1 Enterprise Erase LAN Network Erasing and Asset Management Server Version 2.0 Users Guide toll free Jollyville Rd Suite 301 Austin, TX 78757
2 Table of Contents 1 Product Features Description How Enterprise Erase LAN Works Software Features System Requirements Server or Host Minimum Requirements Target or Client Computer Minimum Requirements Setting Up Enterprise Erase LAN Download Software Running Software in Demo Mode Install Software System Start Up Request Licenses Update License Request Running Enterprise Erase LAN Configure Screen Service and Support ~~ 2 of 14 ~~ Copyright 2010 Tabernus
3 1 Product Features 1.1 Description Enterprise Erase LAN empowers users with the ability to erase large numbers of desktops, laptops, servers, and enterprise storage over a local area network. You can erase over 200 computers simultaneously. Couple this capability with organized reporting on both the erasure and the asset information collected from the client and you have a business tool optimized to handle large volume data elimination. Enterprise Erase LAN is an asset management and data erasing system, designed to simultaneously control up to 255 clients over a local area network (LAN). Enterprise Erase LAN application deploys with its own operating system. Here are some key highlights: Works over local area network connections Capable of erasing over 200 computers simultaneously Organized reporting of both the hard drive erased, as well as the client asset information Reporting data can be ported into your database Capable of erasing any drive type (SATA, IDE, SCSI, SAS, FC) Configurable erasure options DoD, NIST SP , and others Can be deployed and activated on your hardware Enterprise Erase LAN was designed to run on its own private subnet. Although it can function on a company s main network, we recommend running on its own subnet to prevent accidental erasure of computer hard drives not assigned for decommission. 1.2 How Enterprise Erase LAN Works Enterprise Erase LAN allows for erasure of desktops, laptops, and servers over a local area network. The target devices are set up in a LAN to which the host device (that contains the Enterprise Erase LAN software) is also attached. The user can then PXE boot the target devices, see all of them through the software and erase them simultaneously. This erasure can be initiated from either the client or the host. The setup can also be run without a monitor, keyboard, and mouse at the client end. Enterprise Erase LAN allows the user to erase up to 200 target devices without having to remove the drives from their host hardware for erasure. Enterprise Erase LAN can also be used to erase small servers (four or less internal drives). Setup is similar to the graphic shown, replacing laptops and desktops with servers. ~~ 3 of 14 ~~ Copyright 2010 Tabernus
4 1.3 Software Features Enterprise Erase LAN Asset Management and Sanitizing Software. Easy-to-Use operator interface. Failure Notification. When a drive fails or is not successfully sanitized, visual indicators on the monitor tell the operator. Asset Management Logging Capability System Serial Number System Asset Number Processor Make, Model, Frequency Number of Processors Memory Size, Speed, Number of Memory Modules Hard Drive Make, Model, Size, Type Hard Drive Serial Number Disk Erasing Features DOD level 3, M compliant disk sanitizer Single Pass, Single Pass with Verification, 7 Pass Sector Viewer to physically inspect data on any drive on any client. Sector Snapshot reporting to sample drives after sanitization. 1.4 System Requirements Server or Host Minimum Requirements IBM-compatible PC with a Pentium or AMD processor or better (Dual Core preferred) 1024 Mb RAM 40 Gb HDD Network Interface Card Display Keyboard and Mouse USB Port ~~ 4 of 14 ~~ Copyright 2010 Tabernus
5 1.4.2 Target or Client Computer Minimum Requirements IBM-compatible PC with a Pentium or AMD processor 512 Mb RAM Network Card connection Optional: Display, keyboard, and mouse 2 Setting Up Enterprise Erase LAN 2.1 Download Software 1. Download Software ISO image Go to Tabernus Software Downloads webpage Complete the short form. Select Enterprise Erase LAN 2. Burn ISO image to DVD media. 3. Insert DVD and boot DVD on Server or Host System System Requirements for Server System: IBM-compatible PC with a Pentium processor or better (Dual Core Preferred) 1024 Mb RAM 40 Gb HDD Network Interface Card Display Keyboard and Mouse USB Port 4. Software will load from DVD. Desktop appears. 2.2 Running Software in Demo Mode Running Enterprise Erase in demonstration mode allows you to test all the functionality of the product and its features without having to install the software on a system. The software runs and loads into system memory from the DVD media. This allows prospective clients to perform compatibility tests and try it before you buy it with the software. The Demo mode will generate reports and perform data removal on hard drives. However, the data removal and times to completion are only 50% of the target drive in the demo mode. Before Proceeding: NOTE: The demo software will erase 50% of the target drive. Do not target a hard drive that has data that needs to be kept intact. 1. Insert DVD, and boot DVD from host computer. 2. From Desktop click, double click Enterprise Erase LAN (Demo) Icon. Note: The software will run off the DVD media and not install on the hard drive. 3. Build a small subnet with the host computer connected to target computers via network cables and hubs. If you do not have access to a hub, you can connect directly to one target computer using an ~~ 5 of 14 ~~ Copyright 2010 Tabernus
6 ethernet cable from host system to a single target computet. This same setup can be used for small servers instead of desktops and/or laptops. 4. Once Enterprise Erase LAN is launched, then PXE boot the target computers. Once the target computers PXE boot, each will be assigned an IP address by the software and will appear in on the host software GUI. Note: Target computers may need to be configured to PXE boot on their boot up menu. 5. Select the target computer hard drive and begin the erasure process on the target systems. Note: The data erasure process can be initiated from the host computer or the target computer GUI. Note: Refer to section 3.0 Running Enterprise Erase LAN for detailed functions of software 2.3 Install Software 1. Double-Click. Install Enterprise Erase LAN to Hard Drive Icon. 2. Generic Installer screen. No action. Click Next button. 3. Language screen. Select U.S. English. Click Next button. 4. Hostname screen. Use default hostname: localhost.localdomain. Click Next button. 5. Set time zone. Click Next button. 6. Set Root Password (aka admin password). Confirm. Click Next button. Weak password window pop-up. Click Yes. 7. Install screen. Select Remove all partitions on selected drives and create default layout. Click Next button. Confirm Write changes to drive. 8. Process window Copying live image to hard drive. 9. Doing post-installation. 10. Congratulations Install complete. Click Close button. 11. Eject DVD from player 12. Shut down computer from drop down menu. Select Restart option from pop-up menu ~~ 6 of 14 ~~ Copyright 2010 Tabernus
7 2.4 System Start Up 1. First time boot up screen Welcome. Click Forward button. 2. License Information. Click Forward button. 3. Create User screen. Enter user name and password of your choice. Click Forward button. 4. Set Date Time screen. Set the correct time and date. Click Forward button. Important!. Failure to set the correct date and time will result in accurate Pass/Fail certificates 5. Hardware Profile screen. No action. Click Finish button. Pop-Up screen. Select Click No, do not send button. 6. Desktop will appear. Double-click Enterprise Erase LAN icon to run software. Note: When the Enterprise Erase application opens, a terminal window will also open on the desktop. Do not close this terminal window. If the terminal window is closed, then it will shut down the application. 2.5 Request Licenses 1. In order to load licenses on Enterprise Erase LAN software, you first need to install the software to the system hard drive. Note: You cannot load licenses in Live-CD Demo Mode. 2. On the Desktop, double-click Enterprise Erase LAN icon. 3. Request License. Got to Help drop down menu. Select Request New License only once. 4. A License Request File unique to your system configuration is created on the Desktop. 5. Insert USB stick into system. The USB will automatically mount and display on the desktop. 6. Select LicRequest.txt file icon and drag and drop the file on the USB, or copy and paste. 7. Before removing USB stick from the computer, you must right-mouse click on USB icon and Unmount Volume, then remove the USB stick. ~~ 7 of 14 ~~ Copyright 2010 Tabernus
8 8. Take the USB stick with LicRequest.txt file to any system that can send s. Send to and attach LicRequest.txt. Include the quantity requested and company contact. 2.6 Update License Request 1. Once the License Request is received by Tabernus, an UpdateLicense.txt file will be generated and ed back to the originator. Note: The UpdateLicense.txt file authorize the licenses on the software program. The UpdateLicense.txt file must be used on the same system that generated the original LicRequest.txt file. A mismatch of files will cause an error and an unsuccessful load of licenses. 2. Using a USB stick move the UpdateLicense.txt file from the USB to the Enterprise Erase LAN desktop via copy and paste or drag and drop. 3. Open the Enterprise Erase LAN application, if not open already. Got to Help drop down menu. Select Load New License only once. 4. The Enterprise Erase LAN will update with the requested licenses. Verify license count by checking the counter located at the bottom with the software s action buttons. Before License Load After License Load ~~ 8 of 14 ~~ Copyright 2010 Tabernus
9 3 Running Enterprise Erase LAN Once logged in, you will see the desktop (See Figure 2). Double-click on the Enterprise Erase LAN icon to launch the software. Figure 2: Enterprise Erase LAN Desktop The application will launch and now you are ready to start (see Figure 3). After launch Enterprise Erase LAN listens for clients to boot up and get on-line. Enterprise Erase LAN is designed to be on-line prior to clients boot up. Figure 3: Initial Screen after Launch (Listening for Clients) ~~ 9 of 14 ~~ Copyright 2010 Tabernus
10 After Enterprise Erase LAN is launched you may connect clients which are networked into the server (see Figure 4) and boot them to the network. Figure 4: Enterprise Erase LAN Detects Client Main Window Display: Information Parameters IP Address: This specifies the IP address of the client computer. In general IP addresses will range from to Log Asset: This window will display until the asset is logged in which case it will show logged. Security: This displays the security level assigned to each hard drive. Drives within each client may have their own unique security level. If different erasure levels are specified for different drives within a client it will display mixed. Lvl-1: Single pass overwrite of 0 Lv1-1v: Single pass overwrite and verify Lvl-3: Three pass overwrite and verify (DoD Standard) Lv1-7: Seven pass overwrite and verify Asset #: This is a unique identifier entered or scanned by the operator for tracking purposes. Type: For the client it will display system for hard drives it will display the type of hard drive, SCSI, ATA, or SATA. Device Details: This displays vendor information and model type for client computers and disk drives. Capacity: This displays the hard drive capacity for each disk. At the client (or system) level, capacity is the total sum of all hard drives within the computer. Status: This displays the progress of the purge and estimated time to completion. At the system level progress indicates the progress of sanitizing all drives within the computer. Main Window Display: Buttons and Popups Please ensure you select a drive or system prior to initiating any action associated with main window buttons. ~~ 10 of 14 ~~ Copyright 2010 Tabernus
11 Get Sys. Info: This will display system (or computer) information including processor and memory data. All data is polled directly from the system BIOS (see Figure 5). Figure 5: System Information View Sector: This allows the user to view raw data from any hard drive on the network. This provides a means for a user to randomly inspect data on hard drives (see Figure 6). Start Erase: Executes the sanitizing process defined by the parameters in Set Security Level. The erase process sanitizes the hard drive by overwriting data on every byte. During this process data is written to the hard drive and the software looks for I/O errors from the drive. Single pass purging overwrites all bytes with zeros. DOD is a 3 pass wipe with 1 verify. The first pass is all zeros; the second pass is all 1s, the third pass is 10 (0xA hex). After the last pass the data is read from the disk drive to verify the final pattern. Cancel: This will cancel any tests being performed on a selected drive or system. Quit: This will quit the application. ~~ 11 of 14 ~~ Copyright 2010 Tabernus
12 Figure 6: Sector Data from Hard Drive Log Asset: This will log asset information to a CSV file for upload into databases. This data may be viewed by clicking on VIEW LOGS button. Set Asset Number: This allows the user to assign a particular internal tracking number to a hard drive or system. A scan gun can attached to the server and used to scan in asset numbers into the software. Set Security Level: This allow the user to assign various erasure levels to various drives. That is one drive can execute a Lv1-1 process, while another drive executes Lv1-3 sanitization standard (See Figure 7). Figure 7: Set Security Level View Logs: This allows the operator to view a log of all assets logged and hard drives sanitized by the software; this data resides within the csv director (see Figure 8). Within the detailed reports directory resides sector snapshot ~~ 12 of 14 ~~ Copyright 2010 Tabernus
13 data from random drives. The sampling rate or frequency of sampling drives is set within the configure window as described below. Note: All purged drives are logged whether they pass of fail. Figure 8: Log Locations Remove System: This button will release a client system from the Enterprise Erase LAN application. Typically a system is removed after sanitization or after the asset has been logged. Rescan Network: Typically Enterprise Erase LAN is launched first and listens for new clients to become active online. However in some cases the Enterprise Erase LAN application is launched after clients are already on-line. This button will actively rescan all IP addresses assigned in the configuration screen below and look for clients (see Figure 9). Figure 9: Scanning Network ~~ 13 of 14 ~~ Copyright 2010 Tabernus
14 3.1 Configure Screen There are a few parameters which the user can figure Enterprise Erase LAN to meet their needs (See Figure 10). Figure 10: Configure Screen Network Ports to Scan: This defines the network ports which will be scanned when the Rescan Network button pressed in the main screen. IP addresses outside this range may be detected as they come on-line; however only these addresses will be actively scanned. Note: Only the last portion of the IP address is configurable. Create Detailed Purge Report: The user can set a frequency of how often to get detailed reports on the drives. These reports are in the detailed reports folder when you select VIEW LOGS. Each detailed report shows a sector snapshot of the first, middle, and last sector of the drive. 4 Service and Support For service or support issues, please contact Tabernus Support at: Phone: Online support: ~~ 14 of 14 ~~ Copyright 2010 Tabernus
RAIDXPERT USER MANUAL Version 2.1 RAIDXpert User Manual Copyright 2010 Advanced Micro Devices, Inc. All Rights Reserved. Copyright by Advanced Micro Devices, Inc. (AMD). No part of this manual may be reproduced
Table of Contents 1 Introduction 1.1 Welcome 1.2 What Makes Data Rescue Different? 1.3 Latest Version of the Software 1.4 Contact Prosoft Engineering 1.5 About the Demo 1.6 System Requirements 1.7 General
Liebert Nform Infrastructure Monitoring Software User Manual - Version 4 TABLE OF CONTENTS 1.0 ABOUT LIEBERT NFORM................................................1 1.1 How Do You Contact Emerson Network
SERVER BACKUP Maxtor OneTouch II Small Business Edition User s Guide P/N: 20280700 Contents 1 Introduction................................................................ 1 Drive Components......................................................
user s manual MultiViewer Network Software For Novus Digital Multiplexers series NV-DVR900 / NV-DVR1600 TABLE OF CONTENTS 1. FOREWORD...3 1.1 Main characteristics...3 1.2 PC Hardware & Software Requirements...4
Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,
Page 1 of 78 Features - NAS NDMP Client TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS - NAS NDMP IDATAAGENT INSTALLATION Install the MediaAgent - Windows Install the MediaAgent - Windows -Clustered Environment
Quick Start Guide Copyright Wasp Barcode Technologies 2014 No part of this publication may be reproduced or transmitted in any form or by any means without the written permission of Wasp Barcode Technologies.
EaseUS Todo Backup User guide - 1 - Table of contents Welcome... - 5 - Overview... - 6 - How to use this manual... - 7 - New in EaseUS Todo Backup 6.5... - 8 - Getting started... - 9 - Hardware requirements...
Ipswitch WhatsUp Professional and Premium Edition 2006 User s Guide Software Version 2 Ipswitch, Inc Ipswitch Inc. Web: HTTP://www.ipswitch.com 10 Maguire Rd, Suite 220 Phone: 781.676.5700 Lexington, MA
ACTi Central Management System User s Manual Version 1.1.05.06 2012/10/12 Table of Contents 1 Overview 5 Software Architecture... 5 2 Installation 6 Requirements... 6 Operating System... 6 Hardware System
Softphone User Guide - Issue 02c - (14 May 2011) 2011 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete and accurate
Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance
The Intelligent Surveillance Solution Titan NVR Server User Manual Ver. 18.104.22.168026.00 Table of Contents 1. Installation... 4 1.1 Installation Process... 4 1.2 LED Status Definitions... 12 2. Settings...
Canto Cumulus 5.5 Workgroup Edition Administrator Guide An administrator s guide to the Canto Cumulus Digital Asset Management System. 290 Division Street, Suite 400 San Francisco, CA 94103 U.S.A. Voice:
Promise FastTrak 100-Lite RAID Controller User s Manual Version 1.3, November 9, 2001 Copyright Copyright by Promise Technology, Inc. ( Promise ), XP. No part of this manual may be reproduced or transmitted
Page 1 of 86 Features - NAS NDMP Client Table of Contents Overview System Requirements - NAS NDMP idataagent Installation Install the MediaAgent - Windows Install the MediaAgent - Windows -Clustered Environment
SATARAID5 Management Software User s Guide Document Number: MAN-000SR5-000 Revision 1.30 Copyright 2006, Silicon Image, Inc. All rights reserved. No part of this publication may be reproduced, transmitted,