold value for the alert. Below the reading must be below the set threshold value for the alert.

24 Choose the unit of measure from the UOM list box: Percent for the percent. KB for the kilobytes. MB for the megabytes. GB for the gigabytes. KBPerSec for the kilobytes per second. MBPerSec for the megabytes per second. GBPerSec for the gigabytes per second. Count for counting the number of necessary units/events etc. Trigger Rule. It is advised not to alter this predefined parameter. Enter warning threshold for the alert. This figure refers to the numerical value of the alert parameters entered above for the warning alert to happen. Enter error threshold for the alert. This figure refers to the numerical value of the alert parameters entered above for the error alert to happen. Enter the condition length in seconds that must be reached for the alert. Enter the report range. Enter the report frequency in seconds. Clear Enabled check box if you no longer wish for the current alert to happen. Click OK in the Modify Alert Definition dialog when you are finished. The table below contains the description of predefined failures and matching parameters: Parameter Failure Description High Logical Processor Usage Host processor overutilization A condition when the percentage of time spent by the processor in guest and hypervisor code is greater than specified threshold High Memory Pressure Host memory low performance A condition when the rate at which pages are read from or written to disk is greater than specified threshold. Low Network Performance Network throughput insufficiency A condition when the network interface output queue length is greater than specified threshold. High Disk I/O Utilization Host disk input/output overload A condition when condition when the disk I/O utilization is greater than specified threshold.

25 Parameter Failure Description High Virtual Processor Usage Low Disk Performance Host Connection Failure High VP to LP Ratio Low Available Memory VM Health Critical High Network Utilization High Virtual Network Utilization High Daily Inbound Network Traffic High Guest Processor Usage High Guest Processor Frequency Low Dynamic Memory Buffer High Assigned Memory Usage Low Free Space Overutilization of host processor resources assigned for virtual machines Host disk performance insufficiency Impossibility to set the connection with the host in a timely manner Over usage of host processor resources in terms of its share assigned to virtual machines Critically low amount of available memory on the host Greater amount of VMs in critical health Network resources comparative overutilization Virtual network traffic is over limit Virtual daily inbound network traffic is over limit Over usage of a host processor resources assigned for virtual machine in percentage Frequency of a host processor when serving virtual machine is over limit Available dynamic memory buffer for virtual machine is below limit Assigned virtual machine memory overutilization Disk free space assigned for virtual machine is below limit A condition when the percentage of time spent by the virtual processor in guest and hypervisor code is greater than specified threshold. A condition when the storage output queue length is greater than specified threshold. A condition when the host connection cannot be established during the specified threshold timeout. A condition when the virtual to logical processors ratio is greater than specified threshold. A condition when the percentage of available memory is less than specified threshold. A condition when the number of virtual machines that with critical health is greater than specified threshold. A condition when the percentage of network utilization is greater than specified threshold. A condition when the virtual network adapter utilization is greater than specified threshold. A condition when the inbound network traffic from the beginning of the current day is greater than specified threshold. A condition when guest processor load is greater than specified threshold. A condition when guest processor frequency is greater than specified threshold. A condition when available memory buffer is less than specified threshold. A condition when the assigned memory usage is greater than specified threshold. A condition when the free space is lower than specified threshold.

26 Parameter Failure Description High Daily Outbound Network Traffic High Virtual Disk Utilization High Memory Usage Cluster Connection Failure Port Connection Failure Service Failure Virtual daily outbound network traffic is over limit Virtual disk resources overload Assigned virtual memory over usage in percent Impossible to set the connection with the cluster in a timely manner Impossible to set the connection through the port in a timely manner Service unavailability or inactive state (not running) during specified time period A condition when the outbound network traffic from the beginning of the current day is greater than specified threshold. A condition when the virtual disk utilization is greater than specified threshold. A condition when the memory usage is greater than specified threshold. A condition when the cluster connection cannot be established during the specified threshold timeout. A condition when the port connection cannot be established during the specified threshold timeout. A condition when the service cannot be found or state is not running during the specified threshold timeout.

27 Monitoring The chapter describes monitoring the interface view for different objects by levels. Datacenter Level When the selected object is Datacenter there will be the following tab information view: Summary

28 The information shown here differs from that on the single host as datacenter is supposed used to join multiple objects. The total figures are displayed here with the top 3 resource consumers shown for each performance parameter. Alerts Alerts tab displays the list of alerts for the selected datacenter:

29 Cluster level When the selected object is a Cluster there will be the following tab information view: Summary The information shown on the Summary tab for a cluster looks to the same as that for a datacenter. There are total figures are displayed here with top 3 resource consumers shown for each performance parameter.

30 Alerts Alerts tab displays the list of alerts for the selected cluster:

31 Host level When the selected object is the host there will be the following tab information view: Summary

32 CPU CPU tab displays recent CPU information for the selected host: The upper diagram shows the host logical processor usage in percent with the predefined poll frequency either by default value or set by user (will be described below). The lower diagram shows the CPU utilization percentage by virtual machines running on the current host.

33 Memory Memory tab displays recent memory information of the selected host: The diagram in the picture shows the total percentage of memory utilization on the current host. Network Network tab displays recent network utilization data of the selected host: The diagram in the picture shows the total percentage of network activity on the current host.

34 Disk Disk tab displays recent disk utilization data for the selected host: The diagram in the picture shows the total disk usage information on the current host in real figures (bps/kbps/mbps). Alerts Alerts tab displays the list of alerts for the selected host:

35 Virtual machine level The Virtual machine must be on and running so that all the tabs for it are displayed. When the selected object is a virtual machine there will be the following tab information view: Summary

36 CPU CPU tab displays recent CPU information for the selected virtual machine: The diagram shows the host CPU utilization percentage share of current virtual machine. Memory Memory tab displays recent memory information for the selected virtual machine: The upper diagram shows the dynamic memory buffer availability in percent for the current virtual machine. The lower diagram shows the guest memory utilization percentage for the current virtual

37 machine. Network Network tab displays recent network utilization data for the selected virtual machine. There are 3 diagrams in the Network tab: Virtual Network Usage

38 Outbound Traffic Outbound traffic diagram displays the top IP statistics for outbound traffic, i.e. top IP-address traffic contributors are shown in descending order for a selected VM. Percentage shows the frequency IP-address is the top traffic contributor within the period shown in the diagram. Inbound Traffic Outbound traffic diagram displays similar information but for inbound traffic for a selected VM.

39 Note: The last two diagrams are shown only if the 5nine Monitor capturing extension is installed and switched on. Disk Disk tab displays recent disk utilization data for the selected virtual machine: The upper diagram shows the virtual disk usage information on the current virtual machine in real figures (bps/kbps/mbps). The lower diagram shows the free space on the virtual disk using the total memory share assigned for current virtual machine from the host as the total available.

40 Win2012 Resource Metering Win2012 Resource Metering tab shows the new parameters specifically for the virtual machines of the host with OS Windows Server 2012 installed. It currently shows the host CPU and memory usage parameters for the current virtual machine as it appears in the display picture: - Average CPU Usage (in MHz); - Average memory use (in Mb); - Minimum memory use (in Mb).

41 Alerts Alerts tab displays the list of alerts for the selected virtual machine:

42 Port level When the selected object is a port the following tab information view will display: Summary Alerts Alerts tab displays the list of alerts for the selected port:

43 Service level When the selected object is a service the following tab information view will display: Summary Alerts Alerts tab displays the list of alerts for the selected service:

44 Uninstallation To uninstall 5nine Cloud Monitor for Hyper-V from your server, go to Control Panel Programs Programs and Features Uninstall a Program. Then choose 5nine Hyper-V Cloud vmonitor on the program list and click Uninstall to run 5nine Cloud Monitor for Hyper-V uninstallation process, and then follow the system hints.

5nine EASY Backup Quick User Guide

5nine EASY Backup Quick User Guide 5nine EASY Backup Quick User Guide Installation Supported Operating Systems: Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2008 R2 Core SP1 Microsoft Hyper-V Server

More information

5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager

5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager 5nine Security for Hyper-V Datacenter Edition Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager November 2013 11 Table of Contents Summary... 5 System requirements... 5 Permissions...

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

VMware/Hyper-V Backup Plug-in User Guide

VMware/Hyper-V Backup Plug-in User Guide VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Web Sites, Virtual Machines, Service Management Portal and Service Management API Beta Installation Guide

Web Sites, Virtual Machines, Service Management Portal and Service Management API Beta Installation Guide Web Sites, Virtual Machines, Service Management Portal and Service Management API Beta Installation Guide Contents Introduction... 2 Environment Topology... 2 Virtual Machines / System Requirements...

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

Altaro Hyper-V Backup - Getting Started

Altaro Hyper-V Backup - Getting Started Altaro Hyper-V Backup - Getting Started System Requirements Supported Host Operating Systems: Altaro Hyper-V Backup: o Windows 2008 R2 (all editions) o Windows 2008 R2 SP1 o Windows Hyper-V Server 2008

More information

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live

More information

intertrax Suite resource MGR Web

intertrax Suite resource MGR Web intertrax Suite resource MGR Web Resource Management Installation Guide Version 4 2012 Copyright 2003-2012 by Salamander Technologies, Inc. Protected by US Patents 5,573,278; 5,596,652; 5,793,882; 6,761,312;

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

Team Foundation Server 2012 Installation Guide

Team Foundation Server 2012 Installation Guide Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day benday@benday.com v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

WEBCONNECT INSTALLATION GUIDE. Version 1.96

WEBCONNECT INSTALLATION GUIDE. Version 1.96 WEBCONNECT INSTALLATION GUIDE Version 1.96 Copyright 1981-2015 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop Business

More information

Unitrends Virtual Backup Installation Guide Version 8.0

Unitrends Virtual Backup Installation Guide Version 8.0 Unitrends Virtual Backup Installation Guide Version 8.0 Release June 2014 7 Technology Circle, Suite 100 Columbia, SC 29203 Phone: 803.454.0300 Contents Chapter 1 Getting Started... 1 Version 8 Architecture...

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

User s Manual. Management Software for ATS

User s Manual. Management Software for ATS ATS Monitor User s Manual Management Software for ATS Table of Contents 1. ATS Monitor Overview... 2 2. ATS Monitor Install and Uninstall... 2 2.1. System Requirement... 2 2.2. Software Install... 2 2.3.

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

IT-ADVENTURES PLAYGROUND (ISERINK) Remote Setup Guide IOWA STATE UNIVERSITY INFORMATION ASSURANCE CENTER

IT-ADVENTURES PLAYGROUND (ISERINK) Remote Setup Guide IOWA STATE UNIVERSITY INFORMATION ASSURANCE CENTER IT-ADVENTURES PLAYGROUND (ISERINK) Remote Setup Guide IOWA STATE UNIVERSITY INFORMATION ASSURANCE CENTER Spring 2014 Gaining access to your systems Since ISERink runs on a simulated internet provided by

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

ArCycle vmbackup. for VMware/Hyper-V. User Guide

ArCycle vmbackup. for VMware/Hyper-V. User Guide ArCycle vmbackup for VMware/Hyper-V User Guide 2 Copyright Copyright ArCycle Software, Ltd., 2011-2014. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

ADFS 2.0 Application Director Blueprint Deployment Guide

ADFS 2.0 Application Director Blueprint Deployment Guide Introduction: ADFS 2.0 Application Director Blueprint Deployment Guide Active Directory Federation Service (ADFS) is a software component from Microsoft that allows users to use single sign-on (SSO) to

More information

Installation Guide. Live Maps 7.4 for System Center 2012

Installation Guide. Live Maps 7.4 for System Center 2012 Installation Guide Live Maps 7.4 for System Center 2012 1 Introduction... 4 1.1 1.2 About This Guide... 4 Supported Products... 4 1.3 1.4 Related Documents... 4 Understanding Live Maps... 4 1.5 Upgrade

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces

More information

SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE

SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE Contents Introduction... 3 Step 1 Create Azure Components... 5 Step 1.1 Virtual Network... 5 Step 1.1.1 Virtual Network Details... 6 Step 1.1.2 DNS Servers

More information

Shavlik Patch for Microsoft System Center

Shavlik Patch for Microsoft System Center Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

SmartSync Monitor Help

SmartSync Monitor Help 1.0 (Build 15) 2 Table of Contents Foreword 0 Part I Welcome to SmartSync Monitor 3 Part II Getting Started 4 1 Copyright... 4 2 System... requirements and installation 4 3 Uninstalling... 5 6 Part III

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Tharo Systems, Inc. 2866 Nationwide Parkway P.O. Box 798 Brunswick, OH 44212 USA Tel: 330.273.4408 Fax: 330.225.0099

Tharo Systems, Inc. 2866 Nationwide Parkway P.O. Box 798 Brunswick, OH 44212 USA Tel: 330.273.4408 Fax: 330.225.0099 Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

Ekran System Help File

Ekran System Help File Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition The installation of Lync Server 2010 is a fairly task-intensive process. In this article, I will walk you through each of the tasks,

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

Getting Started with Hyper-V and the Scale Computing Cluster. Scale Computing 5225 Exploration Drive Indianapolis, IN, 46241

Getting Started with Hyper-V and the Scale Computing Cluster. Scale Computing 5225 Exploration Drive Indianapolis, IN, 46241 Getting Started with Hyper-V and the Scale Computing Cluster Scale Computing 5225 Exploration Drive Indianapolis, IN, 46241 Contents Contents CHAPTER 1 Introduction to Hyper-V: BEFORE YOU START. vii Revision

More information

Trial environment setup. Exchange Server Archiver - 3.0

Trial environment setup. Exchange Server Archiver - 3.0 Trial environment setup Exchange Server Archiver - 3.0 Introduction This document describes how you can set up a trial environment for using Exchange Server Archiver with Exchange Server 2007. You do not

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information

Getting Started Guide

Getting Started Guide GFI MailArchiver for Exchange Getting Started Guide By GFI Software Ltd. http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and

More information

DOCSVAULT Document Management System for everyone

DOCSVAULT Document Management System for everyone Installation Guide DOCSVAULT Document Management System for everyone 9 v Desktop and Web Client v On Premises Solution v Intelligent Data Capture v Email Automation v Workflow & Record Retention Installing

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading

More information

TecLocal 4.0 MultiUser Database

TecLocal 4.0 MultiUser Database Tec Local 4.0 - Installation Manual: Byer Mode & Multi-User (Server) TecLocal 4.0 MultiUser Database Installation Manual: Buyer Mode & Multi-User (Part I - Server) Version: 1.0 Author: TecCom Solution

More information

Juniper Networks Management Pack Documentation

Juniper Networks Management Pack Documentation Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation

More information

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage. Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with Hyper-V Cluster

StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with Hyper-V Cluster #1 HyperConverged Appliance for SMB and ROBO StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with MARCH 2015 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the

More information

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20 Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

5nine Manager for Hyper-V PLUS. Version 7.1

5nine Manager for Hyper-V PLUS. Version 7.1 5nine Manager for Hyper-V PLUS Version 7.1 August 2015 11 Table of Contents Summary... 7 System requirements... 9 Installation... 10 5nine Management Service for Hyper-V PLUS installation... 11 5nine Manager

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account? Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply

More information

efolder BDR for Veeam Cloud Connection Guide

efolder BDR for Veeam Cloud Connection Guide efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud

More information

StarWind iscsi SAN: Global Deduplication with Veeam Backup&Replication

StarWind iscsi SAN: Global Deduplication with Veeam Backup&Replication StarWind iscsi SAN: Global Deduplication with Veeam Backup&Replication May 2012 TRADEMARKS StarWind, StarWind Software, and the StarWind and StarWind Software logos are trademarks of StarWind Software

More information

NETWRIX USER ACTIVITY VIDEO REPORTER

NETWRIX USER ACTIVITY VIDEO REPORTER NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Omtool Server Monitor administrator guide

Omtool Server Monitor administrator guide Omtool Server Monitor administrator guide May 29, 2008 (4.0342-AA) Omtool, Ltd. 6 Riverside Drive Andover, MA 01810 Phone: +1/1 978 327 5700 Toll-free in the US: +1/1 800 886 7845 Fax: +1/1 978 659 1300

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Windows Server 2012 Hyper-V support... 3 2. Hyper-V protection features... 3

More information

Barracuda Message Archiver Vx Deployment. Whitepaper

Barracuda Message Archiver Vx Deployment. Whitepaper Barracuda Message Archiver Vx Deployment Whitepaper Document Scope This document provides guidance on designing and deploying Barracuda Message Archiver Vx on VMware vsphere Document Scope, and Microsoft

More information

GE Measurement & Control. Remote Comms System. Installation and User Reference Guide

GE Measurement & Control. Remote Comms System. Installation and User Reference Guide GE Measurement & Control Remote Comms System Installation and User Reference Guide Contents BENEFITS OF REMOTE COMMS SYSTEM... 1 HOW THE REMOTE COMMS SYSTEM WORKS... 3 COMPONENTS OF REMOTE COMMS SYSTEM...

More information

Lab 1: Windows Azure Virtual Machines

Lab 1: Windows Azure Virtual Machines Lab 1: Windows Azure Virtual Machines Overview In this hands-on Lab, you will learn how to deploy a simple web page to a Web server hosted in Windows Azure and configure load balancing. Objectives In this

More information

Virtualizing your Datacenter

Virtualizing your Datacenter Virtualizing your Datacenter with Windows Server 2012 R2 & System Center 2012 R2 Part 2 Hands-On Lab Step-by-Step Guide For the VMs the following credentials: Username: Contoso\Administrator Password:

More information

BANDWIDTH METER FOR HYPER-V

BANDWIDTH METER FOR HYPER-V BANDWIDTH METER FOR HYPER-V NEW FEATURES OF 2.0 The Bandwidth Meter is an active application now, not just a passive observer. It can send email notifications if some bandwidth threshold reached, run scripts

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information

XenDesktop Implementation Guide

XenDesktop Implementation Guide Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Installing GFI MailArchiver

Installing GFI MailArchiver Installing GFI MailArchiver Introduction This chapter highlights important points you should take into consideration before installing GFI MailArchiver on your network, so that you can make the best decisions

More information

3 Setting up Databases on a Microsoft SQL 7.0 Server

3 Setting up Databases on a Microsoft SQL 7.0 Server 3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other

More information

5nine Cloud Security for Hyper-V. Version 6.0

5nine Cloud Security for Hyper-V. Version 6.0 5nine Cloud Security for Hyper-V Version 6.0 July 2015 2015 5nine Software All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

vtcommander Installing and Starting vtcommander

vtcommander Installing and Starting vtcommander vtcommander vtcommander provides a local graphical user interface (GUI) to manage Hyper-V R2 server. It supports Hyper-V technology on full and core installations of Windows Server 2008 R2 as well as on

More information

NETWRIX CHANGE NOTIFIER

NETWRIX CHANGE NOTIFIER NETWRIX CHANGE NOTIFIER FOR SQL SERVER QUICK-START GUIDE Product Version: 2.6.194 February 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information