Catalogic DPX 4.3. Applications Guide. dpx4305/22/2014ag

Size: px
Start display at page:

Download "Catalogic DPX 4.3. Applications Guide. dpx4305/22/2014ag"

Transcription

1 Catalogic DPX 4.3 Applications Guide dpx4305/22/2014ag

2 Catalogic Software, Inc., All rights reserved. This publication contains proprietary and confidential material, and is only for use by licensees of Catalogic DPX, Catalogic BEX, or Catalogic ECX proprietary software systems. This publication may not be reproduced in whole or in part, in any form, except with written permission from Catalogic Software. Catalogic, Catalogic Software, DPX, BEX, ECX, and NSB are trademarks of Catalogic Software, Inc. Backup Express is a registered trademark of Catalogic Software, Inc. All other company and product names used herein may be the trademarks of their respective owners.

3 Table of Contents Table of Contents Table of Contents 3 APPLICATIONS GUIDE OVERVIEW 5 Chapter 1: DPX Overview 6 Documentation, Knowledge Base, and Technical Support 6 Important Considerations 10 Chapter 2: Introduction to Applications Guide 11 Audience and Purpose 11 Topics Covered 11 DPX EXCHANGE MAILBOX RECOVERY and DPX SHAREPOINT OBJECT RECOVERY 12 Chapter 3: Using EMBR for Rapid Recovery of Exchange Mailbox Items 13 Introduction 13 How EMBR Works 13 How EMBR Works with Instant Access 13 Example Use of EMBR with Instant Access 13 Chapter 4: Using SPOR for Rapid Recovery of SharePoint Objects 17 Introduction 17 How SPOR Works 17 Supported Operating Systems and Applications 17 Additional Requirements 18 How SPOR Works with Instant Access 18 Using SPOR with Instant Access: A Quick Example 18 REPORTER 20 Chapter 5: Introduction to Reporter 21 About this Document 21 For Additional Information 22 Nomenclature 22 Important Considerations Before You Begin a Reporter Installation 22 Chapter 6: Installing Reporter 26 Chapter 7: Configuring Reporter 27 Step 1. Install Agent on the Master Server 27 Step 2. Configure the Master Server as a Reporter Resource 28 Step 3. Configure Virtualization VMware Resources 29 3

4 Table of Contents Step 4. Define Polling Resources 31 Chapter 8: Getting Started with Reporter 33 Logging In 33 Graphical User Interface Overview 33 Chapter 9: Uninstalling Reporter or Reporter Agents 35 ACRONYMS 36 TERMINOLOGY 43 TRADEMARKS 50 INDEX 53 4

5 APPLICATIONS GUIDE OVERVIEW APPLICATIONS GUIDE OVERVIEW DPX Overview on page 6 Introduction to Applications Guide on page 11 5

6 Chapter 1: DPX Overview Chapter 1: DPX Overview Catalogic DPX data protection software delivers unprecedented speed and savings with a single unified solution making backup and disaster recovery smarter, faster, and more efficient. It is uniquely designed to handle the most common data protection use cases that are challenging IT departments. DPX deploys quickly and scales easily to match the needs of rapidly growing cloud infrastructures. Additionally, the software exploits modern server virtualization and is optimized for backup and recovery of virtual systems. DPX Block Data Protection provides rapid and efficient backup, restore, bare metal recovery, application protection, and tape archiving. A complex backup environment can have multiple backup Enterprises each with more than one secondary system including NetApp storage and DPX open storage. There is one master server per data protection Enterprise. The master server is a DPX node that contains DPX software, including the Catalog and modules that control scheduling, media management, and distributed processing. Any other node in an Enterprise from which you may want to back up data is called a client. The master server may also be a client node. Note: For the latest system requirements and compatibility details regarding supported hardware, file systems, applications, operating systems, and service packs, go to System Requirements and Compatibility. Documentation, Knowledge Base, and Technical Support Documentation Roadmap The following documentation is available for Catalogic DPX : Quick Start Guide Deployment Guide User s Guide Reference Guide Bare Metal Recovery Guide Applications Guide Upgrade Assessment Tool Quick Start Guide Best Practices Troubleshooting Guide Documentation is available in both PDF and context-sensitive help invoked through DPX. You can find the documentation in the following locations: 6

7 Documentation, Knowledge Base, and Technical Support The MySupport website has the current documentation. For best results, use Internet Explorer to view the documentation PDFs. Select Help on the menu bar in the DPX management console. Navigate to the manuals directory on the product disk or in the ISO image to access the PDF documentation for the latest major release. Navigate to the directory on the master server where DPX was installed to find the documentation. Drill down to the \http\webapps\root\manuals directory to find the PDFs. Navigate to hostname or IP address>:6122/manuals/_document_library.pdf for a summary of available documentation. Tip: In Adobe Reader, clear the Open cross-document links in same window option to open links to additional DPX documentation while retaining your location in the original PDF. Clear this option in the Documents section on the Preferences window. For the latest customer notices, product documentation, and access to the Catalogic Software knowledge base, go to MySupport. Documentation Suite Overview The following describes the content included in each manual and indicates the intended audience. You are encouraged to read through this information for an understanding of where to find the information you are looking for. Also, use the Search and Index features in the Help system to locate pertinent information. In Help, you can search the entire documentation suite instead of searching through individual manuals. Quick Start Guide This document is intended for administrators and other end users of DPX. It is the starting point for understanding DPX documentation and provides a roadmap for using the documentation. The Quick Start Guide contains procedures for creating a NetApp storage volume or DPX open storage volume, provides procedures for a simple DPX backup and recovery scenario, and describes how to obtain additional information including technical support and online resources. Deployment Guide This document is intended for those who are responsible for setting up DPX at customer sites. This might be a Catalogic field technician or a NetApp certified field technician who also has familiarity with DPX and its licensing. The guide contains instructions for setting up a NetApp storage system for DPX backups. It also presents, in abbreviated form, procedures found in the User's Guide and Reference Guide, including installing DPX, running a software update, setting up a DPX Enterprise, setting up Catalog protection, setting up a tape library, and configuring media. At the conclusion of the implementation, the customer is ready to perform DPX backups and recoveries using the features provided by their DPX license. User s Guide This document is intended for administrators and other end users of DPX. It contains information and procedures for the most commonly used functions of Catalogic Data Protection Software. The topics covered in the User s Guide assume 7

8 Documentation, Knowledge Base, and Technical Support that your Enterprise is deployed and that the Catalogic Data Protection Software is installed and configured. The User s Guide includes: Product Overview. Describes the management console and procedures for launch and login. Disk-to-Disk Data Protection. Describes procedures for DPX Block Data Protection, remote seeding using NetApp storage or open storage, Instant Access to data, and NetApp SnapVault Management. Also, it provides an overview of Bare Metal Recovery. Virtual Environments. Describes Full Virtualization, Instant Virtualization, and Rapid Return to Production. Also, describes procedures for Agentless VMware Backup. Application Support. Describes data protection procedures for major applications, including SharePoint, Exchange, SQL Server, and Oracle. Includes the procedures for verifying the integrity of an application backup. Also, describes considerations for Windows and Novell OES Clusters. Maintenance. Describes procedures for maintaining the Catalog and for monitoring backup and restore jobs. Reference Guide This document is intended for administrators with appropriate licenses to use DPX features. Other users might be limited to a subset of the features. The Reference Guide contains information, considerations, and procedures for the less commonly used features of Catalogic Data Protection Software. The more commonly used functions are described in the User s Guide. The Reference Guide includes: Installation. Describes procedures for installing, upgrading, and updating DPX on Windows, Linux, and other platforms. Also includes information about protecting and maintaining the Catalog and describes administrator privileges and security considerations. Configuration. Describes procedures for configuring DPX by using the management console. Operation. Describes procedures for defining and running backup, copy, and restore jobs by using the management console and performing additional tasks using scripts. Also, includes details on controlling tape devices and migrating tapes, and managing reports and logs. Procedures for DPX Block Data Protection jobs are described in the User s Guide. Tape Library Setup. Describes procedures for creating the media changer device file needed to enable communication between DPX and the tape library as well as defining tape library properties. Clusters. Describes procedures for setting up a Windows or Novell cluster to work with DPX. Special Procedures. Describes procedures for setting up special tape libraries. Interfaces. Describes setup and usage of application interfaces not included in the User's Guide or Applications Guide. This includes NDMP backup and restore for disks and tapes. The remaining application interfaces are set up outside the management console. Bare Metal Recovery Guide This document is intended for administrators who must restore an entire system environment for an individual computer. A full recovery using Bare Metal Recovery includes the operating system, point-in-time backed up data, and Exchange, 8

9 Documentation, Knowledge Base, and Technical Support SQL Server, and Oracle applications if applicable. If the computer being recovered is a master server, Bare Metal Recovery restores the DPX application. The Bare Metal Recovery Guide describes procedures for restoring a machine with Windows and Linux. Applications Guide This document is intended for administrators and other end users of DPX that are licensed to use several special applications. Other commonly used functions and applications are described in the User s Guide and Reference Guide. The Applications Guide includes: DPX Exchange Mailbox Recovery. This application allows administrators to easily recover mailbox items from unmounted Exchange databases and Information Store files. Additionally, EMBR enables copying, searching, and analyzing and attachments. DPX SharePoint Object Recovery. This application allows administrators to find, recover, and restore entire SharePoint sites or individual SharePoint server objects. Additionally, SPOR can be used to locate and restore individual items, without having to restore entire databases, volumes, or servers. Reporter. This application enables robust reporting on nodes, storage, job progress, trending, exceptions, and more. Upgrade Assessment Tool Quick Start Guide This document is intended for administrators who want to upgrade to Catalogic DPX 4.3. It provides instruction on using the Upgrade Assessment Tool. The UAT scans your Enterprise and generates a report identifying feature differences and upgrade concerns you need to be aware of when upgrading from BEX 3.4 or Catalogic Data Protection Software 4.0 to DPX 4.3. Best Practices This document is targeted at DPX implementation professionals and advanced DPX administrators. The guidelines provided are based on deployment and administration experience, as well as best practices of the respective technology vendors. This document lists known parameters and configurations that lead to a successful DPX implementation. Use this document as a tool when architecting a solution that fits specific data protection needs. Troubleshooting Guide This document is intended for Catalogic Software Level 1 Support Engineers and advanced users of DPX. It provides answers to many frequently asked questions. Areas covered include compatibility and support, installation, configuration, general operations, Microsoft Exchange, Microsoft SQL Server, virtualization, and DPX Bare Metal Recovery. Knowledge Base In addition to the documentation suite, search the Knowledge Base for solutions and answers to your issues and questions. The Knowledge Base has solutions that can help you resolve many technical problems. We encourage you to search the Knowledge Base prior to contacting Catalogic Software Data Protection Technical Support for assistance. The Knowledge Base has thousands of solutions that can help you resolve many technical problems before opening a Service Request. You can find the knowledge base on MySupport. 9

10 Important Considerations Contacting Catalogic Software Data Protection Technical Support For issues relating to Catalogic Data Protection software, contact Catalogic Software Data Protection Technical Support. To contact us in the US or Canada: Call toll free (877) or (201) By To contact us in Europe, the Middle East, or Africa: By phone: Call toll free or By DPX provides a logs collection utility, bexcollect, for diagnostic purposes. The utility gathers informational files related to a specific job. If you contact Catalogic Software Data Protection Technical Support, you may be asked to run the utility and send the results for analysis. See Log Management in the Reference Guide. Tip: For NetApp or hardware related issues, contact your NetApp support representative at (888) 4NETAPP. For the latest system requirements and compatibility details regarding supported hardware, file systems, applications, operating systems, and service packs, go to System Requirements and Compatibility. Important Considerations Some features described in this guide are optional, separately licensable features. For inquiries regarding licensing of optional features, contact your data protection account representative or call (877) Catalogic DPX data protection software does not currently support Unicode for DPX-specific objects such as jobname, devicepath, qtree name, etc. Use the English character set only. Screen illustrations that appear in this guide may not match those found in your product implementation, due to variations in customization. For best results, use Internet Explorer to view the documentation PDFs. 10

11 Chapter 2: Introduction to Applications Guide Chapter 2: Introduction to Applications Guide Audience and Purpose The Catalogic DPX Applications Guide is intended for system administrators, administrators, and other end users of DPX that are licensed to use several special applications. Other commonly used functions and applications are described in the User s Guide and Reference Guide. Some features are optional, separately licensable features. For inquiries regarding licensing of optional features, contact your data protection account representative or call (877) Topics Covered The Catalogic DPX Applications Guide includes the following topics: Topic DPX Exchange Mailbox Recovery (EMBR) DPX SharePoint Object Recovery (SPOR) Reporter Description This application allows backup administrators to easily recover mailbox items from unmounted Exchange databases and Information Store files. Additionally, EMBR enables copying, searching, and analyzing and attachments. This application allows backup administrators to find, recover, and restore entire SharePoint sites or individual SharePoint server objects. Additionally, it can be used to locate and restore individual items, without having to restore entire databases, volumes, or servers. This application enables robust reporting on nodes, storage, job progress, trending, exceptions and more. 11

12 DPX EXCHANGE MAILBOX RECOVERY and DPX SHAREPOINT OBJECT RECOVERY DPX EXCHANGE MAILBOX RECOVERY and DPX SHAREPOINT OBJECT RECOVERY Using EMBR for Rapid Recovery of Exchange Mailbox Items on page 13 Using SPOR for Rapid Recovery of SharePoint Objects on page 17 12

13 Chapter 3: Using EMBR for Rapid Recovery of Exchange Mailbox Items Chapter 3: Using EMBR for Rapid Recovery of Exchange Mailbox Items Introduction DPX Exchange Mailbox Recovery allows backup administrators to easily recover mailbox items from unmounted Exchange databases and Information Store files. Additionally, EMBR enables copying, searching and analyzing and attachments. DPX can provide the backed up EDB files to EMBR through its Block backup functionality. The key is the Instant Access feature, which easily and rapidly mounts an Exchange backup instance to a Windows node. EMBR on this node can then quickly extract or search required items. This process is described below. How EMBR Works EMBR requires as input the backed up EDB files. These files should be local to a server (other than the Exchange Server) or workstation that has EMBR installed. EMBR can then open these files and either extract the individual items to a.pst file or import them directly into an online Exchange database. How EMBR Works with Instant Access Block backups of an Exchange server back up the logical volume (C:, D:, etc.) that contains the Exchange database files, which includes the EDB files. By virtue of the Block backup process, the database is backed up online once as a base backup; all subsequent backups are then block-level incremental backups, which greatly reduce CPU load, network traffic, and storage requirements. Any of the snapshots (one is created by each Block backup job) can then be mounted to a Windows node by using the IA feature. If EMBR is installed on this Windows node (the node should not be the Exchange Server), EMBR can then be used to extract mailbox items from the IA map. Example Use of EMBR with Instant Access For the example described below, a Windows 2003 Exchange server (IP ) was backed up three times using the Block backup functionality. The backup ran once as a base backup and subsequently as a block-level incremental backup. This created three recovery points of the E: drive on the secondary storage device. The third recovery point is then selected and IA mapped as the K: drive on a server that has EMBR installed (IP address in the example below): 13

14 Example Use of EMBR with Instant Access The IA function results in the K: drive on the server and this K: drive now houses the EDB files from when the Block backup ran (in this example, 3/25/09 12:12:13 PM). Note: There are two backup sets for Exchange: the data files (on the E: drive in the example) and the application itself on the EXCH volume. Only the data files can be IA-mapped. EMBR is then launched from the workstation and pointed to the location on the K: drive that contains the EDB files: 14

15 Example Use of EMBR with Instant Access The screen shot above shows the opened source file (K:\Program Files\Exchsrvr\MDBDATA\priv.edb) with all the mailboxes displayed in the top-left panel. The mailbox for user Louis is opened and the Inbox of that mailbox is shown (top-right panel). You can now search for mail items, or read s if needed (as shown in the open window above). To recover one or multiple s (or any of the objects shown above: Calendar, Contacts, Deleted Items, etc.) you can either save the items to be recovered to a.pst file, which can be sent to the user, who can read the items, or you can import the items to be recovered directly to an online Exchange server. To do the latter, point EMBR to the Exchange server, which will then populate the bottom Target information with the contents on the live mailbox. A recovery is then done by drag-and-dropping the items from Source panel to the Target panel as shown below: 15

16 Example Use of EMBR with Instant Access At the completion of the recovery EMBR is shut down and the IA map is unmapped. The recovery and search activities can be done with no impact to the online Exchange server. Instant Access used with EMBR is one example of the exceptional versatility and simplicity of DPX s access to snapshots generated by routine Block backups. Related Topics: Exchange 2010/2013 in the User's Guide Exchange 2003/2007 in the User's Guide Note: For the latest system requirements and compatibility details regarding supported hardware, file systems, applications, operating systems, and service packs, go to System Requirements and Compatibility. 16

17 Chapter 4: Using SPOR for Rapid Recovery of SharePoint Objects Chapter 4: Using SPOR for Rapid Recovery of SharePoint Objects Introduction You can use DPX SharePoint Object Recovery to find, recover, and restore entire SharePoint sites or individual SharePoint server objects such as documents, lists, libraries, and folders. Because SPOR reads existing content database backups directly, use it to locate and restore individual items, without having to restore entire databases, volumes, servers, etc. SPOR enables direct restores to any SharePoint server (or you can restore objects to any Windows-supported file system) thereby eliminating many constraints on same-server restores. With these unique SPOR features, you may find that your need for an additional recovery server is minimized. How SPOR Works To provide item-level restore functionality, SPOR must have the ability to access the content databases mapped/restored from the Block backup. SPOR can then read, extract, or export the data from the content databases to a selected SharePoint server or to a windows file system. Supported Operating Systems and Applications For the latest system requirements and compatibility details regarding supported hardware, file systems, applications, operating systems, and service packs, go to System Requirements and Compatibility. Considerations for SPOR with SQL Server: The following applies to both Clustered and Non-Clustered SQL Server platforms: When using SQL Server 2005, (32 bit or 64-bit) as your database server, you must install Microsoft SQL Server 2005 SP2, or a later version of that service pack. In addition, you must also install the Microsoft SQL Server 2005 Backward Compatibility Components for SQL Server package, which is one of the components of the Microsoft SQL Server 2008 Feature Pack, August 2008 installation package collection, and is available for download from the Microsoft Download Center website. The Microsoft SQL Server 2008 Feature Pack, August 2008 installation package collection contains many different items, but you will only need to install the Microsoft SQL Server 2005 Backward Compatibility Components for SQL Server package. SPOR does not support SQL 2000 database servers. If you use SQL Server 2000, you will be able to back up your databases using the SharePoint application and restore whole databases, but you will not be able to do an item-level restore from those backups. 17

18 Additional Requirements Additional Requirements Each SharePoint server that you intend to protect must have a native installation. How SPOR Works with Instant Access Before you can start using SPOR in your recovery efforts, DPX must create at least one base backup of a SharePoint volume. When you select a SharePoint volume for backup, it automatically includes a backup of each SQL content database hosted on that volume, including all.mdf,.ldf and/or.ndf database files. Note: The first backup process transfers all existing data from the volume. Any subsequent incremental backups will only transfer data for block-level changes to that volume. Using the Instant Access feature, you can mount any valid, block-level backup to a SPOR-enabled Windows node; using SPOR, you can access that volume, open the content database, and retrieve individual SharePoint objects. Using SPOR with Instant Access: A Quick Example In this example, assume that the backup functionality provided by DPX Block Data Protection has created a SharePoint backup of a Windows 2008 SQL server. This backup job ran once as a full backup of the Windows 2008 SQL server and it subsequently created a snapshot of the C: drive on the secondary storage device. When you use Instant Access on a server that has a SPOR installation, you can map this snapshot to a drive. See Mapping a Block Backup Instance to a Drive Letter in the User's Guide. A newly mapped drive contains an exact duplicate of each database file, as recorded for that specific date and time in the node s DPX Data Protection backup. Note: There are two available backups for SharePoint: the data files, as found in the C: drive on the physical node, and the application itself, which appears underneath the tree branch for the SharePoint virtual node. Instant Access only provides mapping functionality for data files. Making a Source Path Selection In this step, you launch SPOR from your SharePoint node and use IA mapping to select the G: drive as the source path. After you navigate through the path to the location of the content database to restore, SPOR displays a listing of all available SharePoint entities on-screen exactly as they appear in the content database backup. For more information about how to make a source path selection in SPOR, see the DPX SharePoint Object Recovery User Guide which can be found on the Applications CD. 18

19 Using SPOR with Instant Access: A Quick Example Making a Target Server Selection In the next step, you select a target server restore location. When making a target server selection, you can choose to select an alternate SharePoint database server or you can elect to save those individually recovered items in a new location on the same source server. See The DPX SharePoint Object Recovery User Guide which can be found on the Applications CD. Selecting Files, and Completing the Restore Process Using SPOR, you can drill down through the file structure and browse the sites, documents, folders, lists, and libraries to locate the items to restore. You can also perform a search based on multiple criteria, searching across one or more content databases, and you can elect to see all available versions of a file in one screen. To execute the recovery of one or more SharePoint objects, drag-and-drop each item from the Source panel to the Target panel. At the completion of the recovery, close the SPOR application. Related Topics: SharePoint in the User's Guide 19

20 REPORTER REPORTER Introduction to Reporter on page 21 Installing Reporter on page 26 Configuring Reporter on page 27 Getting Started with Reporter on page 33 Uninstalling Reporter or Reporter Agents on page 35 20

21 Chapter 5: Introduction to Reporter Chapter 5: Introduction to Reporter Reporter can help you schedule and monitor backup jobs for completion within a predefined processing window to reduce the load on servers, clients, and the network. Reporter enables access to robust sets of data related to the below topics: Node perspective. Provides information from the server, client, and job perspective and displays job sizes and throughput per node. Monitoring. Enables real-time monitoring of backup job status on all nodes, including in-progress, inactive, failed, and successful jobs. Alerts administrators to job failures and interruptions and helps them pinpoint time and cause. Post-job reports. Summarizes exceptions and cumulative data volumes. Reports also display the number of bytes backed up per job and the success/failure ratio within a specified period. Management reports. Generates reports that group backup servers for chargeback, SLA, and compliance needs. Trending. Provides trending information for backups, including total data backed up in the enterprise, throughput, and success rate trends. Forecasts. Predicts available disk space based on backup history and storage capacity. Multiple backup server data. Provides a cumulative view if multiple master servers are deployed. Master server reports. Indicates operating system performance, available disk space, network usage, HBA card status, and system errors for the master server. Exception reports. Pre-defined daily and cumulative reports identify failed and inactive jobs by client and group. Reports also provide group details, weekly summaries per group, server details, and weekly server summaries. Media reports. Displays detailed media information, including listings of free tapes per media pool, tapes requiring removal from the tape library, and tapes that can be brought back into production. A predefined report lists tapes for tape library export and import. Sub-reports include offsite-to-onsite, onsite-to-offsite, tape pools, and jobs-per-tape. Customizable reporting. A report wizard and numerous templates enable administrators to design reports to meet specific analysis needs. The report wizard can be used to modify existing reports, create new reports, and define sets of reports. Notifications. Versatile notifications can utilize , Web, SNMP for third party applications, and paging. About this Document This document describes how to install Reporter and configure resources for reporting. The major installation and configuration steps are: Install Reporter on a server. See Installing Reporter on page

22 For Additional Information Install the Reporter agent on the master server. See Step 1. Install Agent on the Master Server on page 27. Use Reporter to configure the master server as a Reporter resource. See Step 2. Configure the Master Server as a Reporter Resource on page 28. Use Reporter to configure VM resources if necessary. See Step 3. Configure Virtualization VMware Resources on page 29. Use Reporter to define polling resources. See Step 4. Define Polling Resources on page 31. This document also describes: How to login to Reporter and briefly describes elements of the interface. See Getting Started with Reporter on page 33. How to uninstall Reporter. See Uninstalling Reporter or Reporter Agents on page 35. For Additional Information For a description of Reporter features and configuration options, see the Reporter online documentation. Nomenclature In this topic, Reporter software, running on the Reporter server, is referred to as Reporter" or "DPX Reporter". In other documentation and in the product, Reporter software may be referred to as Reporter Server to distinguish it from Reporter Agent, which runs on machines to be monitored by Reporter. In this topic Reporter always refers to the server software, unless agent is specified. Important Considerations Before You Begin a Reporter Installation The following points should be noted before you begin installing or upgrading Reporter. General Considerations Note the following general considerations before installing Reporter: Reporter server is recommended for use with Windows 2003 and 2008 (x32 and x64). Reporter agent is recommended for use with Windows 2003 and 2008 (x32 and x64). It is also compatible with Windows 2003 and XP Professional, along with the Red Hat Linux, CentOS, SUSE Linux Enterprise, and Sun Solaris 10 operating systems. For full compatibility with DPX, DPX Reporter or later is required. For the latest system requirements and compatibility details regarding supported hardware, file systems, applications, operating systems, and service packs, go to System Requirements and Compatibility. 22

23 Important Considerations Before You Begin a Reporter Installation Reporter uses the following ports: Port 9000 as its Web Server Port (HTTP) for the GUI. This port can be changed in server.xml. Port 4319 as its communications port with Reporter Agents (HTTP). This port can be changed system wide or on an agent-by-agent basis. Port 162 as a trap listener. This port can be changed through the server setup. Related Topics: Administrative Privileges and Security Considerations in the Reference Guide Installing Reporter on a master server is not recommended. Reporter Server installs six services: MySQL (Reporter database): the MySQL repository for all data collected by Reporter. ReporterCollector (collector): collects data from agents. ReporterEventReceiver (event receiver): receives traps. ReporterMaintenance: runs maintenance routines in the background. ReporterPoller (poller): remotely polls devices or applications by a variety of methods. ReporterWebServer (web server): the Tomcat web server. An installation or upgrade does not require a reboot. Installing Reporter Server on a RAID or cluster drive is not recommended. The Reporter database should be excluded from normal backups and real time virus scans. For instructions to back up the database, request the document "Backing up the Reporter Database" from Catalogic Software Data Protection Technical Support. The Reporter server requires 3 GB memory, comprised of the following: Database: 512 MB Web Server: 512 MB Collector: 512 MB Event Receiver: 512 MB Maintenance Server: 256 MB Poller: 256 MB 23

24 Important Considerations Before You Begin a Reporter Installation Considerations for Fresh Install Note the following considerations for a fresh install of Reporter: Before installing, close any services windows. Installation will not work properly if you leave any of these windows open during install. If you have installed MySQL separately before installing Reporter, the installation will be terminated, since Windows can support only one instance of MySQL at a time. Before installing, stop the MySQL Windows service (if any) and then uninstall MySQL. Warning: Do not manually delete any MySQL directories even after uninstall is completed. Old database data is located under the MySQL install directory. All Reporter binary and data files are located under the installation directory. When installing, select a directory located on a partition with enough space (1 GB recommended) to store Reporter data files. If you are installing Reporter for the first time, you will need a license file from Catalogic Software to run Reporter. Catalogic Software Data Protection Technical Support and provide the IP address and MAC address of the machine where Reporter is to be installed. You will receive an with the appropriate license file attached. Follow the license application instructions, as specified in this , when applying this Reporter license. Considerations for Upgrades Note the following considerations for an upgrade installation of Reporter: The installation process will detect and upgrade previous versions of Reporter automatically. All historical data will be retained. Tip: It is highly recommended to back up your entire Reporter directory before upgrading to a new version of Reporter. The upgrade makes a physical copy of your database. Before upgrading, make sure you have free space equal to at least twice the current database size (for example if your database is 1 GB, ensure 2 GB of free space is available on that drive BEFORE starting the upgrade. Before upgrading, close any services windows. Installation will not work properly if you leave any of these windows open during installation. Close any applications viewing or editing a file or directory in the old installation directory. Versions older than are no longer upgraded with this release. If you have a version older than 3.8.6, upgrade to or later then upgrade to this version. You can reinstall Reporter, but you must first uninstall the existing software. You cannot reinstall over an existing installation. Tip: All previous data may be deleted after reinstallation. It is highly recommended that you do a backup of your entire Reporter directory before reinstallation. If you are upgrading Reporter, you will be prompted for a license key: 24

25 Important Considerations Before You Begin a Reporter Installation If you are upgrading from release 4.x, you do not need a new key. Click No; the existing license key will be used. If you are upgrading from a release earlier than 4.x, you will need a new license key. Click Yes and choose the new license key. An upgrade DOES NOT retain the current password for the Reporter database. If you are moving Reporter to a different host and/or switching IP addresses, you must request a new Reporter license, one that will accommodate the new MAC address assignment. For more information, obtain a copy of "Moving your Reporter Server" from Catalogic Software Data Protection Technical Support. 25

26 Chapter 6: Installing Reporter Chapter 6: Installing Reporter Install Reporter on any server that can communicate with the master server, as long as that Reporter installation will run on a supported operating system. Note: It is not recommended to install Reporter on your master server or any device server. Tip: 3 GB of space on the installed partition is recommended for installation and subsequent log file growth. To install Reporter: 1. Run <product>reporter_server-windows-xxx.exe (where xxx is the version number) from the Reporter installation CD. If you do not have a Reporter CD, contact Catalogic Software Data Protection Technical Support to get the URL for downloading the install.exe file from the Catalogic Software website. 2. You will be prompted for a destination folder. Accept the default or browse to another folder. Click Next. 3. You will be asked to specify a password for the database installed as part of Reporter. Supply the password and click Next. Tip: The database password is needed for assistance from Catalogic Software Data Protection Technical Support, so be sure to make a note of it in case you need support in the future. 4. You will be prompted to specify the Server Address (the IP Address used by the Reporter server), the Agent Port, and the SNMP Port. The Agent Port is used by the Reporter server to communicate with Reporter agents. The SNMP Port is used by the Reporter server to detect SNMP traps sent from configured devices. Accept the default values. The Reporter server stores this information to enable accurate configuration of the Reporter agents, discussed later in this instruction set. Click Next. 5. The Services Setup screen appears. Note that Reporter creates six services on your system as part of the installation. Five core services are created for Reporter plus a service for the backend database. It is recommended to accept the default values on the Services Setup screen. Click Next to install. 6. You will be prompted for a license key. If you click Yes, you can then browse for the license key. Select the license key file and click Open. Then click Next. Click Finish to complete the installation. 26

27 Chapter 7: Configuring Reporter Chapter 7: Configuring Reporter Following installation of Reporter, double-click the Reporter icon on the desktop. This opens a Web connection to the Reporter Web server on port If you chose to use a machine elsewhere on the network, type the URL, using either the domain name or IP address of your Reporter Server followed by a colon and the number If you successfully completed the installation, the Reporter login screen appears. The default username is admin and the default password is admin. To complete the setup of your Reporter environment, do the following: Step 1. Install a Reporter agent on the master server (and on other servers as needed to monitor their server activity not related to DPX). Step 2. Configure the master server agent (and other server agents as needed to monitor their server activity not related to DPX). Step 3. Configure Virtualization VMware Resources as needed. Step 4. Define Polling Resources. Step 1. Install Agent on the Master Server As a prerequisite for backup reporting, install a Reporter agent on your master server: 1. In Agents folder on the CD, locate the executable file for the operating system of your master server. For the latest system requirements and compatibility details regarding supported hardware, file systems, applications, operating systems, and service packs, go to System Requirements and Compatibility. Installing a Reporter agent on the master server is all that is required to monitor server activity of the master server itself. The agent on the master server does not enable monitoring of overall server activity on servers in the Enterprise, only related activity on those servers. 2. After agent software is installed on the master server, you will be prompted for Server Name (host name or IP address) of the Reporter server, the Agent Web Port (HTTP), and the Server Trap Port (SNMP). The ports should be identical to those you set up during installation of Reporter. See Installing Reporter on page 26. Tip: On the Resources screen, the port settings are displayed when you click in the Agent column for a machine. 3. Click Next. You will then be prompted for the default installation path of the agent software. The Windows default is product-directory\program Files\DPX\Reporter Agent. (Where product-directory represents the directory in which DPX was installed.) Other operating systems will have other defaults. In all cases, you can change the default path. After completing the Reporter agent installation, ReporterAgent is listed as a service among other Windows services. 27

28 Step 2. Configure the Master Server as a Reporter Resource Step 2. Configure the Master Server as a Reporter Resource After installing the appropriate resource agent on the master server, perform the following steps on the Reporter server to complete the configuration of your Agent: 1. On the main Reporter screen, select the Resources link under the Administration folder. The Resources screen appears. 2. From the drop-down list at the upper left, select Catalogic and click Add. The Create New Resource for Agent screen appears 3. Enter values for fields: Server IP Address: Select your master server. Resource Display Name: Enter a descriptive name for your master server (for example, win-210). Active: This check box is selected by default. It enables the Reporter agent to collect your Enterprise data. Accept the selection. Licensing: This check box is selected by default. Accept the selection. Location: Enter the location of DPX, usually c:\program Files\DPX. Click Save. The Configure Resource screen appears. 4. Configure Reporter agents by entering values in fields on the Configure Resource screen: Monitor Backup Server: Select whether or not to monitor backup/restore activity on the master server. Level of the Log: Select the level of detail the client agent will log. Install Dir: Enter the path of the install directory of DPX. Note that the default Windows path is C:\Program Files\DPX. User Name: Enter the user name used to log in to DPX. Password: Enter a password. Resource Name: Enter the resource name or IP address of the master server. Activity Frequency: Select how frequently the log file is monitored. The default frequency is five minutes. Media Frequency: Select how frequently the media database is monitored. The default frequency is twenty four hours. Click Save. This will return you to the Resources screen. 28

29 Step 3. Configure Virtualization VMware Resources On the Resources screen, the master server will display as two entries with same IP address: one entry is Reporter; the other entry is the master server. The master server entry enables Reporter to monitor computer activity on the master server. Note: On the Resources screen you will also see other resources, which are automatically discovered and added once agents are installed on those servers. Step 3. Configure Virtualization VMware Resources The following procedures apply to configuring agents in VMware environments. The procedures are described in the following two sections: Configuring VM Resources Configuring VM Virtual Center Resources Configuring VM Resources 1. On the main Reporter screen, select the Resources link under the Administration folder. The Resources screen appears. 2. From the drop-down list at the upper left, select Virtualization VMware ESX Host. Click Add. The Create New Resource for Agent: VMware ESX screen appears. 3. Enter values for fields on the Create New Resource for Agent: VMware ESX screen: Select Agent: Select a node that will communicate to DPX. This node can be any machine that has the Reporter agent installed. Note: Selecting the master server is not recommended. Tip: This node does not have to be in the Enterprise. Resource Display Name: Enter a descriptive name for your ESX master server. ESX IP Address: The IP address of your ESX Server. Active: Select this check box to enable the agent to collect VMware ESX data. Licensing: Select this check box. Click Save. A resources screen (Create New Resource for Agent: VMware ESX) appears. The added agent appears in the resources list in alphabetical order. 4. On the Resources screen, in the Agent column, select the agent you just added. The Configure Resource screen appears. 5. Configure Reporter VM ESX agents by entering values in fields under VMware Configuration (default values are recommended): 29

30 Step 3. Configure Virtualization VMware Resources Status: Select whether or not to monitor ESX activity. Selecting On ensures Reporter monitors your ESX server. URL: This is the path to the ESX server automatically generated based on the IP address. Accept the path provided. User Name: Enter the user name used to log in to the ESX host. Password: Enter the password used to log in to the ESX host. Config Frequency: Select how frequently to gather information on the ESX host. Performance Frequency: Select how frequently to gather information related to performance. Storage Frequency: Select how frequently to gather information related to storage. Collect Resource Pools: Specify whether or not to collect resource pool information for the ESX host. Click Save. This will return you to the Resources screen. 6. On the Resource screen, in the pane at the left, select Virtualization > Assign ESX Hosts. The host assignment screen appears. 7. On the host assignment screen: a. In the Assign By section, near the upper left, ensure the ESX radio button is selected. b. In the ESX Hosts section: i. In the Available field, select the ESX host to be monitored. ii. In the Reporter Data Collector field, select from the pull-down list the agent machine you previously defined for VM-related communication to Reporter. iii. In the Move field, use the down arrow to move items from Available to Selected. To deselect items, use the up arrow to move items from Selected to Available. c. Click Save. The Resources screen appears and the VM resource will be listed alphabetically. Configuring VM Virtual Center Resources 1. Select the Resources link under the Administration folder. The Resources screen appears. 2. From the drop-down list at the upper left, select Virtualization VMware VC Instance. Click Add. The Create New Resource for Agent: VMware VC appears. 3. Enter values for fields on the Create New Resource for Agent: VMware VC screen: Select Agent: Select a node that will communicate to DPX. This node can any machine that has the Reporter agent installed. Note: Selecting the master server is not recommended. 30

31 Step 4. Define Polling Resources Tip: This node does not have to be in the Enterprise. Resource Display Name: Enter a descriptive name for your VC server. VMware VC IP Address: The IP address of your VC server Click Save. The Configure Resource screen appears. 4. On the Configure Resource screen, enter values for your VM VC server: Status: Select whether or not to monitor activity on the VC server. URL: This is the path to the Virtual Center automatically generated based on the IP address. Accept the path provided. User Name: Enter the user name used to log in to the Virtual Center. Password: Enter the password used to log in to the Virtual Center. Discovery Frequency: Select how frequently to monitor Virtual Center clients. Collect Orphaned VMDK: Select whether or not to collect orphaned VMDK files. Click Save. This will return you to the Resources screen, where the Virtual Center will appear in alphabetical order 5. On the Resources screen, in the pane at the left, select Virtualization > Assign ESX hosts. The host assignment screen appears. 6. On the host assignment screen: a. In the Virtual Center Instance section at the top, select a Virtual Center from the pull-down list. b. In the Assign By section, near the upper left, make sure the ESX radio button is selected. c. In the ESX Hosts section: i. In the Available field, select the Virtual Center to be monitored. ii. In the Reporter Data Collector field, select from the pull-down list the agent you previously defined for VMrelated communication to Reporter. iii. In the Move field, use the down arrow to move items from Available to Selected. To deselect items, use the up arrow to move items from Selected to Available. d. Click Save. The Resources screen appears. All the ESX hosts in the Virtual Center will be displayed. Step 4. Define Polling Resources Reporter supports devices that can be polled for status information such as NetApp storage devices. On the Reporter Server, you can define these devices under the Administration folder's Resources screen. 31

32 Step 4. Define Polling Resources To define hosts, click the Resources link under Administration folder. You can create a new resource by selecting the type of device you want to add and then by clicking Add in the upper right. You will need the IP address, the name of the resource, and other parameters, depending on the type of resource. Choose the groups to which you want the device to belong. Assign the license types you want to use on that resource. 32

33 Chapter 8: Getting Started with Reporter Chapter 8: Getting Started with Reporter Logging In To log in, either click the Reporter icon on your desktop or open your web browser and type in the URL of Reporter server supplied by the administrator. If the administrator selected the default Web server port, type into your browser. The login screen appears. Administrators logging in for the first time will also encounter a First Login window providing information on setting up Reporter defaults, defining groups and hosts, and starting the Reporter Services. Type the default username, which is admin, and the default password, which is also admin, to log in. Follow the instructions on the First Login window. We recommend you change the default password immediately and keep it different from the database password you entered during the installation process. Once devices are defined and being collected, a successful login will go to the Main Console not the First Login page. If you do not see the First Login window, you may see one of the following error messages. Message Reporter requires the use of JavaScript. The browser you are using either does not support JavaScript or it is disabled. Reporter requires the use of cookies. The browser you are using either does not support cookies or they are disabled. Resolution Enable JavaScript and press the Try Again link. Enable cookies and press the Try Again link. Type your assigned username and password in the appropriate fields and then click the Submit button. If you enter an incorrect username and/or password, the following message will appear. Login Failed. Please try again.' If you retry without success or never see a login or error message, contact your Reporter administrator for help. Note that a user will not be able to log in successfully if that user's privileges are restricted solely to notification. If a login is successful, a customized console screen appears Note: The user's Main Console window presents a filtered view of data, blocking out information about hosts and devices that the user is not authorized to see. Only data pertaining to those groups to which the user has been assigned access will appear on the user's screen. Graphical User Interface Overview Once you have successfully logged in, you will be presented with a customized window including the following panes: the Navigation Tree, the Main Console, and the Enterprise Status (Enterprise License only). 33

34 Graphical User Interface Overview Navigation Tree The Navigation Tree appears on the left side of the screen with all folders closed. To view the contents, click on a folder and it will expand. Then you can choose an item beneath the main folder. Once the folder is open, you can click on an item and go to that function. Main Console The console you actually see will depend on both the permissions and the devices that the administrator has assigned to you. If you have been assigned to any group that contains at least one OS Host, you will see the Host Console for all the OS Hosts belonging to the same groups that you do. If none of the groups to which you have been assigned have an OS Host, but at least one contains a Backup Server, then you will see the Backup Console for all backup servers that belong to the same groups. Enterprise Status The Reporting Server Enterprise status screen gives the user a quick overview of the status of the OS hosts and backup status in near real time. Here you can link directly to the real time host monitor and the backup console. General GUI Notes The following points offer guidance regarding Reporter's graphical user interface. The user's console screen presents a filtered view of data, blocking out information about hosts and devices that the user is not authorized to see. Only data pertaining to those groups to which the user has been assigned access will appear on the user's screen. For example, if a user has been assigned to the Solaris group (with Solaris OS Hosts) but no other groups, then Solaris data will be displayed but information about Windows and HP-UX systems will not appear on that user's screen. If the user has not been assigned to a group, a Getting Started window will appear displaying the following message: There are currently no hosts visible to you. Either you have not been assigned to a group, or the hosts assigned to you have not begun collecting data. Contact your system administrator for more information. Administrators logging in for the first time will also encounter a similar Getting Started window providing information on defining groups and hosts, and starting the collector and event receiver. 34

35 Chapter 9: Uninstalling Reporter or Reporter Agents Chapter 9: Uninstalling Reporter or Reporter Agents To uninstall Reporter or Reporter agents: 1. Close the Services window. 2. Open the Windows Control Panel. 3. Select Add/Remove Programs. 4. Remove Reporter server or Reporter agent. 35

36 ACRONYMS A ACL Access Control List ACS Automated Cartridge System ACSLS Automated Storage Management ATL Automated Tape Library ATL Active Template Library AVB Agentless VMware Backup B ACRONYMS ACSSA AD ADIC AES AIX AML ANSI API ASCII A-SIS ASM Automated Cartridge System Library Software ACS System Administrator (StorageTek) Active Directory Advanced Digital Information Corporation Advanced Encryption Standard Advanced Interactive Executive Automated Mixed-Media Library American National Standards Institute Application Programming Interface American Standard Code for Information Interchange Advanced Single Instance Storage Bcc Blind Carbon Copy BLB Binary Large Object BLI Block Level Incremental BMR Bare Metal Recovery C CA Certificate Authorities CAP Cartridge Access Port CBT Change Block Tracking Cc Carbon Copy CCMS Computer Center Management System CCR Cluster Continuous Replication CD 36

37 Compact Disc Documentation Management Services ACRONYMS CIFS DNS Common Internet File System Domain Name System CLI DOM Command Line Interface Domain CPU DOS Central Processing Unit Disk Operating System CSI DOSS Client System Interface DPX Open Storage Server CSV DSR Comma Separated Value Dissimilar Restore D DAG Database Availability Group DAOS Domino Attachment and Object Service DAR Direct Access Recovery DAS Direct Attached Storage DFS Distributed File System DGUX Data General UNIX DHCP Dynamic Host Communication Protocol DLL Dynamic Link Library DLT Digital Linear Tape DMS DVD Digital Versatile Disc E EDB Exchange Database EE Enterprise Edition EEE Enterprise-Extended Edition EFS Encrypting File System EMBR DPX Exchange Mailbox Recovery EOJ End Of Job ESC Enhanced Security Configuration F FAS 37

38 Fibre-Attached Storage FV Full Virtualization G GB Gigabyte GNU General Public License GPT GUID Partition Table GUI Graphical User Interface GUID Global Unique Identifier H HBA Host Bus Adapter HP-UX Hewlett Packard UNIX HSM Hierarchical Storage Management HTTP Hypertext Transfer Protocol I IA Instant Access IBM International Business Machines ACRONYMS IBM 3494 IBM Magstar 3494 Tape Library IE Internet Explorer IIS Internet Information Services IP Internet Protocol IPX Internetwork Packet Exchange iscsi Internet Small Computer System Interface ISO International Organization for Standardization IV Instant Virtualization J JDBC Java Database Connectivity JRE Java Runtime Environment K KB Knowledge Base KMS Knowledge Management System L LAN 38

39 ACRONYMS Local Area Network LDAP Lightweight Directory Access Protocol LMU Library Management Unit LSM Library Storage Module LTO Linear Tape Open LUN Logical Unit Number LVM Logical Volume Management M MAC Media Access Control MB Megabyte MML Media Management Layer MOSS Microsoft Office SharePoint Server MTA Message Transfer Agent N NAS Network Attached Storage NCF NetWare Control File NCS Novell Clustering Services NDMP Network Data Management Protocol NDS Novell Directory Services NFS Network File System NIC Network Interface Controller NIS NetWare Installation Services NSS Novell Storage System NTFS NT File System O OES Open Enterprise Server OS Operating System OSSV Open System SnapVault P P2V Physical to Virtual PC Personal Computer PDF Portable Document Format PNL 39

40 ACRONYMS Panel Rapid Return to Production PO RSG Post Office Recovery Storage Group (Exchange) POA RSM Post Office Agent Removable Storage Manager PXE RSS Pre-boot Execution Environment Remote Storage Service Q QoS S SAN Quality of Service qtree Quota Tree R RAC Real Application Clusters RAID Redundant Array of Independent Disks RAM Random Access Memory RC Return Code RDB Recovery Database (Exchange) RDM Raw Device Mapping ReFS Resilient File System RMAN Recovery Manager (Oracle) RRP Storage Area Network SAPDBA SAP Database Administrator SCSI Small Computer System Interface SDLC Scalar Distributed Library Controller SGI Silicon Graphics International (IRIX) SIDF System Independent Data Format SIS Single Instance Storage SLA Service Level Agreement SLDM Solaris Logical Disk Manager SLES SUSE Linux Enterprise Server SMDR Storage Management Date Requester SMIT 40

41 System Management Interface Tool SMTape SnapMirror-to-Tape SMTP Simple Mail Transfer Protocol SNIA Storage Networking Industry Association SNMP Simple Network Monitoring Protocol SPF System Protected Files SPOR DPX SharePoint Object Recovery SQL Structured Query Language SRM Storage Resource Manager SSI Storage Server Interface SSL Secure Sockets Layer SSO Single Sign-On SSP Shared Service Provider SSPRODIR DPX Product Directory SVM Solaris Volume Manager SYSADMIN System Administrator T ACRONYMS TB Terabyte TCP/IP Transmission Control Protocol/Internet Protocol TFTP Trivial File Transfer Protocol TLS Transport Layer Security TNS Transparent Network Substrate TSA Target Service Agents TTY Teletype U UAT Upgrade Assessment Tool UEFI Unified Extensible Firmware Interface UFS UNIX File System URL Uniform Resource Locator USB Universal Serial Bus V V2P Virtual to Physical VADP vstorage APIs for Data Protection 41

42 ACRONYMS VC Virtual Center VD Virtual Desktop VG Volume Group VM Virtual Machine VMFS Virtual Machine File System VMDK Virtual Machine Disk VSS Volume Snapshot Service VTL Virtual Tape Library VTOC Virtual Table of Contents VxFS Veritas File System VxVM Veritas Volume Manager W WAN Wide Area Network WMI Windows Management Instrumentation WS Web Server WSPN Web Server Port Number 42

43 TERMINOLOGY A administrator A user authorized for administrative functions such as defining backup jobs. administrator group A set of administrators assigned to share common resources and functions. agentless backup A method to back up virtual machines under a hypervisor without the need for backup agents on the virtual machines. Agentless VMware Backup A feature that exploits VMware vstorage application programming interface for data protection and change block tracking to enable off-host backup of vsphere virtual machines through DPX backup proxy servers, eliminating the need to install and run a backup agent on virtual machines or ESX servers. alternate secondary An alternate location where backup data resides. This alternate location could be a replica of the original data using NetApp SnapMirror, copied through Data ONTAP commands, or restored from a tape backup. Data can be restored from an alternate secondary data source directly from the management console. Application Recovery A DPX Block Data Protection feature that rapidly recovers Oracle, SharePoint, SQL Server, and Exchange data with a high degree of granularity. B backup definition A set of parameters that defines key elements of a backup job, such as backup type, source data, destination, and schedule. TERMINOLOGY backup instance A point-in-time backup that can be selected for restore. backup mode Any of several modes for backing up, including Block, Agentless VMware, NDMP, Image, and File. One way in which the modes differ is the underlying method by which the data is transferred. backup type A term used to distinguish among base, incremental, and differential backups. Bare Metal Recovery A disk-based disaster recovery feature that enables administrators to restore an entire system environment for an individual computer. A full recovery using Bare Metal Recovery includes the operating system, point-in-time backed up data, and Oracle, SharePoint, SQL Server, and Exchange data if applicable. If the computer being recovered is a master server, Bare Metal Recovery additionally restores the application. base backup A backup type that backs up all the data in the selected job definition. Block backup to DPX open storage A feature that provides block-level incremental backup for Windows and Linux clients to any storage attached to a supported 64-bit Windows server. Block mode A backup and restore mode that uses DPX Block Data Protection technology to perform block-level backup to either DPX open storage or NetApp storage. block-level incremental A scheme used for backups where all backups after the first base backup transfer only blocks that have changed since the previous backup, and transferred data is synthesized on sec- 43

44 TERMINOLOGY C ondary storage into a full point-in-time snapshot of the primary system. Catalog A database that stores all job information, retention information, and information about all backed up data. The Catalog is on the master server. Catalog condense An operation to reduce the size of the Catalog by eliminating unneeded information such as expired backup jobs. Catalogic DPX Catalogic data protection software that uses block-level backup to protect data, applications, and servers. File-level backup and disk-to-diskto-tape is also supported. client or client node Any node in an Enterprise which is a source for backup data. Master servers and device servers can also be client nodes. cluster Multiple computers and redundant interconnections that form what appears to be a single, highly available system. Clustering ensures that when a computer unexpectedly fails or is intentionally taken down, the processes and services it is running fail over to another computer in the cluster without interruption or the need for immediate user intervention. configuration The process that entails defining the properties of nodes, storage devices, media, and administrators. controller node A node that communicates with and controls a media changer. D destination For a backup, the destination is the location to which data is backed up. For a restore, the destination is the location to which data is restored. The destination is selected in the destination panel of the backup or restore function window, as appropriate. Same as target. detect utility A utility that performs and reports on device detection within automated tape libraries. device cluster A set of similar devices, for example LTO4 tape drives, logically grouped to simplify backup definition. The software dynamically chooses an available device from the specified device cluster for use in a backup. The tape drives in a tape library can be considered a device cluster. Device Configuration Wizard A utility that bypasses many of the manual steps otherwise required for setting up tape libraries and standalone devices to work with the software. The Device Configuration Wizard helps discover, aggregate, and set up all the necessary media changer and device related hardware configuration for tape library use. device path The node through which data flows from the network to a storage area network device. A storage area network device can have multiple device paths, each through a different node. Every node that can access the storage area network could be a path to that device. For a non-storage area network device, there is only one device path per device device server A node where one or more storage devices are attached directly or through a storage area network. differential backup A backup type that backs up all data on the selected nodes that have changed since the 44

45 TERMINOLOGY last base backup of the same name. Direct Access Recovery A process that enables restores from a Network Data Management protocol backup without having to scan the entire backup image. DiskDirectory A virtual tape device that uses traditional media agents to save data into proprietary formatted files hosted on a device server. DiskDirectories are used with file mode backups and do not benefit from features such as Bare Metal Recovery. Backups to DiskDirectory are often used in cases where clients need to stream data to faster disk devices and later move the data to tape. DPX Block Data Protection A protection and recovery model that comprehensively backs up client nodes to diskbased storage using the DPX agent. Features include block-level incremental snapshot technology, Instant Access and Instant Virtualization, source and target side data reduction, bare metal recovery, and application recovery. DPX open storage server The destination server for a Block backup to DPX open storage operation. E Enterprise The entire set of resources, including nodes, devices, media, administrators, defined to a master server. Exchange Mailbox Recovery A utility that utilizes Instant Access to easily recover mailbox items from dismounted Exchange databases and information store files. Also enables copying, searching, and analyzing and attachments, calendar items, contacts, etc. F File mode A backup or restore mode that backs up and restores at the file level, not block level. Also referred to as File backup or File restore. Full Virtualization A feature that creates, and optionally boots, a virtual machine created directly from a DPX Block Data Protection snapshot. I Image mode A base backup mode at block level, typically to tape, or a restore mode from such a backup. This mode is used only for remote seeding and protection of a DPX open storage server. Also referred to as Image backup or Image restore. incremental backup A backup type that backs up data that has changed on the selected nodes since the last incremental, differential, or base backup of the same job name. installation The process of loading the software and adding new nodes to the Enterprise. Instant Access A feature that provides instant writable access to data and application recovery points. A DPX Block Data Protection snapshot is mapped to a target server where it can be accessed, copied, or put immediately into production use as needed. Instant Virtualization A feature that creates a virtual machine by directly mapping devices from the restore point for fast startup. Instant Virtualization is similar to Full Virtualization except that data is not physically transferred. 45

46 TERMINOLOGY J job folder User defined sets of jobs, such as backup jobs, that facilitate assigning job privileges to administrator groups. job monitor A feature that enables job control functions, including suspending a job, starting or resuming a job, canceling a job, previewing a job, and monitoring a job. K keyring A group of keys used for data encryption. L license key A proprietary alphanumeric string assigned when licensing. Same as product key. logical unit number A logical unit of storage identified by a number. This term is often used to describe a data set associated with fiber channel physical storage, or iscsi presented data sets. M management console A graphical user interface that offers clear and visual methods for performing functions. Same as GUI. manual configuration The process that employs the management console to define the properties of nodes, devices, media, and administrators. mapping A process that uses Instant Access to present a snapshot to a host, making the backup data set read/write accessible through iscsi. Same as IA mapping. master server A server that contains the product software including the Catalog and modules that control resource and job management, scheduling, and distributed processing. The master server can also be a client node. media A storage unit such as a tape or DiskDirectory. Same as media volume. media arm device file The file name of the tape library driver. It is installed on a controller node and enables the software to communicate with a given media changer. media changer The device in a tape library that moves tapes between storage devices and tape slots. Same as medium changer and robotic arm. media pool A set of similar media logically grouped to simplify tape management. The software dynamically chooses available media from the specified media pool for use in a backup. N NetApp Open System SnapVault A feature that backs up open systems, such as HP-UX and AIX, to disk-based storage hosted on NetApp secondary storage systems using the NetApp Open System SnapVault agent. NetApp Open System SnapVault does not have DPX Block Data Protection feature support such as Bare Metal Recovery and Instant Virtualization. NetApp SnapMirror A NetApp software product for replicating data sets between NetApp storage systems. NetApp SnapVault Management A feature that manages NetApp SnapVault and NetApp Open System SnapVault backup and 46

47 TERMINOLOGY recovery through the management console. NetApp storage controller The component of a NetApp storage system that runs the Data ONTAP operating system and controls its disk subsystem. Storage controllers are sometimes referred to as controllers, storage appliances, appliances, storage engines, heads, CPU modules, or controller modules. NetApp storage system A disk-based appliance that stores DPX Block Data Protection snapshots. For pre-configuration and Bare Metal Recovery, this is sometimes referred to as a SnapVault secondary storage system. Network Data Management Protocol An Internet standard protocol implemented and extended by hardware manufacturers for device control. Network Data Management Protocol operations typically cover access to disk and tape drive resources for backup and restore operations. Network Data Management Protocol mode A backup and restore mode that backs up from or restores data to disk storage system using Network Data Management Protocol. Also referred to as NDMP backup or NDMP restore. node A machine on the network that is part of the Enterprise. node group A set of nodes logically grouped to simplify backup definitions. All nodes must belong to a node group. P parameter configuration The process that entails defining software module parameters and environmental variables. privilege class A role-based set of administrative privileges that can be assigned to administrators. product upgrade A feature to upgrade the client and device server software across the Enterprise from a single point. Same as auto-upgrade and autoupgrade. R Rapid Return to Production A feature that creates a full production virtual machine from an existing virtual machine created with Instant Virtualization. The virtual machine is available immediately for production, while data is transferred in the background to a newly created virtual machine disk file. remote deployment A feature to install client software across the Enterprise from a single point. Reporter A feature that provides sophisticated reporting to help manage and administer protection for the Enterprise. restore definition A set of parameters that defines key elements of a restore job, such as source data, destination, and schedule. restore mode One of several types of restore, including Block, Agentless VMware, NDMP, Image, File, and Tape. retention period The time range during which snapshot data is available for restore. Same as retention. S scheduler A function for designating the time, frequency, and reoccurrence of a job. seeding A procedure used to initiate block-level incremental backups when the source data exists on 47

48 TERMINOLOGY the other side of a slow wide area network connection. The base backup is physically transported to the remote site, where it is copied to a disk storage system. Once seeded, the remote storage system continues to receive incremental backups over the wide area network. SharePoint Object Recovery A utility that enables administrators to easily find and rapidly recover SharePoint objects. snapshot A point-in-time block-level copy of a volume or entire node. The snapshot exists on a disk storage system for recovery at file, folder, volume, or node level. software update The process of applying software patches either manually or through the software update system. Same as auto-update and autoupdate. software update system A utility to deliver and deploy a software update. source For a backup, the source is the location of data to be backed up. For a restore, the source is the location of the backup. The source is selected in the source panel of the backup or restore function window in the management console, as appropriate. storage area network A fiber channel based network used to provide common access to storage and tape devices across many servers. See device path. storage device A device, such as a tape drive, used to write data onto or read data from disk or tape media. storage system The destination for backup snapshots and the source for recoveries. This is sometimes referred to as secondary storage or backup storage. Registration DB, registry, and system protected files. system table A collection of the Microsoft Windows components including event logs, removable storage manager, terminal server, and Windows Management Instrumental repository. T tape drive A device used to write data onto or read data from tape media. Same as tape device. tape library A hardware unit comprised of multiple physical or virtual tape drives and tape slots with a media changer for automatically inserting and removing tapes. Same as automated tape library and jukebox. Tape mode A restore mode that restores data from one or more media. This option is useful for restoring uncataloged data. In this mode, a search pattern is specified, and then searches the media for data that fits the pattern and restores it. Also referred to as Tape backup or Tape restore. tape slot A component of a tape library where a tape is stored when not in use. Transmission Control Protocol/Internet Protocol An Internet standard communication protocol used to communicate with nodes in the Enterprise. Usually referred to as TCP/IP. U Upgrade Assessment Tool A utility that identifies potential issues, such as unsupported features, before a product upgrade is run. system state A collection of the Microsoft Windows components including boot files, COM+ Class 48

49 TERMINOLOGY V virtual node An object that represents clustered or distributed services through two or more physical nodes. Examples of support through virtual nodes include clusters, SQL server, SharePoint farms, and Exchange 2010 database availability groups. virtualization The process of creating a virtual machine from a snapshot. Types of virtualization are Instant, Full, and Rapid Return to Production. virtualization proxy server A node that coordinates operations for virtualization restores and for agentless backup of virtual machines. volser The volume serial number. This is a unique identifying number written to a media volume, such as a tape, or a disk directory volume. Also referred to as a media volume label or tape label. 49

50 TRADEMARKS TRADEMARKS This publication contains proprietary and confidential material, and is only for use by licensees of Catalogic DPX, Catalogic BEX, or Catalogic ECX proprietary software systems. This publication may not be reproduced in whole or in part, in any form, except with written permission from Catalogic Software. Commonly Used Company and Product Names The following companies and products might be used in the Catalogic DPX documentation and management console: Adobe Reader, PDF Flexera Software InstallShield FreeBSD Hewlett Packard or HP HP-UX, HP Tru64 UNIX IBM DB2, Lotus Notes, Domino, AIX, Magstar, Tivoli Storage Manager Kroll Application Recovery Options, Exchange Mailbox Recovery, SharePoint Object Recovery Linux Microsoft AlwaysOn, Excel, Exchange, Hyper-V,Internet Explorer, Internet Information Services (IIS), iscsi Initiator, Notepad, SharePoint, SQL Server, Vista, Visual SourceSafe (VSS), Windows, Windows Server, Word, WordPad NetApp Novell Oracle Data ONTAP, FilerView, FlexVol, NearStore, NOW, RAID-DP, SnapMirror, Snapshot, OSSV, WAFL, FlexClone, SnapVault, SnapManager, OnCommand, MultiStore NetWare, Open Enterprise Server, GroupWise, SUSE, edirectory Java, Solaris, RMAN, StorageTek Tape Storage Quantum 50

51 TRADEMARKS Advanced Digital Information Corp. Red Hat CentOS SAP SGI Sybase IRIX, XFS UNIX VMware ESX server, ESXi server, vcenter, vsphere, VMware Consolidated Backup, vmotion, VDDK, VMDK Additional Trademark Information The following list contains additional trademark information: Catalogic, Catalogic Software, DPX, BEX, ECX, and NSB are trademarks of Catalogic Software, Inc. Backup Express is a registered trademark of Catalogic Software, Inc. All other company and product names used herein may be the trademarks of their respective owners. NetApp, the NetApp logo, Go further, faster, Data ONTAP, FilerView, FlexClone, FlexVol, NearStore, RAID-DP, Snapshot, and SnapVault are trademarks or registered trademarks of NetApp, Inc. in the United States and/or other countries. NetApp provides no representations or warranties regarding the accuracy, reliability, or serviceability of any information or recommendations provided in this publication, or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS, and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document. Windows and SharePoint are registered trademarks of Microsoft Corporation. Oracle and Java are registered trademarks of Oracle and/or its affiliates. VMware is a registered trademark of VMware, Inc. Novell is a service mark of Novell, Inc. and a registered trademark of Novell, Inc. in the United States and other countries. SUSE is a registered trademark of Novell, Inc. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. 51

52 TRADEMARKS UNIX is a registered trademark of The Open Group in the United States and other countries. Red Hat is a registered trademark of Red Hat, Inc. in the United States and other countries. AIX is a registered trademark of International Business Machines Corporation, registered in many jurisdictions worldwide. Sybase is a registered trademark of Sybase, Inc. or its affiliates. SAP is the trademark(s) or registered trademark(s) of SAP AG in Germany and in several other countries. Quantum is a registered trademark of Quantum Corporation, registered in the U.S. and other countries. FreeBSD is a registered trademark of The FreeBSD Foundation. SGI and IRIX are registered trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. This document might contain certain diagrams created using the official VMware icon and diagram library. Copyright 2010 VMware, Inc. All rights reserved. Copyright 2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. All other company and product names used herein may be the trademarks of their respective owners. 52

53 INDEX A About this Document 21 acronyms 36 Agents folder 27 applications guide audience and purpose 11 introduction 11 audience for applications guide 11 C compatibility considerations Solaris 22 SQL 17 Windows 22 D Database 23 Databases Media 28 definitions 43 device server 26 documentation 6 Documentation Knowledge Base and Technical Support 6 DPX Overview 6 E ESX server 29 F For Additional Information 22 Functional GUI windows Agent Setup 27 Configure Resource Create New Resource for Agent VMware ESX 29 VMware VC 30 Create New Resources for Agent 28 First login 33 Getting Started 34 G Main Console 33 Enterprise Status 33 Main Console 33 Navigation Tree 33 Main Resources Screen 28 Resources glossary 43 H Help getting 6 I Instant Access (IA) with EMR 13 with SOR 18 IP address 24-28, 32 ESX 29 VMware VC 31 K Knowledge Base 6 L License file 24 license key reporter installation 26 Login 27 M MAC address 24 master server 21, Memory 23 N NetApp support 6 NetApp storage devices 31 Nomenclature 22 INDEX 53

54 INDEX O Orphaned VMDK 31 Overview 6 P Polling Resources 31 Ports 23 Agent port Communications port 23 SNMP port Trap listener port 23 Web server port 23, 27, 33 purpose of applications guide 11 R RAID 23 Report types Customizable reporting 21 Exception reports 21 Forecasts 21 Management reports 21 Master server reports 21 Media reports 21 Monitoring 21 Multiple backup server data 21 Node perspective 21 Notifications 21 Post-job reports 21 Trending 21 T terminology 43 Trademarks 50 U unicode 10 uninstalling reporter 35 Upgrades 24 V VC 30 Virtualization VM Resources configuring 29 VM Virtual Center 30 VMware 29 S Servers HP-UX 34 Solaris 34 Windows 34 Services 26, 35 MySQL ReporterAgent 27 Services Setup 26 SharePoint Object Recovery (SPOR) 17 SPOR 17 SQL Server and SOR 17 support contacting 6 Support 6 54

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide Direct Storage Access Using NetApp SnapDrive Installation & Administration Guide SnapDrive overview... 3 What SnapDrive does... 3 What SnapDrive does not do... 3 Recommendations for using SnapDrive...

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 Administration GUIDE Exchange Database idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 User Guide - Exchange Database idataagent Table of Contents Overview Introduction Key Features

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Exchange Mailbox Protection Whitepaper

Exchange Mailbox Protection Whitepaper Exchange Mailbox Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Exchange add-on comparison... 2 Advantages and disadvantages of the different PST formats... 3 2. How Exchange

More information

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816. RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...

More information

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V)

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) Page 1 of 31 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data

More information

Symantec NetBackup Getting Started Guide. Release 7.1

Symantec NetBackup Getting Started Guide. Release 7.1 Symantec NetBackup Getting Started Guide Release 7.1 21159722 Contents NetBackup Getting Started Guide... 5 About NetBackup... 5 How a NetBackup system works... 6 How to make a NetBackup system work for

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

Upgrading to Document Manager 2.7

Upgrading to Document Manager 2.7 Upgrading to Document Manager 2.7 22 July 2013 Trademarks Document Manager and Document Manager Administration are trademarks of Document Logistix Ltd. TokOpen, TokAdmin, TokImport and TokExRef are registered

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

Getting Started with ESXi Embedded

Getting Started with ESXi Embedded ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

VMware/Hyper-V Backup Plug-in User Guide

VMware/Hyper-V Backup Plug-in User Guide VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,

More information

DOCSVAULT Document Management System for everyone

DOCSVAULT Document Management System for everyone Installation Guide DOCSVAULT Document Management System for everyone 9 v Desktop and Web Client v On Premises Solution v Intelligent Data Capture v Email Automation v Workflow & Record Retention Installing

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Catalogic DPX TM 4.3. DPX Open Storage Best Practices Guide

Catalogic DPX TM 4.3. DPX Open Storage Best Practices Guide Catalogic DPX TM 4.3 DPX Open Storage Best Practices Guide Catalogic Software, Inc TM, 2014. All rights reserved. This publication contains proprietary and confidential material, and is only for use by

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 INSTALLATION GUIDE Table Of Contents 1. Installation Overview... 1 If you are upgrading... 1 Installation Choices... 1 ZENworks

More information

System Protection for Hyper-V Whitepaper

System Protection for Hyper-V Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Definitions... 3 Considerations... 3 2. About the BackupAssist Hyper-V solution... 4 Advantages... 4

More information

insync Installation Guide

insync Installation Guide insync Installation Guide 5.2 Private Cloud Druva Software June 21, 13 Copyright 2007-2013 Druva Inc. All Rights Reserved. Table of Contents Deploying insync Private Cloud... 4 Installing insync Private

More information

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in

More information

Table of Contents. Online backup Manager User s Guide

Table of Contents. Online backup Manager User s Guide Table of Contents Backup / Restore VMware Virtual Machines... Error! Bookmark not defined. Backup virtual machines running on VMware ESXi / ESX Server with VDDK / non VDDK... 2 Requirements and recommendations...

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Administration GUIDE SharePoint Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Getting Started - SharePoint Server idataagent Overview Deployment Configuration Decision Table

More information

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V)

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) Page 1 of 19 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.2 User Manual for Mac OS X Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved. Attix5, 2013 Trademarks

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.

More information

Installation and User Guide for Partners and Businesses

Installation and User Guide for Partners and Businesses Installation and User Guide for Partners and Businesses Copyright 2013 SOS Online Backup Table of Contents Page Getting Ready 3 Choosing Components 4 Installing and Configuring ShadowProtect 5 Setting

More information

Exchange Server Backup and Restore

Exchange Server Backup and Restore WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. 2001-2007 2 Contents 1. Introduction... 3 1.1 Overview... 3 1.2 Requirements... 3 1.3 Requirements for remote backup of Exchange 2007...

More information

Spector 360 Deployment Guide. Version 7

Spector 360 Deployment Guide. Version 7 Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...

More information

Attix5 Pro Plug-ins. V6.2 User Manual. Cover. for Microsoft Windows. Your guide to installing and using Attix5 Pro plug-ins. Last updated: 2011/10

Attix5 Pro Plug-ins. V6.2 User Manual. Cover. for Microsoft Windows. Your guide to installing and using Attix5 Pro plug-ins. Last updated: 2011/10 Attix5 Pro Plug-ins V6.2 User Manual Cover for Microsoft Windows Your guide to installing and using Attix5 Pro plug-ins. Last updated: 2011/10 SERVER EDITION V6.0 for MICROSOFT WINDOWS Copyright Notice

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation

More information

Installation Guide. Yosemite Backup. Yosemite Technologies, Inc

Installation Guide. Yosemite Backup. Yosemite Technologies, Inc Installation Guide Yosemite Backup Yosemite Technologies, Inc ii Yosemite Backup Installation Guide Notice Copyright Information in this document is subject to change without notice. makes no representations

More information

CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) USER GUIDE

CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) USER GUIDE CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) USER GUIDE WELCOME TO THE VIRTUAL SERVER (SHARED) USER GUIDE AUSTRALIAN ACCOUNT HOLDERS For sales, account set-up enquiries and technical support, contact your

More information

Reporting for Contact Center Setup and Operations Guide. BCM Contact Center

Reporting for Contact Center Setup and Operations Guide. BCM Contact Center Reporting for Contact Center Setup and Operations Guide BCM Contact Center Document Number: NN40040-302 Document Status: Standard Document Version: 04.00 Part Code: N0060637 Date: June 2006 Copyright 2005

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

CA arcserve Unified Data Protection Agent for Linux

CA arcserve Unified Data Protection Agent for Linux CA arcserve Unified Data Protection Agent for Linux User Guide Version 5.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as

More information

BDR for ShadowProtect Solution Guide and Best Practices

BDR for ShadowProtect Solution Guide and Best Practices BDR for ShadowProtect Solution Guide and Best Practices Updated September 2015 - i - Table of Contents Process Overview... 3 1. Assess backup requirements... 4 2. Provision accounts... 4 3. Install ShadowProtect...

More information

Juris Installation / Upgrade Guide

Juris Installation / Upgrade Guide Juris Installation / Upgrade Guide Version 2.7 2015 LexisNexis. All rights reserved. Copyright and Trademark LexisNexis, Lexis, and the Knowledge Burst logo are registered trademarks of Reed Elsevier Properties

More information

Reconfiguring VMware vsphere Update Manager

Reconfiguring VMware vsphere Update Manager Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Attix5 Pro Storage Platform

Attix5 Pro Storage Platform Attix5 Pro Storage Platform V6.0 User Manual Cover for Microsoft Windows Your guide to configuring the Attix5 Pro Storage Platform. SERVER EDITION V6.0 for MICROSOFT WINDOWS Copyright Notice and Proprietary

More information

How To Install The Exchange Idataagent On A Windows 7.5.1 (Windows 7) (Windows 8) (Powerpoint) (For Windows 7) And Windows 7 (Windows) (Netware) (Operations) (X

How To Install The Exchange Idataagent On A Windows 7.5.1 (Windows 7) (Windows 8) (Powerpoint) (For Windows 7) And Windows 7 (Windows) (Netware) (Operations) (X Page 1 of 208 User Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

Stellar Phoenix Exchange Server Backup

Stellar Phoenix Exchange Server Backup Stellar Phoenix Exchange Server Backup Version 1.0 Installation Guide Introduction This is the first release of Stellar Phoenix Exchange Server Backup tool documentation. The contents will be updated periodically

More information

Enterprise Server. Application Sentinel for SQL Server Installation and Configuration Guide. Application Sentinel 2.0 and Higher

Enterprise Server. Application Sentinel for SQL Server Installation and Configuration Guide. Application Sentinel 2.0 and Higher Enterprise Server Application Sentinel for SQL Server Installation and Configuration Guide Application Sentinel 2.0 and Higher August 2004 Printed in USA 3832 1097 000 . Enterprise Server Application Sentinel

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

How To Backup In Cisco Uk Central And Cisco Cusd (Cisco) Cusm (Custodian) (Cusd) (Uk) (Usd).Com) (Ucs) (Cyse

How To Backup In Cisco Uk Central And Cisco Cusd (Cisco) Cusm (Custodian) (Cusd) (Uk) (Usd).Com) (Ucs) (Cyse This chapter includes the following sections: Backup and Import in Cisco UCS Central, page 1 Backing up and Restoring Cisco UCS Central, page 4 Backing up and Restoring Cisco UCS Domains, page 8 Import

More information

SAM Server Utility User s Guide

SAM Server Utility User s Guide SAM Server Utility User s Guide Updated May 2012 Copyright 2010, 2012 by Scholastic Inc. All rights reserved. Published by Scholastic Inc. PDF0157 (PDF) SCHOLASTIC, READ 180, SYSTEM 44, SCHOLASTIC EXPERT

More information

Quick Start - Virtual Server idataagent (VMware)

Quick Start - Virtual Server idataagent (VMware) Page 1 of 24 Quick Start - Virtual Server idataagent (VMware) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data Minimal

More information

External Data Connector (EMC Networker)

External Data Connector (EMC Networker) Page 1 of 26 External Data Connector (EMC Networker) TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS INSTALLATION (WINDOWS) INSTALLATION (UNIX) GETTING STARTED Perform a Discovery Perform a Migration ADVANCED

More information

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 3.0 User Guide P/N 300-999-671 REV 02 Copyright 2007-2013 EMC Corporation. All rights reserved. Published in the USA.

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom

More information

StrikeRisk v6.0 IEC/EN 62305-2 Risk Management Software Getting Started

StrikeRisk v6.0 IEC/EN 62305-2 Risk Management Software Getting Started StrikeRisk v6.0 IEC/EN 62305-2 Risk Management Software Getting Started Contents StrikeRisk v6.0 Introduction 1/1 1 Installing StrikeRisk System requirements Installing StrikeRisk Installation troubleshooting

More information

Backup Manager Configuration and Deployment Guide. Version 9.1

Backup Manager Configuration and Deployment Guide. Version 9.1 Backup Manager Configuration and Deployment Guide Version 9.1 Contents Backup Manager 3 Backup Manager Support 9 Backup Manager Configuration and Deployment 14 Defining a Backup Manager Profile 14 Configuring

More information

13.1 Backup virtual machines running on VMware ESXi / ESX Server

13.1 Backup virtual machines running on VMware ESXi / ESX Server 13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Archive Attender Version 3.5

Archive Attender Version 3.5 Archive Attender Version 3.5 Getting Started Guide Sherpa Software (800) 255-5155 www.sherpasoftware.com Page 1 Under the copyright laws, neither the documentation nor the software can be copied, photocopied,

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup

More information

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15 Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

NetIQ Sentinel 7.0.1 Quick Start Guide

NetIQ Sentinel 7.0.1 Quick Start Guide NetIQ Sentinel 7.0.1 Quick Start Guide April 2012 Getting Started Use the following information to get Sentinel installed and running quickly. Meeting System Requirements on page 1 Installing Sentinel

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

Installation and configuration of Real-Time Monitoring Tool (RTMT)

Installation and configuration of Real-Time Monitoring Tool (RTMT) Installation and configuration of Real-Time Monitoring Tool (RTMT) How to install and upgrade RTMT, page 1 Services, servlets, and service parameters on server, page 5 Navigation of RTMT, page 6 Nonconfigurable

More information

EVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM

EVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM EVault for Data Protection Manager Course 321 Protecting Exchange 2010 with DPM Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers

More information

ArCycle vmbackup. for VMware/Hyper-V. User Guide

ArCycle vmbackup. for VMware/Hyper-V. User Guide ArCycle vmbackup for VMware/Hyper-V User Guide 2 Copyright Copyright ArCycle Software, Ltd., 2011-2014. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Silect Software s MP Author

Silect Software s MP Author Silect MP Author for Microsoft System Center Operations Manager Silect Software s MP Author User Guide September 2, 2015 Disclaimer The information in this document is furnished for informational use only,

More information

Installing The SysAidTM Server Locally

Installing The SysAidTM Server Locally Installing The SysAidTM Server Locally Document Updated: 17 October 2010 Introduction SysAid is available in two editions: a fully on-demand ASP solution and an installed, in-house solution for your server.

More information

Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide

Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide Page 1 of 243 Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide (This is an alpha version of Benjamin Day Consulting, Inc. s installation

More information

NETWRIX CHANGE REPORTER SUITE

NETWRIX CHANGE REPORTER SUITE NETWRIX CHANGE REPORTER SUITE QUICK-START GUIDE Product Version: 2.0 November/2011. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

How To Manage Your Email On A Microsoft Powerbook 2.5 (For Microsoft) On A Macbook 2 (For A Mac) On An Iphone Or Ipad (For An Ipad) On Your Pc Or Macbook

How To Manage Your Email On A Microsoft Powerbook 2.5 (For Microsoft) On A Macbook 2 (For A Mac) On An Iphone Or Ipad (For An Ipad) On Your Pc Or Macbook Page 1 of 285 User Guide - Exchange Mailbox idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE MAILBOX IDATAAGENT DEPLOYMENT -

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Installing and Configuring WhatsUp Gold

Installing and Configuring WhatsUp Gold Installing and Configuring WhatsUp Gold This guide provides information about installing and configuring WhatsUp Gold v14.2, including instructions on how to run the WhatsUp web interface through an Internet

More information

In order to upload a VM you need to have a VM image in one of the following formats:

In order to upload a VM you need to have a VM image in one of the following formats: What is VM Upload? 1. VM Upload allows you to import your own VM and add it to your environment running on CloudShare. This provides a convenient way to upload VMs and appliances which were already built.

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

User Guide - Exchange Public Folder idataagent

User Guide - Exchange Public Folder idataagent Page 1 of 191 User Guide - Exchange Public Folder idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE PUBLIC FOLDER IDATAAGENT DEPLOYMENT

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Using Symantec NetBackup with Symantec Security Information Manager 4.5

Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights

More information

CA ARCserve Backup r16.x Professional Exam (CAT-360) Study Guide Version 1.1

CA ARCserve Backup r16.x Professional Exam (CAT-360) Study Guide Version 1.1 (CAT-360) Version 1.1 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as the Materials ) are for the end user s educational purposes only and are subject

More information

Dell NetVault Bare Metal Recovery 10.5. User s Guide

Dell NetVault Bare Metal Recovery 10.5. User s Guide Dell NetVault Bare Metal Recovery 10.5 User s Guide Copyright 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell, the

More information