EMC Data Domain Operating System Retention Lock Software User s Guide

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "EMC Data Domain Operating System 4.6 5.1 Retention Lock Software User s Guide"

Transcription

1 EMC Data Domain Operating System Retention Lock Software User s Guide Backup Recovery Systems Division Data Domain LLC 2421 Mission College Boulevard, Santa Clara, CA WE-DDUPE; Rev A September 28, 2012

2 Copyright 2012 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC, Data Domain, and Global Compression are registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other trademarks used herein are the property of their respective owners. 2

3 DD OS Retention Lock Software User s Guide This guide is for end-users and archive and backup application vendors who are interested in learning more about the DD Retention Lock software option and how to use its command set, described in this guide, to meet their data retention needs. Note: For information on versions of DD Retention Lock software after DD OS 5.1, see the Administration Guide for your version of DD OS. The sections that follow describe the interface of the DD Retention Lock option for locking files stored on EMC Data Domain systems. This document covers the topics shown in the following table: Overview Page 4 Supported Data Access Protocols Page 6 Enabling DD Retention Lock on the System Page 6 Client-Side Retention Lock File Control Page 14 System Behavior with Retention Lock Page 18 System Commands for DD Retention Lock Page 20 DD OS Retention Lock Software User s Guide 3

4 Overview Retention locking prevents specified files from being overwritten, modified, or deleted for a user-defined retention period of up to 70 years (or until January 19, 2038 if you are using NFS, because of protocol constraints). This software can be enabled only with an add-on DD Retention Lock license. Only files that are explicitly committed to be retained files (as described in this document) can be retention locked on the Data Domain system. Files are committed to be retention-locked files on the Data Domain system through client-side file commands issued while Retention Lock is enabled on the MTree containing the files (DD OS 5.0 and 5.1) or on the file system (DD OS ). For more information see Client-Side Retention Lock File Control on page 14. Note: Linux, Unix, and Windows client environments are supported. Files that are written to shares or exports that are not committed to be retained (even if DD Retention Lock is enabled on the MTree or file system containing the files) can be modified or deleted at any time. Retention locking prevents any modification or deletion of files under retention from occurring directly on Data Domain share(s) during the retention period time specified by the client-side command. Some archiving applications and backup applications can issue these commands when appropriately configured (see Supported Data Access Protocols on page 6). Applications that do not issue these commands cannot lock files using DD Retention Lock. Retention-locked files are always protected from modification and premature deletion if retention locking has ever been enabled on the Data Domain system (even if retention locking is subsequently disabled or if the retention-lock license is no longer valid). You cannot rename non-empty folders or directories within an MTree or a file system that has the retention-lock feature enabled. However, you can rename empty folders or directories and create new ones. The retention period of a retention-locked file can be extended but not reduced. The access control information of a retention-locked file can be updated. Once the retention period for a file expires, the file can be deleted using a client-side command, script, or application. However, the file cannot be modified even after the retention period for the file expires. The Data Domain system does not automatically delete a file when its retention period expires. Files locked using the Retention Lock feature can be replicated to another Data Domain system. Only the source system needs a Retention Lock license. If a retention-locked file is replicated, it remains retention-locked on the destination system and has the same level of protection. For more information, see Replication on page DD OS Retention Lock Software User s Guide

5 Figure 1 shows the steps to enable and use the DD Retention Lock software. 1) Enable DD Retention Lock software on the Data Domain system. (See Enabling DD Retention Lock on the System on page 6.) DD OS 5.0 and 5.1 Use Enterprise Manager or issue mtree retention-lock commands from the system console. DD OS Use Enterprise Manager or issue filesys retention-lock commands from the system console. 2) Commit files to be retention locked on the Data Domain system using client-side commands issued by an appropriately configured archiving or backup application, manually, or via scripts. Note: Windows clients may need to download utility programs for DD OS compatibility. (See Client-Side Retention Lock File Control on page 14.) 3) Optionally, extend retention time or delete files which have expired retention periods using client-side commands. (See Extend the Retention Time of a File on page 16 and Delete or Expire a File on page 17.) Figure 1: DD Retention Lock Flow DD OS Retention Lock Software User s Guide 5

6 Supported Data Access Protocols DD Retention Lock is compatible with industry-standard, NAS-based Write-Once-Read- Many (WORM) protocols, and integration is qualified with archive applications such as Symantec Enterprise Vault and EMC DiskXtender. Customers using backup applications such as CommVault can also develop custom scripts to use the retention lock feature from EMC Data Domain. To check whether an application is tested and certified for the Retention Lock feature, refer to the EMC Data Domain Archive Product Compatibility Matrix, available on the Data Domain Support Portal at: Archive_compatibility_matrix.pdf DD Retention Lock protocol support status is as follows: NFS is supported. CIFS is supported. VTL is supported (DD OS 4.7 and later). You can retention lock a virtual tape using the vtl tape modify command, described in the Command Reference Guide for your version of DD OS. (This feature is not currently available in Enterprise Manager.) The mtree retention-lock revert <path> command can be used to revert the retention-locked state of tapes locked with the vtl tape modify command. After the tape is unlocked, updates can be made to it. The unlocked state won't be visible via the Data Domain Enterprise Manager or CLI until the VTL service is disabled then enabled; however, updates will be applied to the unlocked tape. DD Boost is not supported. Currently, Retention Lock is not integrated with DD Boost. So, when files or backup images are retention-locked (via scripts) on a Data Domain system and a backup application (Symantec NetBackup, for example) via DD Boost is not in the loop, the administrator needs to be careful with scripts that lock files or images from a backup application perspective. If these scripts are not properly configured or deployed, there could be a scenario where a backup application attempts to expire backup files or images, but space is not released on the Data Domain system because these are still retention-locked from the scripts. Data Domain recommends that administrators change their retention period policy to align with the retention lock time. This applies to all the backup applications that are integrated with DD Boost: Avamar, Symantec NetBackup, Symantec Backup Exec, EMC NetWorker, and so on. Enabling DD Retention Lock on the System Before files can be retention locked: The DD Retention Lock software license must be added on the Data Domain system. The MTrees (DD OS 5.0 and 5.1) or file system (DD OS ) that will contain the retention-locked files must be enabled for retention locking. 6 DD OS Retention Lock Software User s Guide

7 Enabling the retention lock feature allows you to: Turn non-retention-locked files into retention-locked files on the Data Domain system using client-side commands. Extend the retention period of retention-locked files using client-side commands. With DD OS 5.0 and 5.1, minimum and maximum retention periods are defined on a per- MTree basis. These retention periods are in effect for all CIFS shares or NFS exports associated with that MTree only. With DD OS , a single minimum and a single maximum retention period is defined for the entire file system. These retention periods are in effect for all CIFS shares or NFS exports associated with that file system. You can enable or disable DD Retention Lock software using either the Enterprise Manager or Data Domain system commands described below. Note: To get started using the Enterprise Manager or system command line interface (CLI), see the Administration Guide for your version of DD OS. A complete description of all CLI commands for DD Retention Lock is provided in System Commands for DD Retention Lock on page 20. Using the Enterprise Manager (DD OS 5.0 and 5.1) 1. Log in to the Enterprise Manager. The Enterprise Manager window appears with the DD Network name in the Navigational pane. Navigational Pane 2. In the Navigational pane, expand DD Network and select a system. DD OS Retention Lock Software User s Guide 7

8 3. Click the System Settings > Licenses tabs. If RETENTION-LOCK is not listed, add the DD Retention Lock license as follows: a. In the Licensed Features pane, click Add. The Add License Key dialog box appears. b. In the License Key text box, enter the license key. Note: License keys are case-insensitive. Include the hyphens when entering keys. c. Click OK. The added license appears in the license list. 4. Click the Data Management > MTree > Summary tabs. MTree summary information appears. 5. In the Retention Lock area, click Edit. The Modify Retention Lock dialog box appears. 8 DD OS Retention Lock Software User s Guide

9 6. Perform the following actions in the Modify Retention Lock dialog box: a. Click the Enable check box to enable DD Retention Lock on the MTree. b. To change the minimum or maximum retention period (the feature must be enabled first), go to the Retention Period pane and modify the minimum or maximum time period: i. Type a number for the interval in the text box (for example, 5 or 14). ii. From the drop-down list, select an interval (minutes, hours, days, years). Note: The minimum retention period can be set to any time without error. Specifying a maximum retention period longer than 70 years results in an error. c. Click OK to save your settings. 7. After you close the Modify Retention Lock dialog box, updated MTree information is displayed. Note the following retention lock fields: Status indicates whether the retention locking is enabled for the MTree. Retention Period indicates minimum and maximum retention periods for the MTree. UUID is a unique identification number generated for the MTree. 8. To check retention lock configuration settings for any MTree, select the MTree in the Navigational pane, then click the Summary tab. 9. When you are finished, exit the Enterprise Manager. DD OS Retention Lock Software User s Guide 9

10 Using the Command Line Interface (DD OS 5.0 and 5.1) The following steps show how to configure an MTree named mtree1 for a minimum retention time of 96 hours and a maximum retention time of 30 years. Enter commands at the Data Domain system console prompt as an administrative user. Note: For additional retention lock commands, see System Commands for DD OS 5.0 and 5.1 on page Add the DD Retention Lock license: # license add ABCD-EFGH-IJKL-MNOP 2. Display the status of the retention lock license: # license show 3. Enable the retention lock feature on the MTree. # mtree retention-lock enable mtree /data/col1/mtree1 4. Display the status of the retention lock feature: # mtree retention-lock status mtree /data/col1/mtree1 5. Set the minimum and maximum retention periods for the MTree: # mtree retention-lock set min-retention-period 96hr mtree /data/ col1/mtree1 # mtree retention-lock set max-retention-period 30year mtree /data/ col1/mtree1 Note: The minimum retention period can be set to any time without error. Specifying a maximum retention period longer than 70 years results in an error. 6. Show the minimum and maximum retention periods for the MTree: # mtree retention-lock show min-retention-period mtree /data/col1/ mtree1 # mtree retention-lock show max-retention-period mtree /data/col1/ mtree1 10 DD OS Retention Lock Software User s Guide

11 Using the Enterprise Manager (DD OS ) 1. Log in to the Enterprise Manager. The Enterprise Manager window appears with the DD Network name in the Navigational pane. Navigational Pane 2. In the Navigational pane, expand the DD Network and select a system. 3. Click the System Settings > Licenses tabs. If Retention Lock is not listed, add the retention lock license as follows: a. In the Licensed Features pane, click Add. The Add License Key dialog box appears. b. In the License Key text box, enter the license key. Note: License keys are case-insensitive. Include the hyphens when entering keys. c. Click OK. The added license appears in the license list. 4. Go to Data Management > Filesystem to access the Tasks menu. From the Tasks menu, select Modify Retention Lock. The Modify Retention Lock dialog box appears. DD OS Retention Lock Software User s Guide 11

12 5. Perform the following actions in the Modify Retention Lock dialog box: a. Click the Enable checkbox to enable DD Retention Lock on the Data Domain system s file system. b. To change the minimum or maximum retention period for the file system, go to the Retention Period pane and modify the minimum or maximum time period: i. Type a number for the interval in the text box (for example, 5 or 14). ii. From the drop-down list, select an interval (minutes, hours, days, years). Note: The minimum retention period can be set to any time without error. Specifying a maximum retention period longer than 70 years results in an error. c. Click OK to save your settings. 6. After you close the Modify Retention Lock dialog box, updated file system information is displayed. Note the following retention lock fields: Status indicates whether retention locking is enabled for the file system. UUID is a unique identification number generated for the file system. Retention Period indicates minimum and maximum retention periods for the file system. 7. When you are finished, exit the Enterprise Manager. 12 DD OS Retention Lock Software User s Guide

13 Using the Command Line Interface (DD OS ) The following steps show how to configure the file system for a minimum retention time of 96 hours and a maximum retention time of 30 years. Enter commands at the Data Domain system console prompt as an administrative user. Note: For additional retention lock commands, see System Commands for DD OS on page Add the DD Retention Lock license: # license add ABCD-EFGH-IJKL-MNOP 2. Display the status of the DD Retention Lock license: # license show 3. Enable the retention lock feature on the Data Domain system s file system: # filesys retention-lock enable 4. Display the status of the retention lock feature: # filesys retention-lock status 5. Set the minimum and maximum retention periods for the Data Domain system: # filesys retention-lock option set min-retention-period 96hr # filesys retention-lock option set max-retention-period 30year Note: The minimum retention period can be set to any time without error. Specifying a maximum retention period longer than 70 years results in an error. 6. Show the maximum and minimum retention periods for the Data Domain system: # filesys retention-lock option show max-retention-period # filesys retention-lock option show min-retention-period DD OS Retention Lock Software User s Guide 13

14 Client-Side Retention Lock File Control This section describes the DD Retention Lock client command interface for locking files stored on EMC Data Domain systems. Linux, Unix, and Windows client environments are supported; however, Windows clients may need to download utility programs with commands to lock files. Note: If your application already supports industry-standard WORM, writing a file to a Data Domain retention lock enabled system locks the file as long as the file's retention time is between the minimum and maximum Retention Lock settings. You do not need to use the commands described in this section. To check whether an application is tested and certified for the Retention Lock feature, refer to the EMC Data Domain Archive Product Compatibility Matrix, available on the Data Domain Support Portal at: Archive_compatibility_matrix.pdf Warning: If you are using NFS, the retention time cannot be greater than January 19, 2038, because of protocol constraints. Client-side commands are used to manage the retention locking of individual files. These commands apply to all retention-lock-capable Data Domain systems and must be issued in addition to the setup and configuration of the retention lock feature on the Data Domain system (see Enabling DD Retention Lock on the System on page 6). Client Access to Data Domain System Files After an MTree is enabled for DD Retention Lock, you can: Create a CIFS share based on the MTree (DD OS 5.0 and 5.1) or file system (DD OS ). This CIFS share can be used on a client machine. Create an NFS mount for the MTree (DD OS 5.0 and 5.1) or file system (DD OS ) and access its files from the NFS mount point on a client machine. Notes: The commands listed in this section are to be used only on the client. They cannot be issued through the Data Domain Enterprise Manager or CLI. Command syntax may vary slightly, depending on the utility you are using. 14 DD OS Retention Lock Software User s Guide

15 Create a File and Set the Retention Time Create a file in the usual way and then set the last access time (atime) of the file to the desired retention time of the file, that is, the time at which the file may be deleted. If the atime is set to a value that is larger than the current time plus the minimum retention period, then the file will become a retention-locked file on the Data Domain system. Warning: If you are using NFS, the retention time cannot be greater than January 19, 2038, because of protocol constraints. Be aware that: Setting a file s atime to less than the current time plus the minimum retention period is ignored without error, and the file will not become a retention-locked file on the Data Domain system. (The file s atime may appear updated, but this is only temporary and is not written to disk.) Setting a file s atime to more than the current time plus the maximum retention period will result in the file becoming retention-locked file on the Data Domain system and the retention time will be the current time plus the maximum retention period. Note: A file must be completely written to the Data Domain system before it is committed to be a retention-locked file. The following command can be used on clients to set the atime: ClientOS# touch -a -t [atime] [filename] The format of atime is: [[YY]YY]MMDDhhmm[.ss] For example, suppose the current date and time is 1 p.m. on January 18, 2012 (that is, ), and the minimum retention period is 12 hours. Adding the minimum retention period of 12 hours to that date and time results in a value of Therefore, if the atime for a file is set to a value greater than , that file becomes retention locked. For example, the following command ClientOS# touch -a -t SavedData.dat will lock the file SavedData.dat until 10:30 PM December 31, DD OS Retention Lock Software User s Guide 15

16 Extend the Retention Time of a File To extend the retention time of a retention-locked file, set the file s atime to a value greater than the current retention time. For example, changing the atime from to using the following command ClientOS# touch -a -t SavedData.dat will cause the file to be locked until 12:30 p.m. December 12, Warning: If you are using NFS, the retention time cannot be greater than January 19, 2038, because of protocol constraints. Be aware that: Setting a file s atime to less than the current time plus the minimum retention period is ignored without error, and the file will not become a retention-locked file on the Data Domain system. (The file s atime may appear updated, but this is only temporary and is not written to disk.) Setting a file s atime to more than the current time plus the maximum retention period will result in the file becoming retention-locked file on the Data Domain system and the retention time will be the current time plus the maximum retention period. Identify a Retention-Locked File The atime value for a retention-locked file is its retention time. To determine whether a file is retention-locked, try to set the atime of the file to a value earlier than its current atime. This action will fail with a permission denied error if and only if the file is a retention-locked file. First, list the current atime value, then execute the touch command with an earlier atime. ClientOS# ls -l --time=atime [filename] ClientOS# touch -a -t [atime] [filename] The following examples show the command sequence. ClientOS# ls -l --time=atime SavedData.dat ClientOS# touch -a -t SavedData.dat If the atime of SavedData.dat is (12:30 p.m. December 12, 2020) and the touch command specifies an earlier atime, (12:30 p.m. December 11, 2020), the touch command fails, indicating that SavedData.dat is retention locked. Note: The --time=atime option is not supported in all versions of Unix. 16 DD OS Retention Lock Software User s Guide

17 Specify a Directory and Touch Only Those Files In this routine, root directory to start from contains the files on which you want to change access times. ClientOS# find [root directory to start from] -exec touch -a -t [expiration time] {} \; For example: ClientOS# find [/backup/data1/] -exec touch -a -t {} \; Read a List of Files and Touch Only Those Files In this routine, name of file list is the name of a text file that contains the names of the files on which you want to change access times. Each line contains the name of one file. ClientOS# touch -a -t [expiration time] `cat [name of file list]` For example: ClientOS# touch -a -t cat /backup/data1/filelist.txt Delete or Expire a File You can delete or expire a file with and expired retention lock using a client application, or delete a file using a standard file-delete command. Expiring a file using an application makes the file inaccessible to the application. The file may or may not actually be removed from the Data Domain system by the expiration operation. If it is not removed, the application often provides a separate delete operation. Note: If the retention time of the retention-locked file has not expired, the delete operation results in a permission denied error. You must have the appropriate access rights to delete the file, independent of the retention lock feature. Using ctime and mtime on Retention-Locked Files ctime ctime is the last-metadata-change time of a file. It gets set to the current time when any of the follow events occur: A non-retention-locked file is retention-locked. The retention period of a retention-locked file is extended. A retention-locked file is reverted. mtime mtime is the last-modified time of a file. It changes only when the contents of the file change. So, the mtime of a retention-locked file cannot change. DD OS Retention Lock Software User s Guide 17

18 System Behavior with Retention Lock Replication Note: For information on the replication feature, see the Administration Guide for your version of DD OS. Collection replication, MTree replication, and directory replication replicate the locked or unlocked state of files. That is, files that are retention locked on the source are retention locked on the destination and have the same level of protection. Only the source system needs a DD Retention Lock license. Replication is supported between systems that are: Running the same major DD OS version (for example, both systems are running DD OS 5.1). Running DD OS versions within the next two consecutive higher or lower major releases (for example, 4.7.x.x to 4.9.x.x or 4.9.x.x to 4.7.x.x). This cross-release replication is only supported for directory and MTree replication. The lowest release for replication with retention lock is DD OS 4.6. Note: MTree replication is not supported for DD OS 5.0 and earlier. Be aware that: Collection replication and MTree replication replicate minimum and maximum retention periods configured on the MTree to the destination system. Directory replication does not replicate minimum and maximum retention periods to the destination system. The procedure for configuring and using collection, MTree, and directory replication is the same as for Data Domain systems that do not have a DD Retention Lock license. Replication Resync The replication resync <destination> command tries to bring the destination in sync with the source when MTree or directory replication context is broken between the source and a destination systems. This command cannot be used with collection replication. Note that: If the destination MTree or directory contains retention-locked files that do not exist on the source, then resync will fail. If the destination directory has retention lock enabled, but the source directory does not have retention lock enabled, then a resync of a directory replication will fail. With MTree replication, resync will succeed if the source MTree does not have retention lock enabled while the destination MTree has retention lock enabled or vice versa, as long as the destination MTree does not contain retention locked files not present at the source. Note: For more information on the replication command, refer to the Command Reference Guide for your version of DD OS. 18 DD OS Retention Lock Software User s Guide

19 Fastcopy When filesys fastcopy source <src> destination <dest> is run on a system, it does not copy the locked or unlocked state of files. Files that are retention locked on the source are not retention locked on the destination. If you try to fastcopy to a destination that has retention-locked files, the fastcopy operation aborts when it encounters retention-locked files on the destination. Filesys Destroy When filesys destroy is run on a system with DD Retention Lock enabled: 1. All data is destroyed, including retention-locked data. 2. All filesys options are returned to their defaults. This means that retention locking is disabled and the min-retention-period as well as max-retention-period options are set back to their default values on the newly created file system. MTree Delete (DD OS 5.0 and 5.1) When mtree delete <mtree-path> attempts to delete an MTree that has retention lock enabled (or previously has had retention lock enabled) and currently contains data, the mtree delete command returns an error. Note: The behavior of mtree delete is a similar to a directory delete command an MTree with retention lock enabled (or previously enabled) can be deleted only if the MTree is empty. DD OS Retention Lock Software User s Guide 19

20 System Commands for DD Retention Lock To enable (or disable) DD Retention Lock software or to modify the minimum or maximum retention period, enter these CLI commands at the Data Domain system console prompt or execute them via a script. System Commands for DD OS 5.0 and 5.1 Note: Unless otherwise noted, these command options are available to administrative users only. retention-lock disable mtree retention-lock disable mtree mtree-path Disable the retention lock feature for the specified MTree. retention-lock enable mtree retention-lock enable mtree mtree-path Enable the retention lock feature for the specified MTree. When the feature is enabled on an MTree: Any file in the MTree may become retention locked by setting its atime into the future. Renaming of any non-empty directory in the MTree is disabled. retention-lock reset mtree retention-lock reset {min-retention-period max-retention-period} mtree mtree-path Reset the minimum or maximum retention period for the specified MTree to its default value. The default min-retention-period is 12 hours, and the default max-retentionperiod is 5 years. retention-lock revert mtree retention-lock revert path Revert the retention lock for all files on a specified path inside an MTree. Any retentionlocked file that lies on the specified path becomes a non-retention-locked file. The path may specify a directory or file within the MTree. The base of the path must be one of the following: /data/col1/mtree-name/ /backup/ Reverting a retention lock raises a Data Domain system alert (at the Error or Warning severity level) and logs the names of the retention-locked files that have been changed to non-retention-locked files. On receiving such an alert, the user should confirm that the reset operation was intended. 20 DD OS Retention Lock Software User s Guide

21 retention-lock set mtree retention-lock set {min-retention-period max-retention-period} period mtree mtree-path Set the minimum or maximum retention period for the specified MTree. The retention period is specified in the format [number][unit]. Possible unit values are: min hr day mo year By default, the min-retention-period is 12 hours and the max-retention-period is 5 years. These default values may be modified. Note: The minimum retention period can be set to any time without error. Specifying a maximum retention period longer than 70 years results in an error. For example, to set the min-retention-period to 24 months for mtree1, use: retention-lock show # mtree retention-lock set min-retention-period 24mo mtree1 mtree retention-lock show {min-retention-period max-retention-period} mtree mtree-path Show the minimum or maximum retention period for the specified MTree. Administrator permissions are not required to use this command option. retention-lock status mtree retention-lock status mtree mtree-path Show retention-lock status for the specified MTree. Possible values are enabled, disabled, and previously enabled. Administrator permissions are not required to use this command option. DD OS Retention Lock Software User s Guide 21

22 System Commands for DD OS Note: Unless otherwise noted, these command options are available to administrative users only. retention-lock disable filesys retention-lock disable Disable the retention lock feature. retention-lock enable filesys retention-lock enable Enable the retention lock feature on the Data Domain system s file system. When the feature is enabled: Any file may become retention locked by setting its atime into the future. Renaming of any non-empty directory is disabled. retention-lock option reset filesys retention-lock option reset {min-retention-period max-retention-period} Reset the minimum or maximum retention period its default value. The default min-retention-period is 12 hours and the default max-retention-period is 5 years. retention-lock option set filesys retention-lock option set {min-retention-period max-retention-period} period Set the minimum or maximum retention period. The retention period is specified in the format [number][unit]. Possible unit values are: min hr day mo year By default, the min-retention-period is 12 hours and the max-retention-period is 5 years. These default values may be revised. Note: The minimum retention period can be set to any time without error. Specifying a maximum retention period longer than 70 years results in an error. For example, to set the min-retention-period to 24 months, use: # filesys retention-lock option set min-retention-period 24mo 22 DD OS Retention Lock Software User s Guide

23 retention-lock option show filesys retention-lock option show {min-retention-period max-retention-period} Show the minimum or maximum retention period. Administrator permissions are not required to use this command option. retention-lock reset filesys retention-lock reset path Use this command to reset retention locking for all files on a specified path. Any retention-locked file that lies on the specified path becomes a non-retention-locked file. The path may specify a directory or file in the file system. For example, to reset the retention lock on all files in /backup/dir1, use the command: # filesys retention-lock reset /backup/dir1 Reverting a retention lock raises a Data Domain system alert (at the Error or Warning severity level) and logs the names of the retention-locked files that have been changed to non-retention-locked files. On receiving such an alert, the user should verify that the particular reset operation is intended. retention-lock status filesys retention-lock status Show retention lock status. The possible values of retention lock status are enabled, disabled, and previously enabled. Administrator permissions are not required to use this command option. DD OS Retention Lock Software User s Guide 23

24 24 DD OS Retention Lock Software User s Guide

CommVault Simpana Archive 8.0 Integration Guide

CommVault Simpana Archive 8.0 Integration Guide CommVault Simpana Archive 8.0 Integration Guide Data Domain, Inc. 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800 Version 1.0, Revision B September 2, 2009 Copyright 2009

More information

NetBackup Backup, Archive, and Restore Getting Started Guide

NetBackup Backup, Archive, and Restore Getting Started Guide NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.

More information

EMC DATA DOMAIN RETENTION LOCK SOFTWARE

EMC DATA DOMAIN RETENTION LOCK SOFTWARE White Paper EMC DATA DOMAIN RETENTION LOCK SOFTWARE A DETAILED REVIEW Abstract Enterprises continue to see an exponential growth in the unstructured data that is proliferating across their primary storage

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished

More information

Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1

Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1 Migrating Your Windows File Server to a CTERA Cloud Gateway Cloud Attached Storage February 2015 Version 4.1 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document may be

More information

VERITAS NetBackup 6.0

VERITAS NetBackup 6.0 VERITAS NetBackup 6.0 Backup, Archive, and Restore Getting Started Guide for UNIX, Windows, and Linux N15278C September 2005 Disclaimer The information contained in this publication is subject to change

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

How to Create a Delegated Administrator User Role / To create a Delegated Administrator user role Page 1

How to Create a Delegated Administrator User Role / To create a Delegated Administrator user role Page 1 Managing user roles in SCVMM How to Create a Delegated Administrator User Role... 2 To create a Delegated Administrator user role... 2 Managing User Roles... 3 Backing Up and Restoring the VMM Database...

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Using Symantec NetBackup with Symantec Security Information Manager 4.5

Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

CommVault Simpana 8.0 Application Introduction

CommVault Simpana 8.0 Application Introduction CommVault Simpana 8.0 Application Introduction EMC Data Domain, Inc. 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800 Version 1.0, Revision B December 14, 2011 Copyright

More information

EMC Data Domain Management Center

EMC Data Domain Management Center EMC Data Domain Management Center Version 1.1 Initial Configuration Guide 302-000-071 REV 04 Copyright 2012-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

English ETERNUS CS800 S3. Backup Exec OST Guide

English ETERNUS CS800 S3. Backup Exec OST Guide English ETERNUS CS800 S3 Backup Exec OST Guide Edition April 2012 Comments Suggestions Corrections The User Documentation Department would like to know your opinion on this manual. Your feedback helps

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

VERITAS NetBackup 6.0 for Microsoft Exchange Server

VERITAS NetBackup 6.0 for Microsoft Exchange Server VERITAS NetBackup 6.0 for Microsoft Exchange Server System Administrator s Guide for Windows N152688 September 2005 Disclaimer The information contained in this publication is subject to change without

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book is furnished under a

More information

RSA Security Analytics Netflow Collection Configuration Guide

RSA Security Analytics Netflow Collection Configuration Guide RSA Security Analytics Netflow Collection Configuration Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks

More information

EMC SourceOne for File Systems Version 7.1

EMC SourceOne for File Systems Version 7.1 EMC SourceOne for File Systems Version 7.1 Administration Guide 302-000-154 REV 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2013 EMC Corporation.

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement

More information

Technical Notes. EMC NetWorker Performing Backup and Recovery of SharePoint Server by using NetWorker Module for Microsoft SQL VDI Solution

Technical Notes. EMC NetWorker Performing Backup and Recovery of SharePoint Server by using NetWorker Module for Microsoft SQL VDI Solution EMC NetWorker Performing Backup and Recovery of SharePoint Server by using NetWorker Module for Microsoft SQL VDI Solution Release number 9.0 TECHNICAL NOTES 302-001-760 REV 01 September, 2015 These technical

More information

EMC AVAMAR INTEGRATION WITH EMC DATA DOMAIN SYSTEMS

EMC AVAMAR INTEGRATION WITH EMC DATA DOMAIN SYSTEMS EMC AVAMAR INTEGRATION WITH EMC DATA DOMAIN SYSTEMS A Detailed Review ABSTRACT This white paper highlights integration features implemented in EMC Avamar with EMC Data Domain deduplication storage systems

More information

CA XOsoft Replication for Windows

CA XOsoft Replication for Windows CA XOsoft Replication for Windows Microsoft SQL Server Operation Guide r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the

More information

RSA Security Analytics Netflow Collection Configuration Guide

RSA Security Analytics Netflow Collection Configuration Guide RSA Security Analytics Netflow Collection Configuration Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks

More information

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Windows Release 6.5 Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Copyright 2002-2007 Symantec Corporation.

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

Enterprise Vault Whitepaper Move Archive Feature Overview

Enterprise Vault Whitepaper Move Archive Feature Overview Enterprise Vault Whitepaper Move Archive Feature Overview This document provides an overview of the Enterprise Vault Move Archive feature This document applies to the following version(s) of :

More information

NexentaConnect for VMware Virtual SAN

NexentaConnect for VMware Virtual SAN NexentaConnect for VMware Virtual SAN User Guide 1.0.2 FP3 Date: April, 2016 Subject: NexentaConnect for VMware Virtual SAN User Guide Software: NexentaConnect for VMware Virtual SAN Software Version:

More information

EMC NetWorker Module for Microsoft Exchange Server Release 5.1

EMC NetWorker Module for Microsoft Exchange Server Release 5.1 EMC NetWorker Module for Microsoft Exchange Server Release 5.1 Installation Guide P/N 300-004-750 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

WINDOWS SERVER 2008 OFFLINE SYSTEM RECOVERY USING WINDOWS SERVER BACKUP WITH NETWORKER

WINDOWS SERVER 2008 OFFLINE SYSTEM RECOVERY USING WINDOWS SERVER BACKUP WITH NETWORKER TECHNICAL NOTES WINDOWS SERVER 2008 OFFLINE SYSTEM RECOVERY USING WINDOWS SERVER BACKUP WITH NETWORKER NETWORKER RELEASE 7.4 SERVICE PACK 2 AND LATER TECHNICAL NOTE P/N 300-010-339 REV A02 Table of Contents

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in

More information

Replicating VNXe3100/VNXe3150/VNXe3300 CIFS/NFS Shared Folders to VNX Technical Notes P/N h8270.1 REV A01 Date June, 2011

Replicating VNXe3100/VNXe3150/VNXe3300 CIFS/NFS Shared Folders to VNX Technical Notes P/N h8270.1 REV A01 Date June, 2011 Replicating VNXe3100/VNXe3150/VNXe3300 CIFS/NFS Shared Folders to VNX Technical Notes P/N h8270.1 REV A01 Date June, 2011 Contents Introduction... 2 Roadmap... 3 What is in this document... 3 Test Environment...

More information

TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation

TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation Software Release 6.0 November 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

EMC Documentum Repository Services for Microsoft SharePoint

EMC Documentum Repository Services for Microsoft SharePoint EMC Documentum Repository Services for Microsoft SharePoint Version 6.5 SP2 Installation Guide P/N 300 009 829 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com

More information

Symantec NetBackup for Lotus Notes Administrator's Guide

Symantec NetBackup for Lotus Notes Administrator's Guide Symantec NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for Lotus Notes Administrator's Guide The software described in this book is furnished

More information

efolder BDR for Veeam Cloud Connection Guide

efolder BDR for Veeam Cloud Connection Guide efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Acronis Backup & Recovery 11.5 Quick Start Guide

Acronis Backup & Recovery 11.5 Quick Start Guide Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

TIBCO Fulfillment Provisioning Session Layer for FTP Installation

TIBCO Fulfillment Provisioning Session Layer for FTP Installation TIBCO Fulfillment Provisioning Session Layer for FTP Installation Software Release 3.8.1 August 2015 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

NTP Software File Auditor for Windows Edition

NTP Software File Auditor for Windows Edition NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor

More information

Active Directory Synchronization with Lotus ADSync

Active Directory Synchronization with Lotus ADSync Redbooks Paper Active Directory Synchronization with Lotus ADSync Billy Boykin Tommi Tulisalo The Active Directory Synchronization tool, or ADSync, allows Active Directory administrators to manage (register,

More information

Archive Attender Version 3.5

Archive Attender Version 3.5 Archive Attender Version 3.5 Getting Started Guide Sherpa Software (800) 255-5155 www.sherpasoftware.com Page 1 Under the copyright laws, neither the documentation nor the software can be copied, photocopied,

More information

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 3.0 User Guide P/N 300-999-671 REV 02 Copyright 2007-2013 EMC Corporation. All rights reserved. Published in the USA.

More information

Universal Management Service 2015

Universal Management Service 2015 Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,

More information

Using Windows Administrative Tools on VNX

Using Windows Administrative Tools on VNX EMC VNX Series Release 7.0 Using Windows Administrative Tools on VNX P/N 300-011-833 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2011 -

More information

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No

More information

EMC VIPR SRM: VAPP BACKUP AND RESTORE USING EMC NETWORKER

EMC VIPR SRM: VAPP BACKUP AND RESTORE USING EMC NETWORKER EMC VIPR SRM: VAPP BACKUP AND RESTORE USING EMC NETWORKER ABSTRACT This white paper provides a working example of how to back up and restore an EMC ViPR SRM vapp using EMC NetWorker. October 2015 WHITE

More information

BEST PRACTICES GUIDE. Nimble Storage VSS Provider with the Symantec NetBackup Snapshot Client

BEST PRACTICES GUIDE. Nimble Storage VSS Provider with the Symantec NetBackup Snapshot Client BEST PRACTICES GUIDE Nimble Storage VSS Provider with the Symantec NetBackup Snapshot Client Document Revision Date Revision Description (author) 3/23/2015 1.3 Published version 1(Bill Roth) THIS BEST

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

HP Data Protector Integration with Autonomy IDOL Server

HP Data Protector Integration with Autonomy IDOL Server HP Data Protector Integration with Autonomy IDOL Server Introducing e-discovery for HP Data Protector environments Technical white paper Table of contents Summary... 2 Introduction... 2 Integration concepts...

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Technical Notes TECHNICAL NOTES. Release number 8.2 Service Pack 1 302-001-239 REV 01. January, 2015

Technical Notes TECHNICAL NOTES. Release number 8.2 Service Pack 1 302-001-239 REV 01. January, 2015 EMC NetWorker Module for Microsoft: Exchange Server Granular Level Recovery (GLR) using EMC NetWorker Module for Microsoft with Ontrack PowerControls Release number 8.2 Service Pack 1 TECHNICAL NOTES 302-001-239

More information

VMware User Environment Manager

VMware User Environment Manager VMware User Environment Manager Deployed in 60 Minutes or Less Author: Dale Carter Senior Solution Architect VMware Technology Consulting Services April 2015 Table of Contents 1. VMware User Environment

More information

Configure Cisco Emergency Responder Disaster Recovery System

Configure Cisco Emergency Responder Disaster Recovery System Configure Cisco Emergency Responder Disaster Recovery System Disaster Recovery System overview, page 1 Backup and restore procedures, page 2 Supported features and components, page 4 System requirements,

More information

EMC DATA DOMAIN ENCRYPTION A Detailed Review

EMC DATA DOMAIN ENCRYPTION A Detailed Review White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to

More information

MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.

MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6. STUDENT ACTIVITY 6.1: UNDERSTAND BACKUP AND RECOVERY METHODS MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.1 Lesson

More information

ElectricCommander. Technical Notes MS Visual Studio Add-in Integration version 1.5.0. version 3.5 or higher. October 2010

ElectricCommander. Technical Notes MS Visual Studio Add-in Integration version 1.5.0. version 3.5 or higher. October 2010 ElectricCommander version 3.5 or higher Technical Notes MS Visual Studio Add-in Integration version 1.5.0 October 2010 This document contains information about the ElectricCommander integration with the

More information

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...

More information

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Administration GUIDE SharePoint Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Getting Started - SharePoint Server idataagent Overview Deployment Configuration Decision Table

More information

CA ARCserve Backup for Windows

CA ARCserve Backup for Windows CA ARCserve Backup for Windows Agent for Microsoft SharePoint Server Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for

More information

HP D2D NAS Integration with HP Data Protector 6.11

HP D2D NAS Integration with HP Data Protector 6.11 HP D2D NAS Integration with HP Data Protector 6.11 Abstract This guide provides step by step instructions on how to configure and optimize HP Data Protector 6.11 in order to back up to HP D2D Backup Systems

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

For Active Directory Installation Guide

For Active Directory Installation Guide For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Windows Domain Network Configuration Guide

Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication may

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement and may be used

More information

Acronis Backup & Recovery 11. Backing Up Microsoft Exchange Server Data

Acronis Backup & Recovery 11. Backing Up Microsoft Exchange Server Data Acronis Backup & Recovery 11 Backing Up Microsoft Exchange Server Data Copyright Acronis, Inc., 2000-2012. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of Acronis, Inc.

More information

EMC NetWorker. Licensing Guide. Release 8.0 P/N 300-013-596 REV A01

EMC NetWorker. Licensing Guide. Release 8.0 P/N 300-013-596 REV A01 EMC NetWorker Release 8.0 Licensing Guide P/N 300-013-596 REV A01 Copyright (2011-2012) EMC Corporation. All rights reserved. Published in the USA. Published June, 2012 EMC believes the information in

More information

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip. Reflection DBR USER GUIDE 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Page 1 of 1 Table of Contents Overview 3 Reflection DBR Client and Console Installation 4

More information

Automating client deployment

Automating client deployment Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark

More information

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 Version 3.2 ArcMail Technology 401 Edwards Street, Suite 1601 Shreveport, LA 71101 Support: (888) 790-9252

More information

EMC AVAMAR INTEGRATION GUIDE AND DATA DOMAIN 6.0 P/N 300-011-623 REV A02

EMC AVAMAR INTEGRATION GUIDE AND DATA DOMAIN 6.0 P/N 300-011-623 REV A02 EMC AVAMAR 6.0 AND DATA DOMAIN INTEGRATION GUIDE P/N 300-011-623 REV A02 EMC CORPORATION CORPORATE HEADQUARTERS: HOPKINTON, MA 01748-9103 1-508-435-1000 WWW.EMC.COM Copyright and Trademark Notices Copyright

More information

Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c

Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c This document describes how to set up Oracle Enterprise Manager 12c to monitor

More information

EMC DiskXtender File System Manager for UNIX/Linux Release 3.5

EMC DiskXtender File System Manager for UNIX/Linux Release 3.5 EMC DiskXtender File System Manager for UNIX/Linux Release 3.5 Administrator s Guide P/N 300-009-573 REV. A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com

More information

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Technical Note. Performing Exchange Server Granular Level Recovery by using the EMC Avamar 7.1 Plug-in for Exchange VSS with Ontrack PowerControls

Technical Note. Performing Exchange Server Granular Level Recovery by using the EMC Avamar 7.1 Plug-in for Exchange VSS with Ontrack PowerControls Performing Exchange Server Granular Level Recovery by using the EMC Avamar 7.1 Plug-in for Exchange VSS with Ontrack PowerControls Technical Note 302-001-437 REV 01 December, 2014 This technical note describes

More information

EVault Software. Course 361 Protecting Linux and UNIX with EVault

EVault Software. Course 361 Protecting Linux and UNIX with EVault EVault Software Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in

More information

IBRIX Fusion 3.1 Release Notes

IBRIX Fusion 3.1 Release Notes Release Date April 2009 Version IBRIX Fusion Version 3.1 Release 46 Compatibility New Features Version 3.1 CLI Changes RHEL 5 Update 3 is supported for Segment Servers and IBRIX Clients RHEL 5 Update 2

More information

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email

More information

Protecting SQL Server Databases. 1997-2008 Software Pursuits, Inc.

Protecting SQL Server Databases. 1997-2008 Software Pursuits, Inc. Protecting SQL Server Databases 1997-2008 Table of Contents Introduction... 2 Overview of the Backup Process... 2 Configuring SQL Server to Perform Scheduled Backups... 3 Configuring SureSync Relation

More information

Using Delphix Server with Microsoft SQL Server (BETA)

Using Delphix Server with Microsoft SQL Server (BETA) Using Delphix Server with Microsoft SQL Server (BETA) Table of Contents Architecture High level components in linking a SQL Server database to Delphix High level components in provisioning a SQL Server

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Backup Exec Private Cloud Services. Planning and Deployment Guide

Backup Exec Private Cloud Services. Planning and Deployment Guide Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services

More information

EMC Data Protection Search

EMC Data Protection Search EMC Data Protection Search Version 1.0 Security Configuration Guide 302-001-611 REV 01 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published April 20, 2015 EMC believes

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

Gladinet Cloud Backup V3.0 User Guide

Gladinet Cloud Backup V3.0 User Guide Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet

More information

VERITAS NetBackup TM 6.0

VERITAS NetBackup TM 6.0 VERITAS NetBackup TM 6.0 System Administrator s Guide, Volume II for UNIX and Linux N15258B September 2005 Disclaimer The information contained in this publication is subject to change without notice.

More information

Symantec NetBackup Vault Operator's Guide

Symantec NetBackup Vault Operator's Guide Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Symantec Backup Exec Management Plug-in for VMware User's Guide

Symantec Backup Exec Management Plug-in for VMware User's Guide Symantec Backup Exec Management Plug-in for VMware User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information