Aggregating File Data with the Snap Enterprise Data Replicator

Size: px
Start display at page:

Download "Aggregating File Data with the Snap Enterprise Data Replicator"

Transcription

1 SERVER STORAGE SOLUTION BEST PRACTICES Aggregating File Data with the Snap Enterprise Data Replicator 1. Abstract Introduction to Snap EDR Product Architecture Aggregate Data Management Tool Default Functionality System Setup and Software Installation Installing the Snap EDR Management Console Software Installing Snap EDR Agents Configuring Schedules Monitoring Performance Viewing Job Statistics Viewing the Job Log Files Verifying Performance Report Types Best Practices Bandwidth Requirements Directory Configuration on Remote Nodes Permissions Selection Platform Choice Use of Compression Delivery Mode Conclusion Abstract This whitepaper provides an overview of the Snap Enterprise Data Replicator (Snap EDR) product, and details the components and configuration of a Snap EDR Aggregate solution. This solution allows users to aggregate file data to a common location from multiple Adaptec GuardianOS Snap Servers, Windows clients and UNIX/Linux clients. Common business needs for aggregation of file data include: Retrieval of daily sales files for sales reporting Collection of server logs to support monitoring Collection of Point of Sale transaction data 2. Introduction to Snap EDR Snap EDR includes three Data Management Tools that automate the secure flow of data between systems: The Aggregate tool allows job-based scheduling for transferring files from multiple hosts to a single target host, and storing the files on a local disk The Distribute tool allows job-based scheduling for transferring files from one source machine to one or more target machines The Replicate tool job-based scheduling of file transfers between two systems Also available for Snap EDR is the Advanced Data Management (ADM) Suite that groups together the functionality of Remote Inventory, Remote Archiving, and Remote Backup and Restore. These solutions provide exceptional functionality to create and deploy policies for solving remote data management problems such as variability, dissimilar computing platforms, security needs, and data integrity. The Advanced Data Management Suite simplifies the following tasks: Inventory to determine storage utilization Archive to move selected data to central sites Backup to protect data Restore to reinstall backup data in a recovery situation Separate white papers provide details on the Distribute and Replicate tools and the tools in the ADM suite, and are available at English+US&docType=Whitepapers&source=subnav

2 2 3. Product Architecture The Snap EDR consists of a Management Console that is installed on a single Snap Server, and a collection of Agents running on the various clients involved in the replication. The Management Console coordinates and logs the data transfer activities carried out by the distributed Agents. The Agents are responsible for the actual transfer of data. A web-based administration browser gives users access to the Management Console, allowing them to configure Snap EDR components and to create data management and transfer jobs from any location. The following diagram shows an example of the Snap EDR solution: SNAP EDR Snap EDR Manager REMOTE UNIX SERVER SNAP EDR SNAP EDR SNAP SERVER IP Network REMOTE LINUX SERVER SNAP EDR SNAP EDR REMOTE WINDOWS SERVER REMOTE SNAP SERVER 4500 MANAGEMENT CONSOLE INTERFACE Data Movement Control The Administrator logs into the Management Console via the Web-based administration browser. The administrator then creates and configures jobs through this interface. The Snap EDR Management Console then communicates with the agents involved in the job, and the agents transfer the data to the appropriate machine(s). The Management Console logs the transfer activity, and the user can view these log files and reports through the Management Console interface. Note that the flow of control and data movement illustrated above differs depending on the type of transfer that has been created. In some cases, users may want to transfer data from the central Management Console to remote agents (called a push transfer). In other cases, users may want to transfer data from remote agents to the central Management Console (called a pull transfer). Users may also choose to transfer data among the remote agents (e.g., data from a remote Windows server to a remote Unix Server). The role of the Management Console is analogous to that of an air traffic controller. Just as an air traffic controller informs, monitors, and supervises the movement of airplanes in a specified airspace, so the Management Console initiates, monitors and supervises the flow of data through specified areas of the network. The aggregation of file data using Snap EDR is a straightforward process involving the activation of the Snap EDR agents on two or more host machines, configuring the parameters of the aggregation (e.g., source and target directories, etc.) and scheduling the aggregation task.

3 3 4. Aggregate Data Management Tool The Aggregate data management tool retrieves files from multiple source Agents to a single target Agent, and stores the files on the target s local disk or device. The files transferred from the source Agents may be stored on a per Agent basis, or in a single flat namespace on the target Agent s storage device. This is referred to as a Pull file transfer Default Functionality The Aggregate data management tool has the following default functionality: File transfer from one or many Agents to a single source Agent Cross-platform support (transfers can go from one or more Snap Servers, running GuardianOS 3.1 or later, Windows, or UNIX/Linux Agents to a single Snap, Windows, or UNIX/Linux Agent) Store files from source Agents in a single flat namespace or in a separate namespace on a per source Agent basis Option to exclude files from the transfer Option to exclude directories Option to remove files transferred from source Agents after sending to the target Agent Users can set information in the following categories: Source Agent selection Target Agent selection Directory and file selection File transfer options (such as file compression, certified delivery, source and target synchronization, etc.) Schedule notification 5. System Setup and Software Installation The architecture of the Snap EDR system requires users to install a central Management Console that coordinates and logs the data transfer activities of the distributed Agents. This Management Console should be installed on only one Snap Server. In addition, users can install Agent software on any node that will be involved in the data transfers. Users can install the Agent software on Snap Server, Windows, or UNIX/Linux systems. Installing and configuring the Snap EDR software involves the following procedures: Installing the Management Console software on a Snap Server Installing Snap EDR Agent software on Snap Server, Windows, and/or UNIX/Linux nodes Snap EDR installs only on GuardianOS or higher Once the software is installed, the browser-based Administration tool can be used to login to the Management Console and configure and schedule aggregation jobs Installing the Snap EDR Management Console Software The Management Console software is the engine that drives Snap EDR. The Management Console software is installed on a single Snap Server from which it coordinates and logs the data transfer activities carried out by the distributed Agents. Users can login to the Management Console through a web-based administration browser in order to configure Snap EDR components and to create data management and transfer jobs. Note: Only one Management Console should be configured to handle all of the Agents in the Snap EDR replication environment. Install the Management Console software through the browser-based Administration Tool for the Snap Server. For detailed procedures on how to install the Management Console software, refer to the product documentation.

4 Installing Snap EDR Agents Snap EDR agents are responsible for the actual transfer of data. An agent is installed automatically on the Snap Server that is designated as the Management Console. The Snap EDR Agent software must be installed on each remote node in the system that will be part of the Snap EDR data transfer environment. Users can install a Snap EDR Agent on any Snap Server, Windows, or UNIX/Linux system that meets the following requirements: Item For detailed procedures on installing the Snap EDR Agent software on a Snap Server, Windows or UNIX/Linux system, refer to the product documentation 6. Configuring Schedules Description Operating System AIX 4.3, 5.1, 5.2 Solaris 5.7, 5.8 HP-UX 11.x, 11i Fedora Linux, RedHat Linux 7.2/7.3, Enterprise Linux 2.1 or 3.0 or SUSE LINUX 8.2 and 9.0 Windows 2000 (with SP2 or higher), Windows Server Appliance Kit (SAK) 2.01, or Windows XP System Memory 128 MB or more Disk Space Windows systems: 5 MB or more UNIX systems: 5 MB or more Installation directory: 100 MB, 20MB free in/tmp on all platforms Network Connection 100 Mb/sec Ethernet or faster After installing the Snap EDR software, login to the Management Console to configure the Aggregate tool to schedule the type of aggregation job you want to run. When you login to the Management Console, the following screen appears, displaying a menu on the left-side that allows users to schedule a variety of jobs (aggregate, distribute, backup, replicate, and so on), install agents, change user preferences, run maintenance tasks, generate reports, and view transfer logs:

5 5 To schedule an aggregate job click on the Aggregate menu item on the left side of the screen. The Aggregate configuration and scheduling screen is similar to the following: When creating a job, users can specify the source and target agents, which directories to exclude, file ownership preservation and so on. For detailed instructions on creating an aggregate job, see the product documentation. 7. Monitoring Performance There are a number of ways a user can monitor the performance of a job, including the following: Viewing Job Statistics Viewing the Job Log Files 7.1. Viewing Job Statistics A scheduled job s statistics provide information such as the start and end time of the job and whether or not the job ran successfully. The Scheduled Job View screen also allows access to Console functions where other tasks can be performed with the scheduled job. These tasks include manually running a job and viewing past log files. The following is a sample of the Job View screen:

6 Viewing the Job Log Files Whenever a scheduled job is run, the Management Console generates a log file. The display area shows log files for the most recent run and up to ten previous job runs. If there are more than ten job runs, the oldest job log is deleted to allow space for the newest job log. Clicking on the word view beside any past job run displays a detailed log summary screen for that particular job run. This screen displays messages about the transfer generated during the job run by the Management Console and the Agents. These messages vary in severity, from simple information messages (e.g., starting group: Aggregate (sequential)), to warnings (e.g., Preserve ownership may fail for target snap01 because the system types are different., to errors and debug messages. These messages are useful for evaluating the job run. Exit codes appear in the Exit Code column in the list of job runs. An exit code indicates whether or not a job completed successfully, and if there was an error, the type of error that occurred. A 0 exit code indicates the job completed successfully. For a description of what each non-zero exit code means, click more info beside the exit code in the Exit Code column of the job screen, or refer to the product documentation. Click Filter to change the type of log information that appears or download the job log file to your local machine. Downloading the file allows it to be loaded into different programs (for searching, printing and so on). The log file is a plain text file.

7 7 8. Verifying Performance The Management Console creates at least one statistics record for each completed job run and stores it in the Rules Database. Using the Management Console UI, users can generate a number of different types of reports to evaluate the operation of each job Report Types The following types of reports can be generated using the Management Console: Report Type Stats Summary Report Detail Report Custom Query Report Description Provides a summary and totals of the data from all jobs in the selected job group (all Distribute, Aggregate and Replicate jobs are in the Published_Solutions job group), based on how the user chooses to group the data (by month, day, etc.). Provides a detailed record of the data from the selected job group (all Distribute, Aggregate and Replicate jobs are in the Published_Solutions job group). Note that the number of records the report displays depends on the number of Agents on which the job runs. The report displays a record for every Agent on which the job runs. Provides a customized query of detail records from the job name within a selected job group (all Distribute, Aggregate and Replicate jobs are in the Published_Solutions job group). Note that the number of records the report displays depends on the number of Agents on which the job runs. The report displays a record for every Agent on which the job runs. When a report is created, a template name can be assigned to it. The template appears in the Report view. Report templates allows reports to be generated without having to change the existing parameters. Templates are especially useful for generating the same type of report on a regular basis. Run, Edit, Remove, or Schedule a report by clicking on the appropriate word beside the report template. Click Schedule to run reports daily, weekly or monthly at specific times. The following diagram is a sample of a Stats Summary Report: For detailed instructions on how to generate reports, see the product documentation.

8 8 9. Best Practices To obtain the best performance from the Aggregate job, consider these issues: bandwidth requirements directory configuration on remote nodes permissions selection platform choice use of compression delivery mode 9.1. Bandwidth Requirements To determine performance requirements for the aggregation job, it is important to have the following information: Amount of data to be retrieved Amount of time available for the aggregation Bandwidth of the most constrained segment of the network (can be either the speed of the network or a limit imposed by bandwidth throttling) Use the following equations to manually calculate bandwidth requirements: Sender bandwidth Mbps=(MB to transfer*8)/(avail. Hrs for Aggregation *3600) Receiver bandwidth Mbps=Sender bandwidth Mbps * Number of agents Example: A user needs to aggregate webserver logs nightly (between 6pm and 6am) from 100 locations. The maximum logsize is 1GB and each node being retrieving from has a T-1 (1.544 Mbps) network connection. The receiving (target) machine has a T-3 connection (44 Mbps) It has to be determined if the sender has enough bandwidth to send the data in the time required AND if the receiver has enough bandwidth to receive the data from ALL of the sources. Sender bandwidth Mbps=(MB to transfer*8)/(avail Hrs*3600) Sender bandwidth Mbps = 1000 * 8 / 12 * 3600 Sender bandwidth Mbps = 8,000 / 43,200 Sender bandwidth Mbps = Mbps (Each sender has sufficient bandwidth: Mbps < Mbps) Receiver bandwidth required Mbps=Sender bandwidth Mbps * Number of agents Receiver bandwidth required Mbps=0.185 x 100 Receiver bandwidth required Mbps=18.5 Mbps (The receive sufficient bandwidth Mbps < 44 Mbps) To determine the maximum network performance to the receiver, perform a transfer of a single large file (i.e., 20MB or more) across the same network using the same equipment and storage that will be used in production to the receiver. Ensure that network performance exceeds the required performance. Several network factors will impact the ability of the Snap EDR agents to use all of the available bandwidth: network latency, packet drop rates, network congestion, etc. For these reasons, it is useful to perform test data transfers over the actual networks that will be used. IMPORTANT: This calculation would be an estimate of WORST CASE bandwidth needs. The SNAP EDR software is optimized to make the best use of network bandwidth through features like in-stream data compression and byte-level incremental transfers. Therefore, if you are repeatedly transferring files that change only by a small amount, the bandwidth required might be very small for transfers that are not the first time transfer Directory Configuration on Remote Nodes When running an Aggregate job using hosts on multiple platforms, users must ensure that the same directory is being used on each host, or run separate jobs where the directories are different.

9 Permissions Selection The File Ownership Transfer option allows users to specify whether files maintain the source user ID and group ownership after they are transferred, and what method is used. Users can choose from the following options to preserve ownership: GuardianOS - When transferring between two GuardianOS machines, ACLs are extracted and set using the GuardianOS routines. When transferring between Windows, UNIX, Linux, or GuardianOS, user name matching is always done for the owner and group regardless of the source and target OS type, and for ACLs if the source and target are both Windows. If no match is found, a warning is generated. ACLs without matches are dropped. Owners and groups without matches are replaced with the transfer user (root, system or UID 1). Inherited ACLs are not explicitly copied between Windows machines. For example, a file that inherits its ACLs from a folder on the source is transferred to a folder on the target that has different ACLs. However, the source folder is not transferred. In this case, the file's inherited ACLs on the target will come from the target folder into which it is transferred and not from the source folder. GuardianOS mode is the default mode of transfer. Windows - Preserves Windows SIDs in homogenous Windows environments. A security identifier (SID) is a unique value of variable length that is used to identify a security principal (e.g., user or security group) in Windows Well-known SIDs are a group of SIDs that identify generic users or generic groups - these do not change from system to system. In this mode, the security stream, and all other alternate data streams, are copied; inherited ACLs are explicitly copied. Use when transferring data between Windows hosts only. UNIX - Tries to match the usernames/groupnames found on the source and target systems. Use when transferring between Windows and UNIX hosts. The file ownership transfer capability might not work on some UNIX systems such as HPUX 11 and Solaris 7 that use Orange Book security standards. Off - Do not preserve ownership. The user ID specified in the target User ID field of this job template owns files written to the target. The file will be owned by root on UNIX, NT Authority/System on Windows and UID1 on GuardianOS. The following table provides a matrix for transfer of Ownership, Permission and Attributes with Snap EDR: Transfer Type Permissions Transferred EDR Optimal Permissions Transfer Setting (c) Replicate, Aggregate, Distribute Tool Windows to Windows All Windows Windows to UNIX RWX, Owner, Group UNIX Windows to GuardianOS RWX(a),Owner, Group, Others GuardianOS GuardianOS to Windows RWX(b), Owner, Group, Others Windows UNIX to Windows RWX, Owner, Group GuardianOS UNIX to UNIX RWX, Owner, Group UNIX UNIX to GuardianOS RWX, Owner, Group UNIX GuardianOS to GuardianOS All GuardianOS (a) The read-only file attribute is mapped by setting permission bits to r--r--r-- for read only files and rw-rw-rw- for all others. The execute bit is also set for folders and executable files (e.g., file suffix.exe,.com, etc). The system, hidden, temporary, encrypted and compressed attributes are dropped. The modified and accessed dates are preserved from the source. The create date is not preserved from the source ACE entries for Owning user, group, and other users (b) File owner, group, and other users are mapped. If the write permission mode bit is off for "all" on the source, the read only attribute is set on the target. The system, hidden, temporary, encrypted and compressed attributes are set to off on the target. The modified date and accessed date are preserved from the source The create date is not preserved from the source (c) Optimal file ownership and permissions transfer is achieved when users are consistent across the servers involved in the data transfer, such as being in the same Domain. If not, EDR will try to match users based on the permissions transfer method selected.

10 Platform Choice Cross-platform transfer of file data is supported natively; however, to preserve permissions it is recommended that data be aggregated between similar platforms (e.g., Windows to Windows and UNIX/Linux to UNIX/Linux) Use of Compression If the compression option is set to Yes, the source Agent(s) compresses each file in stream before sending it. The files will be uncompressed automatically on the target Agent(s). The degree of compression depends on the type of data you being transferred. The following are typical rates of compression for different types of data: Plain text: 70-95% TIFF images: 20-40% Binary files: 0-5% Generally this feature provides maximum benefit in WAN data transfers where bandwidth is limited (e.g., less than 3 mbits per second) Using this feature may increase CPU usage, and is not recommended on a LAN, since it may slow down the transfer Delivery Mode In considering the selection of a delivery mode, the first question to ask is whether a signed receipt of the delivery is required. If so, the certified delivery option is the only mode that should be considered. The fast mode option will perform best when bandwidth is high-speed and highly available; however, check-pointing of file data will not be used (i.e., if a transfer is interrupted the entire file will be retransmitted). In most local area networks, the fast mode option is the best choice. Fast mode should be used when writing to a NAS share and preserving ownership. To summarize, in order to obtain the best performance from the Aggregate job, consider the following issues: bandwidth requirements directory configuration on remote nodes permissions selection platform choice use of compression delivery mode 10. Conclusion The Snap EDR Aggregate solution is a valuable and easy-to-use tool to aggregate file data to a common location from multiple GuardianOS Snap Servers, Windows or UNIX/Linux servers. It provides a comprehensive solution for aggregating file data from one or many remote sources to assist with common business needs for aggregation in a variety of business scenarios. Adaptec, Inc. 691 South Milpitas Boulevard Milpitas, California Tel: (408) Fax: (408) US and Canada: 1 (800) or (408) World Wide Web: Copyright 2005 Adaptec Inc. All rights reserved. Adaptec and the Adaptec logo are trademarks of Adaptec, Inc., which may be registered in some jurisdictions. All other trademarks used are owned by their respective owners. Information supplied by Adaptec Inc., is believed to be accurate and reliable at the time of printing, but Adaptec Inc., assumes no responsibility for any errors that may appear in this document. Adaptec, Inc., reserves the right, without notice, to make changes in product design or specifications. Information is subject to change without notice. P/N: Printed in USA 3662_1.3

Distributing File Data with Snap Enterprise Data Replicator (Snap EDR)

Distributing File Data with Snap Enterprise Data Replicator (Snap EDR) TECHNICAL OVERVIEW Distributing File Data with Snap Enterprise Data Replicator (Snap ) Contents 1. Abstract...1 2. Introduction to Snap...1 3. Product Architecture...2 4. Distribute Data Management Tool...2

More information

Replicating File Data with Snap Enterprise Data Replicator (Snap EDR)

Replicating File Data with Snap Enterprise Data Replicator (Snap EDR) TECHNICAL OVERVIEW Replicating File Data with Snap Enterprise Data Replicator (Snap ) 1. Abstract...1 2. Introduction to Snap...1 3. Product Architecture...1 4. Replicate Data Management Tool...2 4.1.

More information

Archiving File Data with Snap Enterprise Data Replicator (Snap EDR): Technical Overview

Archiving File Data with Snap Enterprise Data Replicator (Snap EDR): Technical Overview Archiving File Data with Snap Enterprise Data Replicator (Snap EDR): Technical Overview Contents 1. Abstract...1 2. Introduction to Snap EDR...1 2.1. Product Architecture...2 3. System Setup and Software

More information

VMware vsphere Data Protection 6.1

VMware vsphere Data Protection 6.1 VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data

More information

Remote Data Management & Backup with Snap EDR

Remote Data Management & Backup with Snap EDR Remote Data Management & Backup with Snap EDR CONTENTS Abstract...1 Understanding the Challenges of Remote Data...1 Key Considerations for Managing Remote Data...1 Additional Requirements for Remote Data

More information

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of

More information

VMware vsphere Data Protection 6.0

VMware vsphere Data Protection 6.0 VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

Installation Guide. Capacity Planner 3.0 EN-000688-00

Installation Guide. Capacity Planner 3.0 EN-000688-00 Capacity Planner 3.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

efolder BDR for Veeam Cloud Connection Guide

efolder BDR for Veeam Cloud Connection Guide efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud

More information

Stellar Phoenix Exchange Server Backup

Stellar Phoenix Exchange Server Backup Stellar Phoenix Exchange Server Backup Version 1.0 Installation Guide Introduction This is the first release of Stellar Phoenix Exchange Server Backup tool documentation. The contents will be updated periodically

More information

Cloud Storage Backup for Storage as a Service with AT&T

Cloud Storage Backup for Storage as a Service with AT&T WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,

More information

WHITE PAPER: TECHNICAL OVERVIEW. NetBackup Desktop Laptop Option Technical Product Overview

WHITE PAPER: TECHNICAL OVERVIEW. NetBackup Desktop Laptop Option Technical Product Overview WHITE PAPER: TECHNICAL OVERVIEW NetBackup Desktop Laptop Option Technical Product Overview Mayur Dewaikar, Sr. Technical Product Manager NetBackup Platform Symantec Technical Network White Paper EXECUTIVE

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.

More information

QuickStart Guide vcenter Server Heartbeat 5.5 Update 2

QuickStart Guide vcenter Server Heartbeat 5.5 Update 2 vcenter Server Heartbeat 5.5 Update 2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

Vodacom Managed Hosted Backups

Vodacom Managed Hosted Backups Vodacom Managed Hosted Backups Robust Data Protection for your Business Critical Data Enterprise class Backup and Recovery and Data Management on Diverse Platforms Vodacom s Managed Hosted Backup offers

More information

RDS Directory Synchronization

RDS Directory Synchronization RDS Directory Synchronization Installation and Setup Guide Software Version 3.1.1 For Windows, Linux and UNIX operating systems September 16, 2009 RepliWeb, Inc., 6441 Lyons Road, Coconut Creek, FL 33073

More information

W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers

W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

Symantec NetBackup Getting Started Guide. Release 7.1

Symantec NetBackup Getting Started Guide. Release 7.1 Symantec NetBackup Getting Started Guide Release 7.1 21159722 Contents NetBackup Getting Started Guide... 5 About NetBackup... 5 How a NetBackup system works... 6 How to make a NetBackup system work for

More information

Scholastic Reading Inventory Installation Guide

Scholastic Reading Inventory Installation Guide Scholastic Reading Inventory Installation Guide For use with Scholastic Reading Inventory version 2.0.1 or later and SAM version 2.0.2 or later Copyright 2011 by Scholastic Inc. All rights reserved. Published

More information

How To Restore An Org Server With Anor Backup For Windows 7.5.2 (Oracle)

How To Restore An Org Server With Anor Backup For Windows 7.5.2 (Oracle) Oracle Server Backup User Guide TABLE OF CONTENTS Introduction... 2 Oracle Server Backup... 3 Features... 3 Requirements for Oracle server backup... 3 How to enable ARCHIVELOG Mode... 3 System Requirements...

More information

Disk-to-Disk Backup Solution

Disk-to-Disk Backup Solution SSTG-AIM 2004 Disk-to-Disk Backup Solution Using CommVault QiNetix v5.0.0 with Adaptec Snap Server 4500 Storage Array Contents Introduction: The Data Protection Challenge...2 The Solution: Disk-to-Disk

More information

1 of 10 1/31/2014 4:08 PM

1 of 10 1/31/2014 4:08 PM 1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings

More information

Using Symantec NetBackup with Symantec Security Information Manager 4.5

Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights

More information

Content Distribution Management

Content Distribution Management Digitizing the Olympics was truly one of the most ambitious media projects in history, and we could not have done it without Signiant. We used Signiant CDM to automate 54 different workflows between 11

More information

EVault Software. Course 361 Protecting Linux and UNIX with EVault

EVault Software. Course 361 Protecting Linux and UNIX with EVault EVault Software Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in

More information

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20 Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

Symantec NetBackup PureDisk Deduplication Option Guide

Symantec NetBackup PureDisk Deduplication Option Guide Symantec NetBackup PureDisk Deduplication Option Guide Windows, Linux, and UNIX Release 6.6.5 Revision 1 The software described in this book is furnished under a license agreement and may be used only

More information

ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide

ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide Notice Altiris Software Delivery Solution for Windows 6.1 SP3 Product Guide 2007 Altiris, Inc. All rights reserved. Document Date: February

More information

SecureVault Online Backup Service FAQ

SecureVault Online Backup Service FAQ SecureVault Online Backup Service FAQ C0110 SecureVault FAQ (EN) - 1 - Rev. 19-Nov-2007 Table of Contents 1. General 4 Q1. Can I exchange the client type between SecureVault PC Backup Manager and SecureVault

More information

GuardianOS Data Migration Tool Enables Ease of Snap Server Deployment and Data Consolidation WHITE PAPER

GuardianOS Data Migration Tool Enables Ease of Snap Server Deployment and Data Consolidation WHITE PAPER GuardianOS Data Migration Tool Enables Ease of Snap Server Deployment and Data Consolidation WHITE PAPER Introduction Powered by the GuardianOS operating system, the Overland Storage Snap Server family

More information

11.1. Performance Monitoring

11.1. Performance Monitoring 11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.2 User Manual for Mac OS X Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved. Attix5, 2013 Trademarks

More information

HP IMC User Behavior Auditor

HP IMC User Behavior Auditor HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

AvePoint DocAve 4.0 (Enterprise Solutions for SharePoint) User Guide August 2006

AvePoint DocAve 4.0 (Enterprise Solutions for SharePoint) User Guide August 2006 AvePoint DocAve 4.0 (Enterprise Solutions for SharePoint) User Guide August 2006 AvePoint DocAve 4.0 Install Guide August 2006 Copyright 2001-2006 AvePoint, Inc. All rights reserved. No part of this publication

More information

PATROL Console Server and RTserver Getting Started

PATROL Console Server and RTserver Getting Started PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.

More information

VMware/Hyper-V Backup Plug-in User Guide

VMware/Hyper-V Backup Plug-in User Guide VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,

More information

Disk-to-Disk-to-Tape Backup

Disk-to-Disk-to-Tape Backup Disk-to-Disk-to-Tape Backup Contents Introduction.....................................2 A Typical Solution Topology.........................4 Compatible Media and Tape Devices..................5 Configuring

More information

Arcserve Backup for Windows

Arcserve Backup for Windows Arcserve Backup for Windows Agent for Microsoft SharePoint Server Guide r16 Pre-release Document, only for reference This Documentation, which includes embedded help systems and electronically distributed

More information

Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/01. 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.

Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/01. 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236. Frequently Asked Questions Secure Log Manager Last Update: 6/25/01 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 1. What is Secure Log Manager? Secure Log Manager (SLM) is designed

More information

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015 VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation

More information

Acronis Backup & Recovery 11.5

Acronis Backup & Recovery 11.5 Acronis Backup & Recovery 11.5 Update 2 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2013. All rights reserved. Acronis and Acronis Secure Zone

More information

FileNet System Manager Dashboard Help

FileNet System Manager Dashboard Help FileNet System Manager Dashboard Help Release 3.5.0 June 2005 FileNet is a registered trademark of FileNet Corporation. All other products and brand names are trademarks or registered trademarks of their

More information

Altor Virtual Network Security Analyzer v1.0 Installation Guide

Altor Virtual Network Security Analyzer v1.0 Installation Guide Altor Virtual Network Security Analyzer v1.0 Installation Guide The Altor Virtual Network Security Analyzer (VNSA) application is deployed as Virtual Appliance running on VMware ESX servers. A single Altor

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,

More information

PN 00651. Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00

PN 00651. Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00 PN 00651 Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00 Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00 First Edition This documentation was prepared to assist licensed

More information

Quick Start Guide. Apptix Online Backup by Mozy (AOBM) Live Support: 866-461-0851

Quick Start Guide. Apptix Online Backup by Mozy (AOBM) Live Support: 866-461-0851 Quick Start Guide (AOBM) Live Support: 866-461-0851 Quick Start Guide Page 2 of 16 Quick Start Guide Overview Other Guides & Training Resources Admin Guide... [76 Page PDF] Client Software User Guide [46

More information

Sawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices

Sawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices Sawmill Log Analyzer Best Practices!! Page 1 of 6 Sawmill Log Analyzer Best Practices! Sawmill Log Analyzer Best Practices!! Page 2 of 6 This document describes best practices for the Sawmill universal

More information

Directions for VMware Ready Testing for Application Software

Directions for VMware Ready Testing for Application Software Directions for VMware Ready Testing for Application Software Introduction To be awarded the VMware ready logo for your product requires a modest amount of engineering work, assuming that the pre-requisites

More information

BMC BladeLogic Client Automation Installation Guide

BMC BladeLogic Client Automation Installation Guide BMC BladeLogic Client Automation Installation Guide Supporting BMC BladeLogic Client Automation 8.2.02 January 2013 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.

More information

User s Manual. Management Software for ATS

User s Manual. Management Software for ATS ATS Monitor User s Manual Management Software for ATS Table of Contents 1. ATS Monitor Overview... 2 2. ATS Monitor Install and Uninstall... 2 2.1. System Requirement... 2 2.2. Software Install... 2 2.3.

More information

TECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage

TECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage TECHNICAL PAPER Veeam Backup & Replication with Nimble Storage Document Revision Date Revision Description (author) 11/26/2014 1. 0 Draft release (Bill Roth) 12/23/2014 1.1 Draft update (Bill Roth) 2/20/2015

More information

GoAnywhere Director to GoAnywhere MFT Upgrade Guide. Version: 5.0.1 Publication Date: 07/09/2015

GoAnywhere Director to GoAnywhere MFT Upgrade Guide. Version: 5.0.1 Publication Date: 07/09/2015 GoAnywhere Director to GoAnywhere MFT Upgrade Guide Version: 5.0.1 Publication Date: 07/09/2015 Copyright 2015 Linoma Software. All rights reserved. Information in this document is subject to change without

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Release Notes. LiveVault. Contents. Version 7.65. Revision 0

Release Notes. LiveVault. Contents. Version 7.65. Revision 0 R E L E A S E N O T E S LiveVault Version 7.65 Release Notes Revision 0 This document describes new features and resolved issues for LiveVault 7.65. You can retrieve the latest available product documentation

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

1 Download & Installation... 4. 1 Usernames and... Passwords

1 Download & Installation... 4. 1 Usernames and... Passwords Contents I Table of Contents Part I Document Overview 2 Part II Document Details 3 Part III EventSentry Setup 4 1 Download & Installation... 4 Part IV Configuration 4 1 Usernames and... Passwords 5 2 Network...

More information

Acronis Backup & Recovery 11.5 Quick Start Guide

Acronis Backup & Recovery 11.5 Quick Start Guide Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server

More information

Wavelink Client License Server Version 4.0 Reference Guide

Wavelink Client License Server Version 4.0 Reference Guide Wavelink Client License Server Version 4.0 Reference Guide tn rg licserv 20080730 Revised 07/30/08 Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park

More information

REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION

REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION SD005 V2.0 Issue Date 02 July 2014 1) SERVICE OVERVIEW Redcentric's Managed Archive Service allows customers to regain control of their Microsoft Exchange

More information

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the

More information

Detailed Features. Detailed Features. EISOO AnyBackup Family 1 / 19 WWW.EISOO.COM

Detailed Features. Detailed Features. EISOO AnyBackup Family 1 / 19 WWW.EISOO.COM Detailed EISOO AnyBackup Family 1 / CONTENT Chapter 1. About AnyBackup Family... 4 Chapter 2. Detailed... 5 2.1 Data Protection... 5 2.2 Regular Backup... 6 2.3 Regular Backup and Restore for File... 7

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing

More information

Vector Asset Management User Manual

Vector Asset Management User Manual Vector Asset Management User Manual This manual describes how to set up Vector Asset Management 6.0. It describes how to use the: Vector AM Console Vector AM Client Hardware Inventory Software Inventory

More information

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

Continuous Data Protection. PowerVault DL Backup to Disk Appliance

Continuous Data Protection. PowerVault DL Backup to Disk Appliance Continuous Data Protection PowerVault DL Backup to Disk Appliance Continuous Data Protection Current Situation The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server

More information

Gladinet Cloud Backup V3.0 User Guide

Gladinet Cloud Backup V3.0 User Guide Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet

More information

TABLE OF CONTENTS. Copyright Pro Softnet Corporation. All rights reserved. 2

TABLE OF CONTENTS. Copyright Pro Softnet Corporation. All rights reserved. 2 Last modified on 08.11.2011 TABLE OF CONTENTS Introduction... 4 Features... 5 General Features... 5 Backup Features... 5 Restore Features... 6 Link for Application Download... 6 Install IBackup for Mac...

More information

AliOffice 2.0 Installation Guide

AliOffice 2.0 Installation Guide January 25, 2012 AliOffice 2.0 Installation Guide Overview This document contains instructions for installing AliOffice and readying the application for the completion and submission of compliance evaluations.

More information

Network device management solution.

Network device management solution. Network device management solution. iw Management Console Version 3 you can Scalability. Reliability. Real-time communications. Productivity. Network efficiency. You demand it from your ERP systems and

More information

C p o y p r y i r g i h g t D t e a t i a lie l d

C p o y p r y i r g i h g t D t e a t i a lie l d of EISOO AnyBackup Appliance Copyright 2003-2012 EISOO Software Co.,Ltd. No company or individual are allowed to copy, distribute and extract all or parts of this document without the permission of EISOO

More information

LevelOne MUS-1001. 1GB Smart Flash. User Manual V1.0.0-0610

LevelOne MUS-1001. 1GB Smart Flash. User Manual V1.0.0-0610 LevelOne MUS-1001 1GB Smart Flash User Manual V1.0.0-0610 CONTENT CHAPTER 1 INTRODUCTION...4 1.1 About this Manual...4 1.2 Support Services...5 CHAPTER 2 PRODUCT OVERVIEW...6 2.1 Package Contents...6 2.2

More information

Network device management solution

Network device management solution iw Management Console Network device management solution iw MANAGEMENT CONSOLE Scalability. Reliability. Real-time communications. Productivity. Network efficiency. You demand it from your ERP systems

More information

Understanding EMC Avamar with EMC Data Protection Advisor

Understanding EMC Avamar with EMC Data Protection Advisor Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection

More information

CA XOsoft Replication for Windows

CA XOsoft Replication for Windows CA XOsoft Replication for Windows Microsoft SQL Server Operation Guide r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the

More information

SmartSync Backup Efficient NAS-to-NAS backup

SmartSync Backup Efficient NAS-to-NAS backup Allion Ingrasys Europe SmartSync Backup Efficient NAS-to-NAS backup 1. Abstract A common approach to back up data stored in a NAS server is to run backup software on a Windows or UNIX systems and back

More information

Zmanda Cloud Backup Frequently Asked Questions

Zmanda Cloud Backup Frequently Asked Questions Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What

More information

Symantec Backup Exec.cloud

Symantec Backup Exec.cloud Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are

More information

Acronis Backup & Recovery 11.5. Backing Up Microsoft Exchange Server Data

Acronis Backup & Recovery 11.5. Backing Up Microsoft Exchange Server Data Acronis Backup & Recovery 11.5 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. Acronis and Acronis Secure Zone are registered

More information

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised

More information

STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes

STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes June 2011 Table of Contents Overview... 3 Installation Overview... 3 Hosting System Requirements... 4 Recommended

More information

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X Attix5 Pro Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition V6.0 User Manual for Mac OS X Copyright Notice and Proprietary Information All rights reserved. Attix5, 2011 Trademarks

More information

CrashPlan PRO Enterprise Backup

CrashPlan PRO Enterprise Backup CrashPlan PRO Enterprise Backup People Friendly, Enterprise Tough CrashPlan PRO is a high performance, cross-platform backup solution that provides continuous protection onsite, offsite, and online for

More information

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution

More information

Getting Started with ESXi Embedded

Getting Started with ESXi Embedded ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

Cloud Backup Service Service Description. PRECICOM Cloud Hosted Services

Cloud Backup Service Service Description. PRECICOM Cloud Hosted Services Cloud Backup Service Service Description PRECICOM Cloud Hosted Services Table of Contents Table of Contents 2 1. Cloud Backup Service Service Summary 3 2. Cloud Backup Service Service Definition 4 2.1.

More information

simplify monitoring Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures

simplify monitoring Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures simplify monitoring Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures Simplify Monitoring Installation Guide 11.4 (v11.4) Document Date: February 2015 www.tricerat.com

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Update 0 Installation Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for

More information

Quick Start - NetApp File Archiver

Quick Start - NetApp File Archiver Quick Start - NetApp File Archiver TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS GETTING STARTED Upgrade Configuration Archive Recover Page 1 of 14 Overview - NetApp File Archiver Agent TABLE OF CONTENTS

More information

User s Manual. Management Software for Inverter

User s Manual. Management Software for Inverter WatchPower User s Manual Management Software for Inverter Table of Contents 1. WatchPower Overview... 2 1.1. Introduction... 2 1.2. Features... 2 2. WatchPower Install and Uninstall... 2 2.1. System Requirement...

More information

File Protection using rsync. Setup guide

File Protection using rsync. Setup guide File Protection using rsync Setup guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Rsync technology... 3 Terminology... 3 Implementation... 3 3. Rsync data hosts...

More information