EVault Software. Course 361 Protecting Linux and UNIX with EVault

Size: px
Start display at page:

Download "EVault Software. Course 361 Protecting Linux and UNIX with EVault"

Transcription

1 EVault Software Course 361 Protecting Linux and UNIX with EVault

2 Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in This Lab... 3 Exercise 1 Installing EVault Agent on File Server... 4 Exercise 2 Add Agent to CentralControl Exercise 3 Register Agent to Vault Exercise 4 Creating a Backup Job Exercise 5 Scheduling Exercise 6 Run an Ad Hoc (Manual) Backup Exercise 7 Restoring a Single File or Directory Exercise 8 Verify Sample Folder Has Been Restored For Lab Example Only Conclusion Appendix A EVault Software i365, A Seagate Company

3 Objectives Scenario Estimated Time to Complete This Lab In this course, you will learn how to protect Linux/UNIX servers with EVault. This includes backing up and restoring individual files and folders. Installation methods are basically the same no matter whether you re using Linux or UNIX, but the installation packages will vary. The course is composed of a CentOS Linux 5.5 server that we ll protect. EVault supports a handful of various Linux/UNIX versions. There are many out there. Make sure to review the release notes in i365 s download section to ensure that you re installing an Agent on a supported platform. If you don t have a supported version, you can try to backup the system via an NFS mount (Mapping a drive) from a supported OS. 30 Minutes Requirements for This Lab Our Linux Server is running CentOS 5.5 (The unbranded version of RHEL 5.5). On your productions machines, we recommend that all Linux/UNIX Updates have been applied Computers Used in This Lab HQ-Vault DR-Vault LINUX01 3 EVault Software i365, A Seagate Company

4 Exercise 1 Installing EVault Agent on File Server In this step, we will install the EVault Agent to a Linux server that we wish to protect. This will allow us to further configure the protection of our Linux server through CentralControl. Tasks 1. Initial Logon LINUX01 Detailed Steps a. Once the lab starts, within Surgient, click on the Linux_Server and choose VNC. This might take a couple of seconds to spawn the VNC Authentication window. b. On the VNC Authentication window, type evault and click OK. 2. Connect to Download Share and Copy Agent Installer Locally a. For the Agent installer, I ve downloaded them to a share found at \\ \c$\Temp\. Normally you would download the Agent from our Customer Service Portal at or the Partner Portal at https://www.i365.com/partners/portal/partner_login.html. b. To connect to this share, we ll use the mount command. c. At the prompt, type following command on one line: mount o username=traininglab/administrator,password=i365password // /c$/Temp/ /mnt d. At the prompt, type: cd /mnt. This will navigate us to folder that we mounted to. 4 EVault Software i365, A Seagate Company

5 e. At the prompt, type: ls. This display a directory listing of that folder. f. At the prompt, type: cp Agent-Linux tar.gz /root. This will copy the Linux Agent installer to a local folder, /root. g. At the prompt, type: cd /root. This navigates us to the /root folder. 5 EVault Software i365, A Seagate Company

6 h. At the prompt, type: ls. This displays a directory listing of this folder where we can verify that the file was copied over. 3. Extract and Install Agent a. At the prompt, type: tar xfz Agent-Linux tar.gz. This unpacks the Agent install kit. b. At the prompt, type: ls. Again, this displays a directory listing, but we should see in blue the folder that the Agent has extracted to. 6 EVault Software i365, A Seagate Company

7 c. At the prompt, type: cd Agent+WCC Linux-i386-stdc++v3_6. This navigates us to that subfolder. d. At the prompt, type: ls. This displays the contents of this directory. Within the directory, you ll see our install script called install.sh. e. At the prompt, type:./install.sh. This will run the install script. 7 EVault Software i365, A Seagate Company

8 f. When prompted for the Installation directory, press Enter. This will accept the default of installing the Agent under /opt/buagent/. Please be sure you have at least 10% free per the installation partition that you install the Agent on. g. When prompted that /opt/buagent doesn t exist. Create it?, press Enter. This will accept the default of Yes. h. When prompted to Select language, press Enter. This will accept the default of English (US). 8 EVault Software i365, A Seagate Company

9 i. When prompted Do you wish to register to a Web-based Agent Console server, type n, and press Enter. Optionally, you could register to Web CentralControl, but in this lab we will not. j. You ve now completed installing the Linux Agent. The next step is to configure this Agent within Windows CentralControl. 9 EVault Software i365, A Seagate Company

10 Exercise 2 Add Agent to CentralControl In the next steps, we ll add the Agent we just installed to our Windows CentralControl. CentralControl is EVault s Agent Management interface or GUI. We ve already got it installed on HQ-Vault. We ll need to switch to that box. Tasks 1. Switch Machines HQ-Vault Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose HQ- Vault-Server to connect to the HQ-Vault. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. c. On the desktop, double-click EVault Software CentralControl. This is the localized Windows CentralControl. 2. Add Agent to CentralControl a. CentralControl is a place where you can centrally manage your various Agent machines on your network. You can be managing as little as one Agent in CentralControl or you can manage hundreds. b. Right-click the Workspace and choose New Agent... c. For the Description, the best way to describe an Agent machine is by its host name. Type Linux01. d. For the Network Address, this can be one of two things. Either the IP address or the Fully Qualified Domain Name (FQDN). It s preferable to use the FQDN in case of potential IP changes, but this training environment does not have a DNS server. In this lab, we ll use the IP address. Type e. For the Port, we use 2548 or 808 (depending on the Agent version) for connections between CentralControl and the Agent. The Agent listens on this TCP Port. If there are firewalls between the Agent and CentralControl, they should be opened in that direction. For this Agent version, we use port 808, but this will automatically be configured when we click Get Status later. f. For the User name, type root. The user specified here needs to be a member of the root user group. g. For the Password, type I365password. This is the password for our root user. 10 EVault Software i365, A Seagate Company

11 h. Click Save password so you won t have to re-enter the Password in the future. i. For the Domain, we ll leave this field blank. j. Whenever adding Agent to CentralControl, it s always a good idea to click Get Status. This tests our connection to the given Agent. We would receive an error message if it had problems. Click OK. k. On the Agent Properties screen, click OK to finish adding the Agent to CentralControl. 11 EVault Software i365, A Seagate Company

12 l. Now, click File and then Save Workspace. This saves the Agent that we just added so we don t have to type in its information again. m. Next, we need to Register Agent to the Vault. 12 EVault Software i365, A Seagate Company

13 Exercise 3 Register Agent to Vault In this section, you ll learn how to register your Agent to the Vault. For this step, you ll need to know the Vault account credentials. If you own your own Vault, you would ve created an Account within the Director Console. Otherwise, if you don t own your own Vault and backup to a Vault hosted by i365 or an i365 partner, they would ve created the account for you on their Vault. Tasks 1. Detailed Steps a. At this point, you ve installed the Agent and added it to CentralControl. You should now see the Agent in CentralControl. HQ-Vault b. Right-click Linux01, and choose Agent Configuration. 13 EVault Software i365, A Seagate Company

14 c. On the Vaults tab, click New. This is where you make your Vault connections. In this lab, we ll just register to one Vault, but if you were Dual Vaulting, you would need to register to both your local and remote Vaults. For Replication, you only need to register to your primary Vault. 2. Vault Configuration Wizard a. On the Vault Configuration Wizard Welcome screen, click Next >. b. On the Vault Registration screen, select Register as a new computer and click Next >. You ll always want to select Register as a new computer except under a disaster recovery scenario where a system has failed. After replacing a failed system and loading an Agent, you d want to Re-register previously registered computer to pull down previously created job information. 14 EVault Software i365, A Seagate Company

15 c. On the Profile Name screen, type HQ-Vault for the Profile name for the new Vault and click Next >. We recommend you use the machine name or location for the Vault here. It s simply a description but is referenced later when creating a backup job. d. On the Vault Network Address[es] screen, type for the New address and then Add. The address can either be the FQDN or IP Address. FQDN is preferable here due to potential IP changes in the future, but in this example our Linux server does not resolve DNS. e. Click Next >. 15 EVault Software i365, A Seagate Company

16 f. On the Ports screen, click Next >. The Agent communicates on TCP Port 2546 to the Vault. The Vault listens on this port. On your network, please ensure that TCP Port 2546 is open in an outbound direction from the perspective of the Agent. Port 807 is a legacy port that is no longer required for Agent version 4 or higher. g. On the Connection Settings screen, click Next >. 16 EVault Software i365, A Seagate Company

17 Reconnection settings If the Agent were to lose network connection in the middle of a backup, the Agent by default will try to reconnect to the Vault every 3 minutes for a window of 3 hours. If the Agent is able to reconnect in this timeframe, it will continue where it left off. If the window is exhausted, that night s backup will fail. You can change the Reconnection settings here, but the defaults are the recommended settings. Over The Wire Encryption Settings This setting encrypts the network tunnel between the Agent and the Vault. This is very similar in technology to SSL security. When backing up over a public internet connection, it is recommended that you Enable this. If you re backing up over a private network connection, you might choose to Disable this as with any type of encryption with add some overhead for the Agent. Honestly, the overhead is very minimal though. h. On the Authentication screen, we ll enter the EVault account credentials that we would ve created on the Vault or that i365/i365 partner would ve provided for us. Account: Acme User name: evault Password: 1234 i. Click Next >. 17 EVault Software i365, A Seagate Company

18 j. On the Vault Configuration Wizard Finish, click Finish. k. On the Agent Configuration screen, you should now have your HQ-Vault listed. l. Please refer to Appendix A in the back of this guide for information on the other tabs listed in Agent configuration. This covers important topics like setting up Notifications and Customizing Retentions. m. Click OK. 18 EVault Software i365, A Seagate Company

19 Exercise 4 Creating a Backup Job When creating a backup job, you ll select what you want to protect and how you want to protect it. When going through the Wizard, you might have questions about a certain menu item. You can always click the in the upper left hand corner of the screen and then click the item you are curious about. This will give you a description of that item. Tasks 1. Detailed Steps a. When creating the backup job, we ll continue using CentralControl on the HQ- Vault. b. Right click the Agent Linux01, and select New Job HQ-Vault 2. New Job Wizard a. On the New Job Wizard Welcome screen, click Next >. 19 EVault Software i365, A Seagate Company

20 b. On the New Job Wizard Backup Source Type screen, click Next >. c. On the New Job Wizard Vault screen, choose Next >. The Destination displays HQ-Vault. This is the Vault Profile we created in the previous step. 20 EVault Software i365, A Seagate Company

21 d. On the New Job Wizard New Job Name screen, type Data for the Name and click Next >. Here, we ve named our job Data. This will signify backing up data files from the / directory. In this example, we ll backup something small, the /etc/ directory. For Oracle related jobs, we would call my job Oracle. You can use whatever naming scheme makes sense for you. e. On the New Job Wizard Source screen, you can select what you want to backup. Notice that there is no such thing as System State within Linux/UNIX. The system files for these types of operating systems are handled within the normal file structure of Data Fiels. To protect your system from a disaster, you d probably want to backup everything under / and then exclude the EVault Agent directory in /opt/buagent. However, keep in mind, when it comes time to recovery, Linux is not nearly as graceful when recovering to dissimilar hardware. Don't expect to be able to restore / and the system will boot. You ll normally restore application specific directories. f. On the New Job Wizard Source screen, select Data Files and click Add 21 EVault Software i365, A Seagate Company

22 g. On the Include / Exclude screen, expand / and select etc. We re just going to backup this small folder. In your production environment, if you re unsure of what to protect, include / and exclude /opt/buagent/. Whenever including a directory that would include the EVault Agent directory, it s a best practice to exclude the EVault directory. In this case, /opt/buagent/. h. On the Return Files screen, click OK. We ll be doing a recursive backup of the entire directory so it really doesn t matter which option we choose. i. With the etc folder still highlighted, click Include. 22 EVault Software i365, A Seagate Company

23 j. On the Confirm Include screen, click Yes. Recursive means to backup the selected drive/folder and all of its subfolders. This is also where you can setup filters to only backup certain files/folders or extentions. k. On the Include / Exclude screen, click OK. l. On the New Job Wizard Source screen, select System State and click Next >. 23 EVault Software i365, A Seagate Company

24 m. On the New Job Wizard screen click Next >. Here you can change things like the default backup window. For these items, select the if you have questions. Other than the default backup window, we recommend leaving the other options defaulted. n. On the New Job Wizard Encryption screen: This is where you can choose to protect your data by password protecting it. If you ve set a password, upon recovery, you will be prompted for this password. Any encryption change after the initial backup will result in a reseed of data. This means you will be storing double the amount of data than you should be on the EDPM appliance. Encryption changes include: Changing encryption types Changing encryption passwords Changing encryption types Change from no encryption to use encryption or vice versa Please make sure to keep your encryption password in a safe place. If you lose your encryption password, i365 will not be able to recover it for you. This means you will not be able to restore your data without the correct password. 24 EVault Software i365, A Seagate Company

25 In this example, for the Encryption type, please select AES 128 bit. For the password, we ll set the Password and Confirm Password to test and click Next >. o. On the New Job Wizard Log, click Next >. By default Log detail level is set to Summary. This will report any Errors or Warnings encountered. Otherwise, you can increase the verbosity by increasing the detail to either File or Director to report every file or directory backed up. Increasing this setting will create larger log files and should not be changed unless absolutely necessary. 25 EVault Software i365, A Seagate Company

26 p. On the New Job Wizard Finished screen, click Finish to Just exit from this wizard. q. You ve now completed creating your Job. This next step is to schedule your job so that it will run automatically. 26 EVault Software i365, A Seagate Company

27 Exercise 5 Scheduling In this section, we ll schedule the Job that you created earlier. Please refer to EVault Course 412 Scheduling Backups with EVault for general guidelines for scheduling your backups. Tasks 1. Detailed Steps a. In CentralControl, right-click Linux01 and select Schedule Entries HQ-Vault b. On the Schedule List screen: This is where we can define a schedule such that our backups will run on automatic basis. In this example, we ll schedule the following: i. Daily M F 8PM ii. Weekly Sat 8PM iii. Monthly 1 st 8PM Per Best Practices, we ll schedule the Longest retention first so that it is at the Top. Longest retention in this case being Monthly. You can always reorder them in this list if you had done it wrong. We ll need to schedule each retention separately. We ll start with the Monthly. 2. Schedule Monthly Backup a. On the Schedule List screen, click New 27 EVault Software i365, A Seagate Company

28 b. On the Schedule Wizard Welcome screen, click Next >. c. On the Schedule Wizard Command screen, click Next >. We re accepting the default to schedule a Backup. Otherwise, you can schedule a Synchronize or Custom command. Notice, you can not schedule a restore by default. A scheduled restore would need to be scripted. d. On the Schedule Wizard Job List, select the Data job and click Next >. 28 EVault Software i365, A Seagate Company

29 e. On the Schedule Wizard Retention screen, select Monthly for the Retention Scheme and select Next >. f. On the Schedule Wizard Options screen, click Next >. We ve seen these options before when creating the Job. Here you can change things like the backup time window for this particular retention. g. On the Schedule Wizard Command Cycle screen, select Monthly for the Command cycle and click Next >. This is because we want to choose which day of the month we want to run our Monthly backup. 29 EVault Software i365, A Seagate Company

30 h. On the Schedule Wizard Monthly screen, type 8:00 for the Start time and click Next >. For the Days of Month, you can type in any value between 1-31 and the backup will run that day. If you want to run the backup on the last day of the month, you would type LAST into the Days of Month field. This is not case sensitive. i. On the Schedule Wizard Finish screen, click Finish. j. You ve now completed scheduling the Monthly backup. You still need to complete the Weekly and Daily. 3. Schedule Weekly Backup a. On the Schedule List screen, click New 30 EVault Software i365, A Seagate Company

31 b. On the Schedule Wizard Screen click Next >. c. On the Schedule Wizard Command screen, click Next >. d. On the Schedule Wizard Job List screen, select the Data Job and click Next >. e. On the Schedule Wizard Retention screen, select Weekly for the Retention Scheme and click Next >. 31 EVault Software i365, A Seagate Company

32 f. On the Schedule Wizard Options screen, leave the defaults and click Next >. g. On the Schedule Wizard Command Cycle screen, select Weekly for the Command Cycle and click Next >. h. On the Schedule Wizard Weekly screen: Check Saturday and deselect the rest of the Days. Change the Start Time, type 8:00. Click Next >. 32 EVault Software i365, A Seagate Company

33 i. On the Schedule Wizard Finish screen, click Finish. 4. Schedule Daily Backup j. You ve now finished scheduling the Monthly and Weekly backups. That leaves us just the Daily. a. On the Schedule List screen, click New b. On the Schedule Wizard Screen click Next >. c. On the Schedule Wizard Command screen, click Next >. 33 EVault Software i365, A Seagate Company

34 d. On the Schedule Wizard Job List screen, select the Data Job and click Next >. e. On the Schedule Wizard Retention screen, select Daily for the Retention Scheme and click Next >. f. On the Schedule Wizard Options screen, leave the defaults and click Next >. g. On the Schedule Wizard Command Cycle screen, select Weekly for the Command Cycle and click Next >. 34 EVault Software i365, A Seagate Company

35 h. On the Schedule Wizard Weekly screen: Make sure that Monday, Tuesday, Wednesday, Thursday, and Friday are selected. Change the Start Time, type 8:00. Click Next >. i. On the Schedule Wizard Finish screen, click Finish. j. You ve now finished scheduling the job. On the Schedule List screen, click OK, but make sure that your schedule list looks like the following screenshot. 35 EVault Software i365, A Seagate Company

36 Exercise 6 Run an Ad Hoc (Manual) Backup Normally, you would allow the backup to run per its schedule, but for this lab, we ll run an ad hoc backup so that we can restore immediately. Tasks 1. Detailed Steps a. In CentralControl, right-click Data under Linux01 and select Backup HQ-Vault b. On the Data: Backup Wizard Welcome screen, click Next >. c. On the Data: Backup Wizard Destination screen, click Backup Now. The default backup destination is to your Vault, but you have options to backup to Directory on Disk (USB) for seeding purposes. Just note that USB backups are intended to be imported into the Vault. 36 EVault Software i365, A Seagate Company

37 d. On the Process Information screen, wait for the Status to say Backup Completed and click Close. This backup will take several minutes to complete. e. You ve now completed the seed. Subsequent backups should be even quicker. 37 EVault Software i365, A Seagate Company

38 Exercise 7 Restoring a Single File or Directory In the following steps, you ll learn to restore a single file or directory using EVault. Tasks 1. Detailed Steps a. In the CentralControl, right click the Data Job under Linux01 and choose Restore HQ-Vault b. On the Restore Wizard Welcome screen, click Next >. c. On the Restore Wizard (safeset ) Select a Source screen, click Next >. This is where you can choose from which safeset you d like to restore from. 38 EVault Software i365, A Seagate Company

39 d. On the Restore Wizard (safeset ) Encryption Options screen, type test for the Password and Verify password and click Next >. This is the encryption password we had set earlier when creating the Job. e. On the Restore Wizard (safeset ) Select Restore Objects screen, click Data Files and click Add f. On the Include / Exclude screen, Expand Expand / Select etc Click Include 39 EVault Software i365, A Seagate Company

40 g. On the Confirm Include screen, click Yes. h. On the Include / Exclude screen, click OK. i. On the Restore Wizard (safeset ) Select Restore Objects screen, click Next >. 40 EVault Software i365, A Seagate Company

41 j. On the Restore Wizard (safeset ) Destination Options screen, select Restore files to an alternate location, type /restore, and click Next >. When choosing to restore either to an original or alternate location, that location will always be on the Agent machine currently focused on in CentralControl. At the bottom, you have options for if a file already exists. You have options to overwrite files, rename files, etc. k. On the Restore Wizard (safeset ) Advanced Restore Options screen, click Next >. 41 EVault Software i365, A Seagate Company

42 Do you wish to overwrite files even if they are locked by another process? Typically we only choose Yes to this option if we re doing a full system recovery where we d be overwriting locked files system directories. Otherwise, leaving the default of No, do not restore locked files is typical for normal, non-dr restores. What do you wish to restore? EVault allows you to potentially recover data that was backed up by a different Operating System. EVault backs up data in two different streams: a Header stream and a Data stream. The Header has your various file permissions/attributes while the Data stream has your actual data. In most cases, if you re restoring to similar Operating Systems (such as Windows to Windows), you want to restore All streams to get back your data along with the header. If you wish to restore cross platform (such as Novell to Windows), you ll want to restore Data streams only because Windows won t be able to recognize the things like file permissions for Novell. In this case, the file being recovered will acquire the default permissions for whatever folder you are recovering to. l. On the Restore Wizard (safeset ) Finish screen, click Finish 42 EVault Software i365, A Seagate Company

43 m. On the Process Information screen, wait for the Status to say Restore completed and click Close. n. You ve just learned how to restore an individual directory using EVault. The process to restore a file is very similar, and you can feel free to try on your own in this lab. In the next step, we ll simply check our work to make sure that the folder has been restored on Linux EVault Software i365, A Seagate Company

44 Exercise 8 Verify Sample Folder Has Been Restored For Lab Example Only For this exercise, we ll switch back to Linux01 and verify that the contents of the etc folder have been restored to /restore.ls Tasks 1. Switch Machines LINUX01 Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose Linux_Server to connect back to the Linux01 server. b. The system should automatically log you in, but if you are prompted for login, below are the VNC credentials. Password evault. 2. Verify Sample Folder Has Been Restored a. In the Terminal window, type cd /restore b. Display the contents of this directory. These are the files restored from the etc directory. Type ls la 44 EVault Software i365, A Seagate Company

45 Conclusion In this lab, you learned how to install and configure a Linux Agent. You ve also learned how to restore an individual file and folders. Hopefully you have a better understanding of how to protect a Linux / UNIX system using EVault. Please feel free to do further testing in your training lab. If you had already taken some of the Windows Agent labs before this, hopefully, you see that the configuration of this Agent is basically the same with the exception of the actual Agent installation. For further information about EVault, you can always check our knowledge base and library of user guides available at You can always send comments and suggestions for this training module to or for support related issues you can contact us at 45 EVault Software i365, A Seagate Company

46 Appendix A In this section, we ll discuss some of the settings found within Agent Configuration in CentralControl. Items like notifications and retentions should be reviewed on every implementation. In this example, we ll assume you ve completed all of the above exercises. Tasks 1. Switch Machines HQ-Vault Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose HQ- Vault-Server to connect to the HQ-Vault. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. c. On the desktop, double-click EVault Software CentralControl. This is the localized Windows CentralControl. 2. Open Agent Configuration a. Right-click Linux01 and choose Agent Configuration. 3. Vaults Tab a. On the Vaults tab, you can modify existing Vault profiles are add additional Vault Connections. If you were to choose to Dual Vault, you would need t a second Vault profile created here. 46 EVault Software i365, A Seagate Company

47 4. Retentions Tab a. On the Retentions tab, you can modify existing retentions or create new retentions to meet your business and compliance needs. Please review the course titled EVault - Course 411 (Understanding EVault Retentions) for more information. 5. Open File Tab a. On the Open File tab, everything is greyed out. Our standard Agent can handle open files on a Linux/UNIX system. However, for database backups, we still recommend that you perform database dumps of the various mission critical databases. 47 EVault Software i365, A Seagate Company

48 6. Notification Tab a. On the Notifications tab, you should always have s sent when there s a failure. It s up to you if you want s sent on error or success as well. You will need to fill out the settings according to your environment. EVault sends its notifications similar to an anonymous (sendmail). If you need to provide an authenticated an account, you can do so at the bottom. I ve filled out some fictitious information below. 7. Advanced Tab a. On the Advanced tab, you can change: Execution priority (CPU priority) Recommend leaving at the default but you have options to change the settings here. Bandwidth This is where you can set bandwidth throttling. Bandwidth throttling is on a per Agent basis and does not take into account other Agents sharing a network connection. If you need to have throttling on a site basis, you should use Quality of Service on your Firewall and throttle TCP port 2546 as a bulk item. This is the port that backup traffic traverses across. 48 EVault Software i365, A Seagate Company

EVault Software. Course 301 Server Protection with EVault File and System State

EVault Software. Course 301 Server Protection with EVault File and System State EVault Software Course 301 Server Protection with EVault File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers

More information

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...

More information

EVault Software. Course 321 Protecting Exchange Server with EVault Exchange Plug-In

EVault Software. Course 321 Protecting Exchange Server with EVault Exchange Plug-In EVault Software Course 321 Protecting Exchange Server with EVault Exchange Plug-In Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...

More information

EVault Software. Course 311 Protecting SQL Server with EVault SQL Plug-In

EVault Software. Course 311 Protecting SQL Server with EVault SQL Plug-In EVault Software Course 311 Protecting SQL Server with EVault SQL Plug-In Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers

More information

EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State

EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State EVault for Data Protection Manager Course 301 Server Protection with DPM File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for

More information

EVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM

EVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM EVault for Data Protection Manager Course 321 Protecting Exchange 2010 with DPM Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers

More information

EVault for Data Protection Manager. Course 401 EDPM Troubleshooting Basics

EVault for Data Protection Manager. Course 401 EDPM Troubleshooting Basics EVault for Data Protection Manager Course 401 EDPM Troubleshooting Basics Table of Contents Objectives... 3 Scenario... 3 Level 1 Support Expectations Rules of Engagement... 4 Online Resources... 5 i365

More information

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20 Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup

More information

SmartFiler Backup Appliance User Guide 2.0

SmartFiler Backup Appliance User Guide 2.0 SmartFiler Backup Appliance User Guide 2.0 SmartFiler Backup Appliance User Guide 1 Table of Contents Overview... 5 Solution Overview... 5 SmartFiler Backup Appliance Overview... 5 Getting Started... 7

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

Quick Start Guide. Apptix Online Backup by Mozy (AOBM) Live Support: 866-461-0851

Quick Start Guide. Apptix Online Backup by Mozy (AOBM) Live Support: 866-461-0851 Quick Start Guide (AOBM) Live Support: 866-461-0851 Quick Start Guide Page 2 of 16 Quick Start Guide Overview Other Guides & Training Resources Admin Guide... [76 Page PDF] Client Software User Guide [46

More information

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816. RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...

More information

ReadyNAS Setup Manual

ReadyNAS Setup Manual ReadyNAS Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA October 2007 208-10163-01 v1.0 2007 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

ShadowControl ShadowStream

ShadowControl ShadowStream ShadowControl ShadowStream Revision 1.3 4/12/2012 Table of Contents Introduction... 3 Download ShadowStream Server... 3 Installation... 4 Configuration... 5 Creating Users... 6 Testing the User Rights...

More information

Remote Drive PC Client software User Guide

Remote Drive PC Client software User Guide Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files

More information

Tharo Systems, Inc. 2866 Nationwide Parkway P.O. Box 798 Brunswick, OH 44212 USA Tel: 330.273.4408 Fax: 330.225.0099

Tharo Systems, Inc. 2866 Nationwide Parkway P.O. Box 798 Brunswick, OH 44212 USA Tel: 330.273.4408 Fax: 330.225.0099 Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation

More information

READYNAS INSTANT STORAGE. Quick Installation Guide

READYNAS INSTANT STORAGE. Quick Installation Guide READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

Laptop Backup - Administrator Guide (Windows)

Laptop Backup - Administrator Guide (Windows) Laptop Backup - Administrator Guide (Windows) Page 1 of 86 Page 2 of 86 Laptop Backup - Administrator Guide (Windows) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Online Backup Linux Client User Manual

Online Backup Linux Client User Manual Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Using iscsi with BackupAssist. User Guide

Using iscsi with BackupAssist. User Guide User Guide Contents 1. Introduction... 2 Documentation... 2 Terminology... 2 Advantages of iscsi... 2 Supported environments... 2 2. Overview... 3 About iscsi... 3 iscsi best practices with BackupAssist...

More information

Online Backup Client User Manual

Online Backup Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Acronis Backup & Recovery 11.5 Quick Start Guide

Acronis Backup & Recovery 11.5 Quick Start Guide Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server

More information

Signiant Agent installation

Signiant Agent installation Signiant Agent installation Release 11.3.0 March 2015 ABSTRACT Guidelines to install the Signiant Agent software for the WCPApp. The following instructions are adapted from the Signiant original documentation

More information

EVault Software Agent 6.73 for Linux and Oracle Plug-In Guide November 2010

EVault Software Agent 6.73 for Linux and Oracle Plug-In Guide November 2010 EVault Software Agent 6.73 for Linux and Oracle Plug-In Guide November 2010 This document describes how to install and use the EVault Software Agent 6.73 for Linux and Oracle Plug-In for backup and restore

More information

Team Foundation Server 2012 Installation Guide

Team Foundation Server 2012 Installation Guide Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day benday@benday.com v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation

More information

Installation & Configuration Guide

Installation & Configuration Guide EVault InfoStage MS SQL Server Plug-In 4.20 Installation & Configuration Guide June 2003 This manual describes how to install, backup and restore using EVault InfoStage MS SQL Server Plug-In, Version 4.20

More information

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security... Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0 Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE

More information

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip. Reflection DBR USER GUIDE 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Page 1 of 1 Table of Contents Overview 3 Reflection DBR Client and Console Installation 4

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited. 1

More information

Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab

Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab Description In this hands-on session, you will learn how to turn your proxy into a security

More information

Setting up your new Live Server Account

Setting up your new Live Server Account Setting up your new Live Server Account Welcome to Remote Data Backups LiveVault Service. This document will help you set up the agent service on your server as well as giving you some guidance on accessing

More information

Installing SQL Express. For CribMaster 9.2 and Later

Installing SQL Express. For CribMaster 9.2 and Later Installing SQL Express For CribMaster 9.2 and Later CRIBMASTER USER GUIDE Installing SQL Express Document ID: CM9-031-03012012 Copyright CribMaster. 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,

More information

GUARD1 PLUS SE Administrator's Manual

GUARD1 PLUS SE Administrator's Manual GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 info@guard1.com www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

EVault Software Agent for Linux and Oracle Plug-in 8.0 User Guide

EVault Software Agent for Linux and Oracle Plug-in 8.0 User Guide EVault Software Agent for Linux and Oracle Plug-in 8.0 User Guide Revision: This manual has been updated for version 8.0. Software version: 8.0 (October 2015) 2015 EVault Inc. EVault, A Seagate Company,

More information

TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015

TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015 TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015 2201 Thurston Circle Bellevue, NE 68005 www.tigerpawsoftware.com Contents Tigerpaw Exchange Integrator Setup Guide v3.6.0... 1 Contents...

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

EVault Software Microsoft SharePoint 2010/2013 Backup and Restore Guide 7.22

EVault Software Microsoft SharePoint 2010/2013 Backup and Restore Guide 7.22 EVault Software Microsoft SharePoint 2010/2013 Backup and Restore Guide 7.22 Copyright SharePoint Backup and Restore Guide 7.22 Revision: This manual has been created for Version 7.22 (June 2013). Software

More information

IM and Presence Disaster Recovery System

IM and Presence Disaster Recovery System Disaster Recovery System, page 1 Access the Disaster Recovery System, page 2 Back up data in the Disaster Recovery System, page 3 Restore scenarios, page 9 Backup and restore history, page 15 Data authentication

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)

Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Manual installation of agents and importing the SCOM certificate to the servers to be monitored:

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X Attix5 Pro Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition V6.0 User Manual for Mac OS X Copyright Notice and Proprietary Information All rights reserved. Attix5, 2011 Trademarks

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc. with the ArchiveSync Add-On Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 Required Add-Ons for ArchiveSync in Real-Time... 3 Communications

More information

Virto Password Reset Web Part for SharePoint. Release 3.1.0. Installation and User Guide

Virto Password Reset Web Part for SharePoint. Release 3.1.0. Installation and User Guide Virto Password Reset Web Part for SharePoint Release 3.1.0 Installation and User Guide 2 Table of Contents OVERVIEW... 3 SYSTEM REQUIREMENTS... 3 OPERATING SYSTEM... 3 SERVER... 3 BROWSER... 4 INSTALLATION...

More information

Online Backup Client User Manual

Online Backup Client User Manual For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

Configuring Global Protect SSL VPN with a user-defined port

Configuring Global Protect SSL VPN with a user-defined port Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure

More information

Online Backup Client User Manual

Online Backup Client User Manual Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

SAM 8.0 Backup and Restore Guide. SafeNet Integration Guide

SAM 8.0 Backup and Restore Guide. SafeNet Integration Guide SAM 8.0 Backup and Restore Guide SafeNet Integration Guide Revision A November 2012 SAM 8.0 Backup and Restore Guide - SafeNet Integration Guide Introduction Copyright 2012 SafeNet, Inc. All rights reserved.

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide BlackBerry Resource Kit for BlackBerry Enterprise Service 10 Version 10.2 Published: 2015-11-12 SWD-20151112124827386 Contents Overview: BlackBerry Enterprise Service

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading

More information

Cisco Unified CM Disaster Recovery System

Cisco Unified CM Disaster Recovery System Disaster Recovery System, page 1 Quick-Reference Tables for Backup and Restore s, page 3 Supported Features and Components, page 4 System Requirements, page 5 Log In to Disaster Recovery System, page 7

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.

More information

Team Foundation Server 2013 Installation Guide

Team Foundation Server 2013 Installation Guide Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day benday@benday.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

AXIGEN Mail Server. Quick Installation and Configuration Guide. Product version: 6.1 Document version: 1.0

AXIGEN Mail Server. Quick Installation and Configuration Guide. Product version: 6.1 Document version: 1.0 AXIGEN Mail Server Quick Installation and Configuration Guide Product version: 6.1 Document version: 1.0 Last Updated on: May 28, 2008 Chapter 1: Introduction... 3 Welcome... 3 Purpose of this document...

More information

CASHNet Secure File Transfer Instructions

CASHNet Secure File Transfer Instructions CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in

More information

Gladinet Cloud Backup V3.0 User Guide

Gladinet Cloud Backup V3.0 User Guide Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet

More information

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X VirtualDesktopServer Contents 1 2X VirtualDesktopServer Contents 2 URL: www.2x.com E-mail: info@2x.com Information in this document

More information

Appendix B Lab Setup Guide

Appendix B Lab Setup Guide JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

NovaBACKUP. User Manual. NovaStor / November 2011

NovaBACKUP. User Manual. NovaStor / November 2011 NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without

More information

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution

More information

Upgrade ProTracker Advantage Access database to a SQL database

Upgrade ProTracker Advantage Access database to a SQL database Many of our customers run the process themselves with great success. We are available to run the process for you or we can be available on standby from 9:00-5:00(Eastern) to provide assistance if needed.

More information

BorderGuard Client. Version 4.4. November 2013

BorderGuard Client. Version 4.4. November 2013 BorderGuard Client Version 4.4 November 2013 Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, Virginia 20151 703-631-0700 WWW.BLUERIDGENETWORKS.COM All Products are provided with RESTRICTED

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Avalanche Remote Control User Guide. Version 4.1.3

Avalanche Remote Control User Guide. Version 4.1.3 Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

McAfee SMC Installation Guide 5.7. Security Management Center

McAfee SMC Installation Guide 5.7. Security Management Center McAfee SMC Installation Guide 5.7 Security Management Center Legal Information The use of the products described in these materials is subject to the then current end-user license agreement, which can

More information

1-bay NAS User Guide

1-bay NAS User Guide 1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...

More information

MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.

MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6. STUDENT ACTIVITY 6.1: UNDERSTAND BACKUP AND RECOVERY METHODS MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.1 Lesson

More information

Lab 8: Configuring Backups

Lab 8: Configuring Backups CompTIA Security+ Lab Series Lab 8: Configuring Backups CompTIA Security+ Domain 2 - Compliance and Operational Security Objective 2.7: Execute disaster recovery plans and procedures Document Version:

More information

Cloud Backup Express

Cloud Backup Express Cloud Backup Express Table of Contents Installation and Configuration Workflow for RFCBx... 3 Cloud Management Console Installation Guide for Windows... 4 1: Run the Installer... 4 2: Choose Your Language...

More information

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

RSA Authentication Manager 8.1 Virtual Appliance Getting Started RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides

More information

Management Utilities Configuration for UAC Environments

Management Utilities Configuration for UAC Environments Management Utilities Configuration for UAC Environments For optimal use of SyAM Management Utilities, Windows client machines should be configured with User Account Control disabled or set to the least

More information