EVault Software. Course 361 Protecting Linux and UNIX with EVault

Size: px
Start display at page:

Download "EVault Software. Course 361 Protecting Linux and UNIX with EVault"

Transcription

1 EVault Software Course 361 Protecting Linux and UNIX with EVault

2 Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in This Lab... 3 Exercise 1 Installing EVault Agent on File Server... 4 Exercise 2 Add Agent to CentralControl Exercise 3 Register Agent to Vault Exercise 4 Creating a Backup Job Exercise 5 Scheduling Exercise 6 Run an Ad Hoc (Manual) Backup Exercise 7 Restoring a Single File or Directory Exercise 8 Verify Sample Folder Has Been Restored For Lab Example Only Conclusion Appendix A EVault Software i365, A Seagate Company

3 Objectives Scenario Estimated Time to Complete This Lab In this course, you will learn how to protect Linux/UNIX servers with EVault. This includes backing up and restoring individual files and folders. Installation methods are basically the same no matter whether you re using Linux or UNIX, but the installation packages will vary. The course is composed of a CentOS Linux 5.5 server that we ll protect. EVault supports a handful of various Linux/UNIX versions. There are many out there. Make sure to review the release notes in i365 s download section to ensure that you re installing an Agent on a supported platform. If you don t have a supported version, you can try to backup the system via an NFS mount (Mapping a drive) from a supported OS. 30 Minutes Requirements for This Lab Our Linux Server is running CentOS 5.5 (The unbranded version of RHEL 5.5). On your productions machines, we recommend that all Linux/UNIX Updates have been applied Computers Used in This Lab HQ-Vault DR-Vault LINUX01 3 EVault Software i365, A Seagate Company

4 Exercise 1 Installing EVault Agent on File Server In this step, we will install the EVault Agent to a Linux server that we wish to protect. This will allow us to further configure the protection of our Linux server through CentralControl. Tasks 1. Initial Logon LINUX01 Detailed Steps a. Once the lab starts, within Surgient, click on the Linux_Server and choose VNC. This might take a couple of seconds to spawn the VNC Authentication window. b. On the VNC Authentication window, type evault and click OK. 2. Connect to Download Share and Copy Agent Installer Locally a. For the Agent installer, I ve downloaded them to a share found at \\ \c$\Temp\. Normally you would download the Agent from our Customer Service Portal at or the Partner Portal at b. To connect to this share, we ll use the mount command. c. At the prompt, type following command on one line: mount o username=traininglab/administrator,password=i365password // /c$/Temp/ /mnt d. At the prompt, type: cd /mnt. This will navigate us to folder that we mounted to. 4 EVault Software i365, A Seagate Company

5 e. At the prompt, type: ls. This display a directory listing of that folder. f. At the prompt, type: cp Agent-Linux tar.gz /root. This will copy the Linux Agent installer to a local folder, /root. g. At the prompt, type: cd /root. This navigates us to the /root folder. 5 EVault Software i365, A Seagate Company

6 h. At the prompt, type: ls. This displays a directory listing of this folder where we can verify that the file was copied over. 3. Extract and Install Agent a. At the prompt, type: tar xfz Agent-Linux tar.gz. This unpacks the Agent install kit. b. At the prompt, type: ls. Again, this displays a directory listing, but we should see in blue the folder that the Agent has extracted to. 6 EVault Software i365, A Seagate Company

7 c. At the prompt, type: cd Agent+WCC Linux-i386-stdc++v3_6. This navigates us to that subfolder. d. At the prompt, type: ls. This displays the contents of this directory. Within the directory, you ll see our install script called install.sh. e. At the prompt, type:./install.sh. This will run the install script. 7 EVault Software i365, A Seagate Company

8 f. When prompted for the Installation directory, press Enter. This will accept the default of installing the Agent under /opt/buagent/. Please be sure you have at least 10% free per the installation partition that you install the Agent on. g. When prompted that /opt/buagent doesn t exist. Create it?, press Enter. This will accept the default of Yes. h. When prompted to Select language, press Enter. This will accept the default of English (US). 8 EVault Software i365, A Seagate Company

9 i. When prompted Do you wish to register to a Web-based Agent Console server, type n, and press Enter. Optionally, you could register to Web CentralControl, but in this lab we will not. j. You ve now completed installing the Linux Agent. The next step is to configure this Agent within Windows CentralControl. 9 EVault Software i365, A Seagate Company

10 Exercise 2 Add Agent to CentralControl In the next steps, we ll add the Agent we just installed to our Windows CentralControl. CentralControl is EVault s Agent Management interface or GUI. We ve already got it installed on HQ-Vault. We ll need to switch to that box. Tasks 1. Switch Machines HQ-Vault Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose HQ- Vault-Server to connect to the HQ-Vault. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. c. On the desktop, double-click EVault Software CentralControl. This is the localized Windows CentralControl. 2. Add Agent to CentralControl a. CentralControl is a place where you can centrally manage your various Agent machines on your network. You can be managing as little as one Agent in CentralControl or you can manage hundreds. b. Right-click the Workspace and choose New Agent... c. For the Description, the best way to describe an Agent machine is by its host name. Type Linux01. d. For the Network Address, this can be one of two things. Either the IP address or the Fully Qualified Domain Name (FQDN). It s preferable to use the FQDN in case of potential IP changes, but this training environment does not have a DNS server. In this lab, we ll use the IP address. Type e. For the Port, we use 2548 or 808 (depending on the Agent version) for connections between CentralControl and the Agent. The Agent listens on this TCP Port. If there are firewalls between the Agent and CentralControl, they should be opened in that direction. For this Agent version, we use port 808, but this will automatically be configured when we click Get Status later. f. For the User name, type root. The user specified here needs to be a member of the root user group. g. For the Password, type I365password. This is the password for our root user. 10 EVault Software i365, A Seagate Company

11 h. Click Save password so you won t have to re-enter the Password in the future. i. For the Domain, we ll leave this field blank. j. Whenever adding Agent to CentralControl, it s always a good idea to click Get Status. This tests our connection to the given Agent. We would receive an error message if it had problems. Click OK. k. On the Agent Properties screen, click OK to finish adding the Agent to CentralControl. 11 EVault Software i365, A Seagate Company

12 l. Now, click File and then Save Workspace. This saves the Agent that we just added so we don t have to type in its information again. m. Next, we need to Register Agent to the Vault. 12 EVault Software i365, A Seagate Company

13 Exercise 3 Register Agent to Vault In this section, you ll learn how to register your Agent to the Vault. For this step, you ll need to know the Vault account credentials. If you own your own Vault, you would ve created an Account within the Director Console. Otherwise, if you don t own your own Vault and backup to a Vault hosted by i365 or an i365 partner, they would ve created the account for you on their Vault. Tasks 1. Detailed Steps a. At this point, you ve installed the Agent and added it to CentralControl. You should now see the Agent in CentralControl. HQ-Vault b. Right-click Linux01, and choose Agent Configuration. 13 EVault Software i365, A Seagate Company

14 c. On the Vaults tab, click New. This is where you make your Vault connections. In this lab, we ll just register to one Vault, but if you were Dual Vaulting, you would need to register to both your local and remote Vaults. For Replication, you only need to register to your primary Vault. 2. Vault Configuration Wizard a. On the Vault Configuration Wizard Welcome screen, click Next >. b. On the Vault Registration screen, select Register as a new computer and click Next >. You ll always want to select Register as a new computer except under a disaster recovery scenario where a system has failed. After replacing a failed system and loading an Agent, you d want to Re-register previously registered computer to pull down previously created job information. 14 EVault Software i365, A Seagate Company

15 c. On the Profile Name screen, type HQ-Vault for the Profile name for the new Vault and click Next >. We recommend you use the machine name or location for the Vault here. It s simply a description but is referenced later when creating a backup job. d. On the Vault Network Address[es] screen, type for the New address and then Add. The address can either be the FQDN or IP Address. FQDN is preferable here due to potential IP changes in the future, but in this example our Linux server does not resolve DNS. e. Click Next >. 15 EVault Software i365, A Seagate Company

16 f. On the Ports screen, click Next >. The Agent communicates on TCP Port 2546 to the Vault. The Vault listens on this port. On your network, please ensure that TCP Port 2546 is open in an outbound direction from the perspective of the Agent. Port 807 is a legacy port that is no longer required for Agent version 4 or higher. g. On the Connection Settings screen, click Next >. 16 EVault Software i365, A Seagate Company

17 Reconnection settings If the Agent were to lose network connection in the middle of a backup, the Agent by default will try to reconnect to the Vault every 3 minutes for a window of 3 hours. If the Agent is able to reconnect in this timeframe, it will continue where it left off. If the window is exhausted, that night s backup will fail. You can change the Reconnection settings here, but the defaults are the recommended settings. Over The Wire Encryption Settings This setting encrypts the network tunnel between the Agent and the Vault. This is very similar in technology to SSL security. When backing up over a public internet connection, it is recommended that you Enable this. If you re backing up over a private network connection, you might choose to Disable this as with any type of encryption with add some overhead for the Agent. Honestly, the overhead is very minimal though. h. On the Authentication screen, we ll enter the EVault account credentials that we would ve created on the Vault or that i365/i365 partner would ve provided for us. Account: Acme User name: evault Password: 1234 i. Click Next >. 17 EVault Software i365, A Seagate Company

18 j. On the Vault Configuration Wizard Finish, click Finish. k. On the Agent Configuration screen, you should now have your HQ-Vault listed. l. Please refer to Appendix A in the back of this guide for information on the other tabs listed in Agent configuration. This covers important topics like setting up Notifications and Customizing Retentions. m. Click OK. 18 EVault Software i365, A Seagate Company

19 Exercise 4 Creating a Backup Job When creating a backup job, you ll select what you want to protect and how you want to protect it. When going through the Wizard, you might have questions about a certain menu item. You can always click the in the upper left hand corner of the screen and then click the item you are curious about. This will give you a description of that item. Tasks 1. Detailed Steps a. When creating the backup job, we ll continue using CentralControl on the HQ- Vault. b. Right click the Agent Linux01, and select New Job HQ-Vault 2. New Job Wizard a. On the New Job Wizard Welcome screen, click Next >. 19 EVault Software i365, A Seagate Company

20 b. On the New Job Wizard Backup Source Type screen, click Next >. c. On the New Job Wizard Vault screen, choose Next >. The Destination displays HQ-Vault. This is the Vault Profile we created in the previous step. 20 EVault Software i365, A Seagate Company

21 d. On the New Job Wizard New Job Name screen, type Data for the Name and click Next >. Here, we ve named our job Data. This will signify backing up data files from the / directory. In this example, we ll backup something small, the /etc/ directory. For Oracle related jobs, we would call my job Oracle. You can use whatever naming scheme makes sense for you. e. On the New Job Wizard Source screen, you can select what you want to backup. Notice that there is no such thing as System State within Linux/UNIX. The system files for these types of operating systems are handled within the normal file structure of Data Fiels. To protect your system from a disaster, you d probably want to backup everything under / and then exclude the EVault Agent directory in /opt/buagent. However, keep in mind, when it comes time to recovery, Linux is not nearly as graceful when recovering to dissimilar hardware. Don't expect to be able to restore / and the system will boot. You ll normally restore application specific directories. f. On the New Job Wizard Source screen, select Data Files and click Add 21 EVault Software i365, A Seagate Company

22 g. On the Include / Exclude screen, expand / and select etc. We re just going to backup this small folder. In your production environment, if you re unsure of what to protect, include / and exclude /opt/buagent/. Whenever including a directory that would include the EVault Agent directory, it s a best practice to exclude the EVault directory. In this case, /opt/buagent/. h. On the Return Files screen, click OK. We ll be doing a recursive backup of the entire directory so it really doesn t matter which option we choose. i. With the etc folder still highlighted, click Include. 22 EVault Software i365, A Seagate Company

23 j. On the Confirm Include screen, click Yes. Recursive means to backup the selected drive/folder and all of its subfolders. This is also where you can setup filters to only backup certain files/folders or extentions. k. On the Include / Exclude screen, click OK. l. On the New Job Wizard Source screen, select System State and click Next >. 23 EVault Software i365, A Seagate Company

24 m. On the New Job Wizard screen click Next >. Here you can change things like the default backup window. For these items, select the if you have questions. Other than the default backup window, we recommend leaving the other options defaulted. n. On the New Job Wizard Encryption screen: This is where you can choose to protect your data by password protecting it. If you ve set a password, upon recovery, you will be prompted for this password. Any encryption change after the initial backup will result in a reseed of data. This means you will be storing double the amount of data than you should be on the EDPM appliance. Encryption changes include: Changing encryption types Changing encryption passwords Changing encryption types Change from no encryption to use encryption or vice versa Please make sure to keep your encryption password in a safe place. If you lose your encryption password, i365 will not be able to recover it for you. This means you will not be able to restore your data without the correct password. 24 EVault Software i365, A Seagate Company

25 In this example, for the Encryption type, please select AES 128 bit. For the password, we ll set the Password and Confirm Password to test and click Next >. o. On the New Job Wizard Log, click Next >. By default Log detail level is set to Summary. This will report any Errors or Warnings encountered. Otherwise, you can increase the verbosity by increasing the detail to either File or Director to report every file or directory backed up. Increasing this setting will create larger log files and should not be changed unless absolutely necessary. 25 EVault Software i365, A Seagate Company

26 p. On the New Job Wizard Finished screen, click Finish to Just exit from this wizard. q. You ve now completed creating your Job. This next step is to schedule your job so that it will run automatically. 26 EVault Software i365, A Seagate Company

27 Exercise 5 Scheduling In this section, we ll schedule the Job that you created earlier. Please refer to EVault Course 412 Scheduling Backups with EVault for general guidelines for scheduling your backups. Tasks 1. Detailed Steps a. In CentralControl, right-click Linux01 and select Schedule Entries HQ-Vault b. On the Schedule List screen: This is where we can define a schedule such that our backups will run on automatic basis. In this example, we ll schedule the following: i. Daily M F 8PM ii. Weekly Sat 8PM iii. Monthly 1 st 8PM Per Best Practices, we ll schedule the Longest retention first so that it is at the Top. Longest retention in this case being Monthly. You can always reorder them in this list if you had done it wrong. We ll need to schedule each retention separately. We ll start with the Monthly. 2. Schedule Monthly Backup a. On the Schedule List screen, click New 27 EVault Software i365, A Seagate Company

28 b. On the Schedule Wizard Welcome screen, click Next >. c. On the Schedule Wizard Command screen, click Next >. We re accepting the default to schedule a Backup. Otherwise, you can schedule a Synchronize or Custom command. Notice, you can not schedule a restore by default. A scheduled restore would need to be scripted. d. On the Schedule Wizard Job List, select the Data job and click Next >. 28 EVault Software i365, A Seagate Company

29 e. On the Schedule Wizard Retention screen, select Monthly for the Retention Scheme and select Next >. f. On the Schedule Wizard Options screen, click Next >. We ve seen these options before when creating the Job. Here you can change things like the backup time window for this particular retention. g. On the Schedule Wizard Command Cycle screen, select Monthly for the Command cycle and click Next >. This is because we want to choose which day of the month we want to run our Monthly backup. 29 EVault Software i365, A Seagate Company

30 h. On the Schedule Wizard Monthly screen, type 8:00 for the Start time and click Next >. For the Days of Month, you can type in any value between 1-31 and the backup will run that day. If you want to run the backup on the last day of the month, you would type LAST into the Days of Month field. This is not case sensitive. i. On the Schedule Wizard Finish screen, click Finish. j. You ve now completed scheduling the Monthly backup. You still need to complete the Weekly and Daily. 3. Schedule Weekly Backup a. On the Schedule List screen, click New 30 EVault Software i365, A Seagate Company

31 b. On the Schedule Wizard Screen click Next >. c. On the Schedule Wizard Command screen, click Next >. d. On the Schedule Wizard Job List screen, select the Data Job and click Next >. e. On the Schedule Wizard Retention screen, select Weekly for the Retention Scheme and click Next >. 31 EVault Software i365, A Seagate Company

32 f. On the Schedule Wizard Options screen, leave the defaults and click Next >. g. On the Schedule Wizard Command Cycle screen, select Weekly for the Command Cycle and click Next >. h. On the Schedule Wizard Weekly screen: Check Saturday and deselect the rest of the Days. Change the Start Time, type 8:00. Click Next >. 32 EVault Software i365, A Seagate Company

33 i. On the Schedule Wizard Finish screen, click Finish. 4. Schedule Daily Backup j. You ve now finished scheduling the Monthly and Weekly backups. That leaves us just the Daily. a. On the Schedule List screen, click New b. On the Schedule Wizard Screen click Next >. c. On the Schedule Wizard Command screen, click Next >. 33 EVault Software i365, A Seagate Company

34 d. On the Schedule Wizard Job List screen, select the Data Job and click Next >. e. On the Schedule Wizard Retention screen, select Daily for the Retention Scheme and click Next >. f. On the Schedule Wizard Options screen, leave the defaults and click Next >. g. On the Schedule Wizard Command Cycle screen, select Weekly for the Command Cycle and click Next >. 34 EVault Software i365, A Seagate Company

35 h. On the Schedule Wizard Weekly screen: Make sure that Monday, Tuesday, Wednesday, Thursday, and Friday are selected. Change the Start Time, type 8:00. Click Next >. i. On the Schedule Wizard Finish screen, click Finish. j. You ve now finished scheduling the job. On the Schedule List screen, click OK, but make sure that your schedule list looks like the following screenshot. 35 EVault Software i365, A Seagate Company

36 Exercise 6 Run an Ad Hoc (Manual) Backup Normally, you would allow the backup to run per its schedule, but for this lab, we ll run an ad hoc backup so that we can restore immediately. Tasks 1. Detailed Steps a. In CentralControl, right-click Data under Linux01 and select Backup HQ-Vault b. On the Data: Backup Wizard Welcome screen, click Next >. c. On the Data: Backup Wizard Destination screen, click Backup Now. The default backup destination is to your Vault, but you have options to backup to Directory on Disk (USB) for seeding purposes. Just note that USB backups are intended to be imported into the Vault. 36 EVault Software i365, A Seagate Company

37 d. On the Process Information screen, wait for the Status to say Backup Completed and click Close. This backup will take several minutes to complete. e. You ve now completed the seed. Subsequent backups should be even quicker. 37 EVault Software i365, A Seagate Company

38 Exercise 7 Restoring a Single File or Directory In the following steps, you ll learn to restore a single file or directory using EVault. Tasks 1. Detailed Steps a. In the CentralControl, right click the Data Job under Linux01 and choose Restore HQ-Vault b. On the Restore Wizard Welcome screen, click Next >. c. On the Restore Wizard (safeset ) Select a Source screen, click Next >. This is where you can choose from which safeset you d like to restore from. 38 EVault Software i365, A Seagate Company

39 d. On the Restore Wizard (safeset ) Encryption Options screen, type test for the Password and Verify password and click Next >. This is the encryption password we had set earlier when creating the Job. e. On the Restore Wizard (safeset ) Select Restore Objects screen, click Data Files and click Add f. On the Include / Exclude screen, Expand Expand / Select etc Click Include 39 EVault Software i365, A Seagate Company

40 g. On the Confirm Include screen, click Yes. h. On the Include / Exclude screen, click OK. i. On the Restore Wizard (safeset ) Select Restore Objects screen, click Next >. 40 EVault Software i365, A Seagate Company

41 j. On the Restore Wizard (safeset ) Destination Options screen, select Restore files to an alternate location, type /restore, and click Next >. When choosing to restore either to an original or alternate location, that location will always be on the Agent machine currently focused on in CentralControl. At the bottom, you have options for if a file already exists. You have options to overwrite files, rename files, etc. k. On the Restore Wizard (safeset ) Advanced Restore Options screen, click Next >. 41 EVault Software i365, A Seagate Company

42 Do you wish to overwrite files even if they are locked by another process? Typically we only choose Yes to this option if we re doing a full system recovery where we d be overwriting locked files system directories. Otherwise, leaving the default of No, do not restore locked files is typical for normal, non-dr restores. What do you wish to restore? EVault allows you to potentially recover data that was backed up by a different Operating System. EVault backs up data in two different streams: a Header stream and a Data stream. The Header has your various file permissions/attributes while the Data stream has your actual data. In most cases, if you re restoring to similar Operating Systems (such as Windows to Windows), you want to restore All streams to get back your data along with the header. If you wish to restore cross platform (such as Novell to Windows), you ll want to restore Data streams only because Windows won t be able to recognize the things like file permissions for Novell. In this case, the file being recovered will acquire the default permissions for whatever folder you are recovering to. l. On the Restore Wizard (safeset ) Finish screen, click Finish 42 EVault Software i365, A Seagate Company

43 m. On the Process Information screen, wait for the Status to say Restore completed and click Close. n. You ve just learned how to restore an individual directory using EVault. The process to restore a file is very similar, and you can feel free to try on your own in this lab. In the next step, we ll simply check our work to make sure that the folder has been restored on Linux EVault Software i365, A Seagate Company

44 Exercise 8 Verify Sample Folder Has Been Restored For Lab Example Only For this exercise, we ll switch back to Linux01 and verify that the contents of the etc folder have been restored to /restore.ls Tasks 1. Switch Machines LINUX01 Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose Linux_Server to connect back to the Linux01 server. b. The system should automatically log you in, but if you are prompted for login, below are the VNC credentials. Password evault. 2. Verify Sample Folder Has Been Restored a. In the Terminal window, type cd /restore b. Display the contents of this directory. These are the files restored from the etc directory. Type ls la 44 EVault Software i365, A Seagate Company

45 Conclusion In this lab, you learned how to install and configure a Linux Agent. You ve also learned how to restore an individual file and folders. Hopefully you have a better understanding of how to protect a Linux / UNIX system using EVault. Please feel free to do further testing in your training lab. If you had already taken some of the Windows Agent labs before this, hopefully, you see that the configuration of this Agent is basically the same with the exception of the actual Agent installation. For further information about EVault, you can always check our knowledge base and library of user guides available at You can always send comments and suggestions for this training module to training@i365.com or for support related issues you can contact us at support@i365.com. 45 EVault Software i365, A Seagate Company

46 Appendix A In this section, we ll discuss some of the settings found within Agent Configuration in CentralControl. Items like notifications and retentions should be reviewed on every implementation. In this example, we ll assume you ve completed all of the above exercises. Tasks 1. Switch Machines HQ-Vault Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose HQ- Vault-Server to connect to the HQ-Vault. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. c. On the desktop, double-click EVault Software CentralControl. This is the localized Windows CentralControl. 2. Open Agent Configuration a. Right-click Linux01 and choose Agent Configuration. 3. Vaults Tab a. On the Vaults tab, you can modify existing Vault profiles are add additional Vault Connections. If you were to choose to Dual Vault, you would need t a second Vault profile created here. 46 EVault Software i365, A Seagate Company

47 4. Retentions Tab a. On the Retentions tab, you can modify existing retentions or create new retentions to meet your business and compliance needs. Please review the course titled EVault - Course 411 (Understanding EVault Retentions) for more information. 5. Open File Tab a. On the Open File tab, everything is greyed out. Our standard Agent can handle open files on a Linux/UNIX system. However, for database backups, we still recommend that you perform database dumps of the various mission critical databases. 47 EVault Software i365, A Seagate Company

48 6. Notification Tab a. On the Notifications tab, you should always have s sent when there s a failure. It s up to you if you want s sent on error or success as well. You will need to fill out the settings according to your environment. EVault sends its notifications similar to an anonymous (sendmail). If you need to provide an authenticated an account, you can do so at the bottom. I ve filled out some fictitious information below. 7. Advanced Tab a. On the Advanced tab, you can change: Execution priority (CPU priority) Recommend leaving at the default but you have options to change the settings here. Bandwidth This is where you can set bandwidth throttling. Bandwidth throttling is on a per Agent basis and does not take into account other Agents sharing a network connection. If you need to have throttling on a site basis, you should use Quality of Service on your Firewall and throttle TCP port 2546 as a bulk item. This is the port that backup traffic traverses across. 48 EVault Software i365, A Seagate Company

EVault Software. Course 301 Server Protection with EVault File and System State

EVault Software. Course 301 Server Protection with EVault File and System State EVault Software Course 301 Server Protection with EVault File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers

More information

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...

More information

EVault Software. Course 321 Protecting Exchange Server with EVault Exchange Plug-In

EVault Software. Course 321 Protecting Exchange Server with EVault Exchange Plug-In EVault Software Course 321 Protecting Exchange Server with EVault Exchange Plug-In Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...

More information

How To Backup An Entire Database With A Microsoft Sql Server On A Pcode (Windows) 2.5.2.2 (Windows Xp) 2 (Windows 2000) 2-Year Old (Windows 2) 2Nd Generation (Windows 1

How To Backup An Entire Database With A Microsoft Sql Server On A Pcode (Windows) 2.5.2.2 (Windows Xp) 2 (Windows 2000) 2-Year Old (Windows 2) 2Nd Generation (Windows 1 EVault Software Course 311 Protecting SQL Server with EVault SQL Plug-In Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers

More information

EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State

EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State EVault for Data Protection Manager Course 301 Server Protection with DPM File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for

More information

EVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM

EVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM EVault for Data Protection Manager Course 321 Protecting Exchange 2010 with DPM Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers

More information

EVault for Data Protection Manager. Course 401 EDPM Troubleshooting Basics

EVault for Data Protection Manager. Course 401 EDPM Troubleshooting Basics EVault for Data Protection Manager Course 401 EDPM Troubleshooting Basics Table of Contents Objectives... 3 Scenario... 3 Level 1 Support Expectations Rules of Engagement... 4 Online Resources... 5 i365

More information

SmartFiler Backup Appliance User Guide 2.0

SmartFiler Backup Appliance User Guide 2.0 SmartFiler Backup Appliance User Guide 2.0 SmartFiler Backup Appliance User Guide 1 Table of Contents Overview... 5 Solution Overview... 5 SmartFiler Backup Appliance Overview... 5 Getting Started... 7

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation

More information

Quick Start Guide. Apptix Online Backup by Mozy (AOBM) Live Support: 866-461-0851

Quick Start Guide. Apptix Online Backup by Mozy (AOBM) Live Support: 866-461-0851 Quick Start Guide (AOBM) Live Support: 866-461-0851 Quick Start Guide Page 2 of 16 Quick Start Guide Overview Other Guides & Training Resources Admin Guide... [76 Page PDF] Client Software User Guide [46

More information

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20 Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

EVault Software Agent 6.73 for Linux and Oracle Plug-In Guide November 2010

EVault Software Agent 6.73 for Linux and Oracle Plug-In Guide November 2010 EVault Software Agent 6.73 for Linux and Oracle Plug-In Guide November 2010 This document describes how to install and use the EVault Software Agent 6.73 for Linux and Oracle Plug-In for backup and restore

More information

READYNAS INSTANT STORAGE. Quick Installation Guide

READYNAS INSTANT STORAGE. Quick Installation Guide READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux

More information

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816. RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

ReadyNAS Setup Manual

ReadyNAS Setup Manual ReadyNAS Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA October 2007 208-10163-01 v1.0 2007 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,

More information

ShadowControl ShadowStream

ShadowControl ShadowStream ShadowControl ShadowStream Revision 1.3 4/12/2012 Table of Contents Introduction... 3 Download ShadowStream Server... 3 Installation... 4 Configuration... 5 Creating Users... 6 Testing the User Rights...

More information

Acronis Backup & Recovery 11.5 Quick Start Guide

Acronis Backup & Recovery 11.5 Quick Start Guide Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

EVault Software Microsoft SharePoint 2010/2013 Backup and Restore Guide 7.22

EVault Software Microsoft SharePoint 2010/2013 Backup and Restore Guide 7.22 EVault Software Microsoft SharePoint 2010/2013 Backup and Restore Guide 7.22 Copyright SharePoint Backup and Restore Guide 7.22 Revision: This manual has been created for Version 7.22 (June 2013). Software

More information

Setting up your new Live Server Account

Setting up your new Live Server Account Setting up your new Live Server Account Welcome to Remote Data Backups LiveVault Service. This document will help you set up the agent service on your server as well as giving you some guidance on accessing

More information

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip. Reflection DBR USER GUIDE 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Page 1 of 1 Table of Contents Overview 3 Reflection DBR Client and Console Installation 4

More information

How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On

How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files

More information

Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)

Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Manual installation of agents and importing the SCOM certificate to the servers to be monitored:

More information

Laptop Backup - Administrator Guide (Windows)

Laptop Backup - Administrator Guide (Windows) Laptop Backup - Administrator Guide (Windows) Page 1 of 86 Page 2 of 86 Laptop Backup - Administrator Guide (Windows) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL

More information

EVault Software Agent for Linux and Oracle Plug-in 8.0 User Guide

EVault Software Agent for Linux and Oracle Plug-in 8.0 User Guide EVault Software Agent for Linux and Oracle Plug-in 8.0 User Guide Revision: This manual has been updated for version 8.0. Software version: 8.0 (October 2015) 2015 EVault Inc. EVault, A Seagate Company,

More information

Installing SQL Express. For CribMaster 9.2 and Later

Installing SQL Express. For CribMaster 9.2 and Later Installing SQL Express For CribMaster 9.2 and Later CRIBMASTER USER GUIDE Installing SQL Express Document ID: CM9-031-03012012 Copyright CribMaster. 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,

More information

Installation & Configuration Guide

Installation & Configuration Guide EVault InfoStage MS SQL Server Plug-In 4.20 Installation & Configuration Guide June 2003 This manual describes how to install, backup and restore using EVault InfoStage MS SQL Server Plug-In, Version 4.20

More information

Signiant Agent installation

Signiant Agent installation Signiant Agent installation Release 11.3.0 March 2015 ABSTRACT Guidelines to install the Signiant Agent software for the WCPApp. The following instructions are adapted from the Signiant original documentation

More information

Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab

Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab Description In this hands-on session, you will learn how to turn your proxy into a security

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.

MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6. STUDENT ACTIVITY 6.1: UNDERSTAND BACKUP AND RECOVERY METHODS MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.1 Lesson

More information

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc. with the ArchiveSync Add-On Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 Required Add-Ons for ArchiveSync in Real-Time... 3 Communications

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

Using iscsi with BackupAssist. User Guide

Using iscsi with BackupAssist. User Guide User Guide Contents 1. Introduction... 2 Documentation... 2 Terminology... 2 Advantages of iscsi... 2 Supported environments... 2 2. Overview... 3 About iscsi... 3 iscsi best practices with BackupAssist...

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

EVault for Data Protection Manager. Course 411 Understanding EVault Retentions

EVault for Data Protection Manager. Course 411 Understanding EVault Retentions EVault for Data Protection Manager Course 411 Understanding EVault Retentions Table of Contents Objectives... 3 Scenario... 3 Introduction... 4 Daily Retentions The Basics... 4 Expiring Safesets... 6 Retention

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

NovaBACKUP. User Manual. NovaStor / November 2011

NovaBACKUP. User Manual. NovaStor / November 2011 NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without

More information

TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015

TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015 TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015 2201 Thurston Circle Bellevue, NE 68005 www.tigerpawsoftware.com Contents Tigerpaw Exchange Integrator Setup Guide v3.6.0... 1 Contents...

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

1 of 10 1/31/2014 4:08 PM

1 of 10 1/31/2014 4:08 PM 1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings

More information

Team Foundation Server 2012 Installation Guide

Team Foundation Server 2012 Installation Guide Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day benday@benday.com v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation

More information

NovaBACKUP. User Manual. NovaStor / May 2014

NovaBACKUP. User Manual. NovaStor / May 2014 NovaBACKUP User Manual NovaStor / May 2014 2014 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

GUARD1 PLUS SE Administrator's Manual

GUARD1 PLUS SE Administrator's Manual GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 info@guard1.com www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

Configuring Windows 7 to Use Encrypted (WPA-E) Wireless Services a...

Configuring Windows 7 to Use Encrypted (WPA-E) Wireless Services a... 1 di 9 31/05/2011 14.48 Search This Site All UCSD Sites Blink Home > Technology > Network Services > Connections > Wireless > Windows 7 Configuring Windows 7 to Use Encrypted (WPA-E) Wireless Services

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.

More information

SAM 8.0 Backup and Restore Guide. SafeNet Integration Guide

SAM 8.0 Backup and Restore Guide. SafeNet Integration Guide SAM 8.0 Backup and Restore Guide SafeNet Integration Guide Revision A November 2012 SAM 8.0 Backup and Restore Guide - SafeNet Integration Guide Introduction Copyright 2012 SafeNet, Inc. All rights reserved.

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited. 1

More information

Online Backup Linux Client User Manual

Online Backup Linux Client User Manual Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

Upgrade ProTracker Advantage Access database to a SQL database

Upgrade ProTracker Advantage Access database to a SQL database Many of our customers run the process themselves with great success. We are available to run the process for you or we can be available on standby from 9:00-5:00(Eastern) to provide assistance if needed.

More information

Online Backup Client User Manual

Online Backup Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

ReadyNAS Duo Setup Manual

ReadyNAS Duo Setup Manual ReadyNAS Duo Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA February 2008 208-10215-01 v1.0 2008 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,

More information

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X Attix5 Pro Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition V6.0 User Manual for Mac OS X Copyright Notice and Proprietary Information All rights reserved. Attix5, 2011 Trademarks

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

How to Test Out Backup & Replication 6.5 for Hyper-V

How to Test Out Backup & Replication 6.5 for Hyper-V How to Test Out Backup & Replication 6.5 for Hyper-V Mike Resseler May, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information

Pro Bundle Evaluator s Guide. 2015 Software Pursuits, Inc.

Pro Bundle Evaluator s Guide. 2015 Software Pursuits, Inc. Pro Bundle Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 About the Communications Agent Add-On... 3 Other SureSync Add-Ons... 4 File Locking

More information

EVault Software vsphere Agent Version 7.1 User Guide

EVault Software vsphere Agent Version 7.1 User Guide EVault Software vsphere Agent Version 7.1 User Guide Revision: This manual has been updated for Version 7.12 (August 2013). Software Version: 7.12 2013 EVault Inc. EVault, A Seagate Company, makes no representations

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security... Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide BlackBerry Resource Kit for BlackBerry Enterprise Service 10 Version 10.2 Published: 2015-11-12 SWD-20151112124827386 Contents Overview: BlackBerry Enterprise Service

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Microsoft SQL Server Guide. Best Practices and Backup Procedures

Microsoft SQL Server Guide. Best Practices and Backup Procedures Microsoft SQL Server Guide Best Practices and Backup Procedures Constellation HomeBuilder Systems Inc. This document is copyrighted and all rights are reserved. This document may not, in whole or in part,

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Avalanche Remote Control User Guide. Version 4.1.3

Avalanche Remote Control User Guide. Version 4.1.3 Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

Cisco Unified CM Disaster Recovery System

Cisco Unified CM Disaster Recovery System Disaster Recovery System, page 1 Quick-Reference Tables for Backup and Restore s, page 3 Supported Features and Components, page 4 System Requirements, page 5 Log In to Disaster Recovery System, page 7

More information

TABLE OF CONTENTS. Copyright Pro Softnet Corporation. All rights reserved. 2

TABLE OF CONTENTS. Copyright Pro Softnet Corporation. All rights reserved. 2 Last modified on 08.11.2011 TABLE OF CONTENTS Introduction... 4 Features... 5 General Features... 5 Backup Features... 5 Restore Features... 6 Link for Application Download... 6 Install IBackup for Mac...

More information

BorderGuard Client. Version 4.4. November 2013

BorderGuard Client. Version 4.4. November 2013 BorderGuard Client Version 4.4 November 2013 Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, Virginia 20151 703-631-0700 WWW.BLUERIDGENETWORKS.COM All Products are provided with RESTRICTED

More information

Team Foundation Server 2013 Installation Guide

Team Foundation Server 2013 Installation Guide Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day benday@benday.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide

More information

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0 Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE

More information

Online Backup by Mozy User Guide

Online Backup by Mozy User Guide Online Backup by Mozy User Guide Document Revision Date: April 16, 2013 Online Backup by Mozy User Guide i Contents Overview... 3 Getting Started with Mozy... 4 Using the Settings Window... 7 Understanding

More information

SmartFiler Backup Appliance User Guide 2.1

SmartFiler Backup Appliance User Guide 2.1 SmartFiler Backup Appliance User Guide 2.1 SmartFiler Backup Appliance User Guide 1 Table of Contents Overview... 4 Solution Overview... 4 Solution 1: Two Virtual Backup Appliances... 5 Solution 2: Two

More information

Appendix B Lab Setup Guide

Appendix B Lab Setup Guide JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course

More information

Arkay Remote Data Backup Client Quick Start Guide

Arkay Remote Data Backup Client Quick Start Guide Arkay Remote Data Backup Client Quick Start Guide Version 6.1.56.27 September 2005 Quick Start Guide It's easy to get started with Arkay Remote Data Backup and Recovery Service. To start using Arkay Remote

More information

Configuring Global Protect SSL VPN with a user-defined port

Configuring Global Protect SSL VPN with a user-defined port Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure

More information

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server

More information

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

RSA Authentication Manager 8.1 Virtual Appliance Getting Started RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X VirtualDesktopServer Contents 1 2X VirtualDesktopServer Contents 2 URL: www.2x.com E-mail: info@2x.com Information in this document

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

Instructions for connecting to the FDIBA Wireless Network. (Windows XP)

Instructions for connecting to the FDIBA Wireless Network. (Windows XP) Instructions for connecting to the FDIBA Wireless Network (Windows XP) In order to connect, you need your username and password, as well as the FDIBA Root Certificate which you need to install on your

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information