Backup process for McAfee devices

Size: px
Start display at page:

Download "Backup process for McAfee devices"

Transcription

1 Backup process for McAfee devices ESM (Standalone) Backup The backup process on the ESM is intended to create a backup of the tables on the ESM for restoring the configuration of the ESM. There are two backup types Full or incremental. They are described below. A Full backup is a backup of all database table files uncompressed to a remote storage location. This backup type can back up to a CIFS/NFS location. The storage location is mounted before the backup starts and is checked each time to ensure the backup begins. It is expected that the backup location will contain more than one backup file unless the backup location is maintained by the user. The files are copied uncompressed to the storage location for storage and subsequent restoration. For a list of the tables backed up from the ESM is listed the backup.log file is stored with backup. The path backup files will be copied to appears like this: xx.xx.xx.xx:/backupfolder/etm-xx_9.3.1_2013_12_25_215739_f/ An incremental backup is a backup of ESM configuration files compressed to a local or remote storage location. There is also an option to back up the event/flow/log data for the last 24 hours. (based off last backup time stamp) For a list of the tables backed up from the ESM, open the backup.log file is stored within the backup.zip file each time the backup is run. The backup log file contains the tables that are backed up and the records in each table that was backed up. See the output of the file below: TABLE ADGROPSM ( :12:05) (63928 record (s)) (0 deleted TABLE ADGroup ( :12:05) (336 record (s)) (0 deleted TABLE AGGXCPTN ( :12:05) (4 record (s)) (0 deleted TABLE ASSETGRP ( :12:05) (4 record (s)) (0 deleted TABLE ASSTGRRF ( :12:05) (20014 record (s)) (0 deleted TABLE ASSTVBLT ( :12:05) (2339 record (s)) (0 deleted TABLE ASSTVNDR ( :12:05) (20009 record (s)) (0 deleted TABLE ATCRTRL ( :12:05) (10 record (s)) (0 deleted TABLE ATCRTRLC ( :12:05) (160 record (s)) (0 deleted TABLE Access ( :12:05) (778 record (s)) (170 deleted TABLE Action ( :12:05) (39 record (s)) (0 deleted TABLE Asset ( :12:05) (20009 record (s)) (0 deleted TABLE BLACKLST ( :12:05) (1 record (s)) (0 deleted TABLE BLCKLFFR ( :12:05) (0 record (s)) (0 deleted TABLE CASEVNTS ( :12:05) (203 record (s)) (0 deleted TABLE CHANGELG ( :12:06) (41473 record (s)) (0 deleted TABLE CONDITIN ( :12:06) (26 record (s)) (0 deleted TABLE CaseMgt ( :12:06) (184 record (s)) (0 deleted

2 TABLE CaseOrg ( :12:06) (1 record (s)) (0 deleted TABLE Class ( :12:06) (68 record (s)) (0 deleted TABLE DEVICEFO ( :12:06) (7 record (s)) (0 deleted TABLE DTNRCHMT ( :12:06) (5 record (s)) (0 deleted TABLE DTNRCLDS ( :12:06) (3 record (s)) (0 deleted TABLE DTNRCPSD ( :12:06) (3 record (s)) (0 deleted TABLE DVCFLSJN ( :12:06) (28 record (s)) (67 deleted TABLE GRP ( :12:06) (1 record (s)) (0 deleted TABLE EMLDDRSS ( :12:06) (8 record (s)) (0 deleted TABLE Gro ( :12:06) (3 record (s)) (0 deleted TABLE ESMFLTRS ( :12:06) (0 record (s)) (0 deleted TABLE EVNTFDNG ( :12:06) (3 record (s)) (0 deleted TABLE EXTDVCTT ( :12:06) (259 record (s)) (0 deleted TABLE EXTRNLDV ( :12:06) (109 record (s)) (0 deleted TABLE GeoLoc ( :12:08) ( record (s)) (0 deleted TABLE Groups ( :12:08) (10 record (s)) (0 deleted TABLE HCFILTRS ( :12:08) (0 record (s)) (0 deleted TABLE HLTHSNGS ( :12:08) (16854 record (s)) (0 deleted TABLE Hosts ( :12:08) (489 record (s)) (0 deleted TABLE ICMPType ( :12:08) (66 record (s)) (0 deleted TABLE IPS ( :12:08) (153 record (s)) (2382 deleted TABLE IPSBlob ( :12:09) (731 record (s)) (612 deleted TABLE IPSCHANG ( :12:09) (153 record (s)) (2382 deleted TABLE IPSCheck ( :12:09) (15 record (s)) (0 deleted TABLE ITMRGHTS ( :12:09) (4 record (s)) (0 deleted TABLE LCLSTRNG ( :12:09) ( record (s)) (0 deleted TABLE LOGCATGR ( :12:09) (11 record (s)) (0 deleted TABLE MSSGTMPL ( :12:09) (11 record (s)) (0 deleted TABLE NDDVCNFC ( :12:09) (0 record (s)) (0 deleted TABLE NDDVCSSS ( :12:09) (0 record (s)) (0 deleted TABLE NDDVCVLN ( :12:09) (0 record (s)) (0 deleted TABLE NDDevice ( :12:09) (0 record (s)) (0 deleted TABLE NDEPDVCS ( :12:09) (0 record (s)) (0 deleted TABLE NDEPPRMS ( :12:09) (1 record (s)) (0 deleted TABLE NDFLDRDC ( :12:09) (0 record (s)) (0 deleted TABLE NDFolder ( :12:09) (0 record (s)) (0 deleted TABLE NDIPLoc ( :12:09) (419 record (s)) (0 deleted TABLE NDNDPHST ( :12:09) (0 record (s)) (0 deleted TABLE NDNDPNTP ( :12:09) (0 record (s)) (0 deleted TABLE NDNDPNTS ( :12:09) (0 record (s)) (0 deleted TABLE NDNDPSTR ( :12:09) (0 record (s)) (0 deleted TABLE NDNGHBRS ( :12:09) (0 record (s)) (0 deleted TABLE NDPRMLSN ( :12:09) (0 record (s)) (0 deleted TABLE NDPRMSDL ( :12:09) (1 record (s)) (0 deleted

3 TABLE NDPROCSS ( :12:09) (3 record (s)) (0 deleted TABLE NDPRTCRL ( :12:09) (0 record (s)) (0 deleted TABLE NDParams ( :12:09) (1 record (s)) (0 deleted TABLE NDSRCLTS ( :12:09) (0 record (s)) (0 deleted TABLE NOTIFCTN ( :12:09) (31 record (s)) (0 deleted TABLE NTFCTBRS ( :12:09) (123 record (s)) (53 deleted TABLE NTFCTNCH ( :12:09) (31 record (s)) (0 deleted TABLE NTFCTNCN ( :12:09) (61 record (s)) (1 deleted TABLE NTFCTNML ( :12:09) (0 record (s)) (0 deleted TABLE NTFCTNSR ( :12:09) (0 record (s)) (0 deleted TABLE NTFCTTTR ( :12:09) (326 record (s)) (0 deleted TABLE Notes ( :12:09) (0 record (s)) (0 deleted TABLE Notifica ( :12:09) (7 record (s)) (0 deleted TABLE Query ( :12:09) (1255 record (s)) (0 deleted TABLE RGHTSMNT ( :12:09) (147 record (s)) (0 deleted TABLE RMTCMMND ( :12:09) (1 record (s)) (0 deleted TABLE RMTCMTTR ( :12:09) (3 record (s)) (0 deleted TABLE RPRTCMNT ( :12:09) (2316 record (s)) (0 deleted TABLE RPRTFLDR ( :12:09) (96 record (s)) (0 deleted TABLE RULEPARA ( :12:09) (0 record (s)) (0 deleted TABLE RULEPARM ( :12:09) (404 record (s)) (3 deleted TABLE RULEUSEE ( :12:09) (50968 record (s)) ( deleted TABLE Reports ( :12:09) (900 record (s)) (0 deleted TABLE Rights ( :12:09) (27 record (s)) (0 deleted TABLE Rule ( :12:10) ( record (s)) (0 deleted TABLE RuleVA ( :12:10) (19445 record (s)) (0 deleted TABLE OS ( :12:09) (28 record (s)) (0 deleted TABLE RuleVIN ( :12:10) (16711 record (s)) (0 deleted TABLE PLUGINDT ( :12:09) (0 record (s)) (0 deleted TABLE PREPRCSS ( :12:09) (19 record (s)) (0 deleted TABLE PRPRCPTN ( :12:09) (3 record (s)) (0 deleted TABLE PRPRCSRP ( :12:09) (11 record (s)) (0 deleted TABLE Plugins ( :12:09) (0 record (s)) (0 deleted TABLE PortApps ( :12:09) (96 record (s)) (0 deleted TABLE Ports ( :12:09) (4460 record (s)) (0 deleted TABLE Profile ( :12:09) (11 record (s)) (0 deleted TABLE SENDEMAL ( :12:10) (0 record (s)) (1 deleted TABLE SENDSSLG ( :12:10) (0 record (s)) (0 deleted TABLE SLCTFLDM ( :12:10) (163 record (s)) (0 deleted TABLE SMXRef ( :12:10) (0 record (s)) (0 deleted TABLE SSSTTNGS ( :12:10) (269 record (s)) (0 deleted TABLE STRINGMP ( :12:10) ( record (s)) (0 deleted TABLE Scoring ( :12:10) (3 record (s)) (1 deleted TABLE TAGSVBTS ( :12:10) (74 record (s)) (0 deleted

4 TABLE TGPDTXTN ( :12:10) (57 record (s)) (29 deleted TABLE TGSSTGRP ( :12:10) (31 record (s)) (0 deleted TABLE TGSSTXTN ( :12:10) (64 record (s)) (0 deleted TABLE THRDPNFG ( :12:10) (1223 record (s)) (1701 deleted TABLE THRDPRTP ( :12:10) (440 record (s)) (0 deleted TABLE TPTPPPLC ( :12:10) (14 record (s)) (0 deleted TABLE TRGGRDLM ( :12:10) (2309 record (s)) (1 deleted TABLE USERLCNS ( :12:11) (17 record (s)) (0 deleted TABLE USERSTTS ( :12:11) (1 record (s)) (0 deleted TABLE USRFLTST ( :12:11) (5727 record (s)) (0 deleted TABLE USRPSDJN ( :12:11) (0 record (s)) (0 deleted TABLE USRVWXSN ( :12:11) (0 record (s)) (0 deleted TABLE User_IPS ( :12:11) (14 record (s)) (0 deleted TABLE Users ( :12:11) (32 record (s)) (0 deleted TABLE Tag ( :12:10) (917 record (s)) (0 deleted TABLE UsersPW ( :12:11) (22 record (s)) (0 deleted TABLE TagAsset ( :12:10) (20089 record (s)) (0 deleted TABLE TagRule ( :12:10) ( record (s)) (0 deleted TABLE Theme ( :12:10) (12 record (s)) (0 deleted TABLE Timezone ( :12:10) (74 record (s)) (0 deleted TABLE VAREXCEP ( :12:11) (9 record (s)) (0 deleted TABLE VIEWFLDR ( :12:11) (106 record (s)) (0 deleted TABLE VULNRBLT ( :12:11) (6293 record (s)) (0 deleted TABLE VWCMPNNT ( :12:11) (5362 record (s)) (0 deleted TABLE Triggere ( :12:10) (0 record (s)) (4 deleted TABLE UCFA2C ( :12:10) (3041 record (s)) (0 deleted TABLE Var TABLE View ( :12:11) (129 record (s)) (0 deleted ( :12:11) (893 record (s)) (0 deleted TABLE UCFC2U ( :12:10) (5432 record (s)) (0 deleted TABLE UCFN2U ( :12:10) (58 record (s)) (0 deleted TABLE UCFName ( :12:10) (3388 record (s)) (0 deleted TABLE UPDATBLB ( :12:11) (14 record (s)) (0 deleted TABLE WMIType ( :12:11) (336 record (s)) (0 deleted TABLE WTCHLSLS ( :12:47) ( record (s)) ( deleted TABLE WTCHLSTS ( :12:47) (20 record (s)) (0 deleted TABLE ZONEIPMA ( :12:47) (258 record (s)) (0 deleted TABLE USERFILD ( :12:11) (225 record (s)) (0 deleted TABLE USERFLDS ( :12:11) (228 record (s)) (0 deleted TABLE Zone ( :12:47) (257 record (s)) (0 deleted The backup occurs live so the ESM is not restarted as the backup proceeds. The files are stored into the folder /data_hd /usr/local/ess/dbbackupwork/ where they are tarred up and compressed in a.zip file. The final file is stored in /data_hd/usr/local/ess/dbbackup/ for presentation in the File Maintenance UI

5 in the SIEM GUI. The best way to follow the backup process is by watching the message box in the ESM GUI. It will look something like this: A remote backup type can back up to a CIFS/NFS location. The storage location is mounted before the backup starts and is checked each time to ensure the backup begins. It is expected that the backup location will contain more than one backup file unless the backup location is maintained by the user. The backup files are copied compressed to the storage location for storage and subsequent restoration. For remote folders the path name will look like this: xx.xx.xx.xx:/backupfolder/etm-xx_9.3.1_2013_12_25_021738_i.zip The restore process is used to restore the ESM configuration and data back to the ESM. It works in an opposite manner from the back up process. The file selected from the File Maintenance UI in the SIEM GUI is copied to the /data_hd/usr/local/ess/dbrestore folder. The ESM must be shut down to restore the DB tables correctly. After that process is stopped the.zip file is untarred up and placed in the /data_hd /usr/local/ess/dbbackupwork/ folder to be copied to the correct folders on the ESM. After that the ESM is restarted to recognize the new configuration placed on it. The best way to follow the process is by logging onto the console of the ESM and look at the /var/log/messages file. It will look something like this: Dec 20 02:22:25 McAfee [55337]: RestoreDB - started Dec 20 02:22:25 McAfee [55337]: Opened database - /db2/usr/local/ess/data/ngcp.dfl - system number - 1 Dec 20 02:22:26 McAfee [55337]: RestoreDB - extracting file: - /db1/usr/local/ess/dbrestore/etm- X4_9.3.1_2013_12_19_220919_I.zip

6 Dec 20 02:22:26 McAfee [55337]: Opened database - /db1/usr/local/ess/dbrestore/ngcpold.dfl - system number - 2 Dec 20 02:23:42 McAfee [55337]: RestoreDB - restoring file: - /db1/usr/local/ess/dbrestore/etmxx_9.3.1_2013_12_20_220919_i.zip Dec 20 02:23:42 McAfee [55337]: RestoreDB - restoring on primary.. Dec 20 02:25:48 McAfee [55337]: RestoreDB - restore system tables complete Dec 20 02:25:57 McAfee [55337]: RestoreDB - finished ESM( Redundant) A redundant ESM is limited on the functionality it can perform compared to a primary (standalone) ESM but it will get all settings that a standalone ESM is given to ensure it comes up fully configured when placed in primary mode. An error is given to indicate the backup capability is turned off. The redundant will still have access restore backups that are available on the remote backup folders. ELM The backup process on the ELM is intended to create a backup of the Management DB tables on the ELM for restoring the configuration of the ELM and the log file indexes currently on the ELM. The folders created by the backup and the backup files put there are described below.

7 Remote backup mount point: xx.xx.xx.xx:/backupfolder/ The files/folders created are: NitroGuard/ alloc.conf backupelm.conf customfields.conf das.conf elmer_file_timeout.conf ffg_fws.conf ffg_web.conf fips.conf freetds-gsql.conf globals.conf mgtdbloc.conf network.conf nitrosnmp.conf storage.conf thirdparty.conf vathirdparty.conf buildstamp mgtdb/ NitroError.Log ds2rg.data elm.cfd

8 elm.cfg elm.cpy elm.dfl elm.old elmmsg.txt rg/ rg.data rg2sh.data sh.data sr.data A log file indexes backup is a backup of all database table files (also called the Management DB) uncompressed to a remote storage location. This backup type can back up to a CIFS/NFS location. The storage location is mounted before the backup starts and is checked each time to ensure the backup begins. It is expected that the backup location will contain more than one backup file unless the backup location is maintained by the user. The data index files are copied uncompressed to the storage location for storage and subsequent restoration. For a list of the tables backed up from the ELM is listed above. A configuration backup is a backup of ELM configuration files uncompressed to a remote storage location. These files contain paths and configuration data for the processes that run on the ELM. Some of the configuration is use in the ELM GUI but most is configuration used by the runtime components of the ELM. For a list of the configuration files backed up from the ELM see above. When a backup is started the ELM Properties dialog will show the backup in progress. (see below)

9 A backup will usually complete in 5 10 minutes unless there are connection issues or speed issues copying files to the remote share. You can also follow the process is by logging onto the console of the ELM and look at the /var/log/messages file. It will look something like this: Dec 25 06:33:56 McAfee backupelm[21996]: Starting elm backup.. Dec 25 06:36:15 McAfee backupelm[22016]: Elm backup completed The restore process is used to restore the ELM configuration and log file indexes back to the ELM. It works in an opposite manner from the back up process. The Restore Backup button in the ELM Bakup and restore GUI is pressed and the ELM backup is copied to the /data_hd/usr/local/elm/ folder.

10 The ELM must be shut down to restore the DB tables correctly. After that process is stopped the ELM configuration files are copied to the correct folders on the ELM. After copying is finished the ELM is restarted to recognize the new configuration placed on it. The best way to follow the process is by logging onto the console of the ELM and look at the /var/log/messages file. It will look something like this: Dec 25 06:55:40 McAfee elmd[22713]: Stopping (Parent pid) = Dec 25 06:55:40 McAfee elmd[22713]: Flushing Database /usr/local/elm/mgtdb/elm.dfl Dec 25 06:55:40 McAfee elmd[22713]: Flushing Database /usr/local/elm/mgtdb/rg/rg_1/elmlf_1.dfl Dec 25 06:55:40 McAfee elmd[22713]: Flushing Database /usr/local/elm/mgtdb/rg/rg_2/elmlf_2.dfl Dec 25 06:55:41 McAfee elmd[22713]: Flushing Database /usr/local/elm/mgtdb/rg/rg_3/elmlf_3.dfl Dec 25 06:55:41 McAfee elmd[22713]: Flushing Database completed! Dec 25 06:56:37 McAfee SetStorageConf[3478]: Starting to mount Dec 25 06:56:37 McAfee SetStorageConf[3478]: mount returned [1] for Dec 25 06:56:37 McAfee SetStorageConf[3478]: Verifying NFS224 Dec 25 06:56:37 McAfee SetStorageConf[3478]: Verifying local The ELM restore will finish and you will see an OK in the ELM properties dialog.

11 Receiver (Standalone) There are no specific backup capabilities on the Receiver. The Receiver has a 25 partition design that stores the event/flow data long enough for the ESM to retrieve it off of the device. As long as the ESM is current pulling data over to the ESM the Receiver data is available and can be backed up on the ESM. Receiver (HA) HA Receivers employ a backup mechanism called a redundant device. (like the redundant ESM is to the primary ESM) The data shared between HA receivers keeps a back up active to allow for fail over of the Receiver device. As above, there are no specific backup capabilities on the Receiver. The Receiver has a 25 partition design that stores the event/flow data long enough for the ESM to retrieve it off of the device. As long as the ESM is current pulling data over to the ESM the Receiver data is available and can be backed up on the ESM. ACE There are no specific backup capabilities on the ACE. The ACE has a 25 partition design that stores the event/flow data long enough for the ESM to retrieve it off of the device. As long as the ESM is current pulling data over to the ESM the Receiver data is available and can be backed up on the ESM.

Moving the Web Security Log Database

Moving the Web Security Log Database Moving the Web Security Log Database Topic 50530 Web Security Solutions Version 7.7.x, 7.8.x Updated 22-Oct-2013 Version 7.8 introduces support for the Web Security Log Database on Microsoft SQL Server

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

How to protect, restore and recover SQL 2005 and SQL 2008 Databases

How to protect, restore and recover SQL 2005 and SQL 2008 Databases How to protect, restore and recover SQL 2005 and SQL 2008 Databases Introduction This document discusses steps to set up SQL Server Protection Plans and restore protected databases using our software.

More information

Configuration Guide. Remote Backups How-To Guide. Overview

Configuration Guide. Remote Backups How-To Guide. Overview Configuration Guide Remote Backups How-To Guide Overview Remote Backups allow you to back-up your data from 1) a ShareCenter TM to either a Remote ShareCenter or Linux Server and 2) Remote ShareCenter

More information

McAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do?

McAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do? McAfee SIEM Alarms Setting up and Managing Alarms Introduction McAfee SIEM provides the ability to send alarms on a multitude of conditions. These alarms allow for users to be notified in near real time

More information

How to Back Up and Restore an ACT! Database Answer ID 19211

How to Back Up and Restore an ACT! Database Answer ID 19211 How to Back Up and Restore an ACT! Database Answer ID 19211 Please note: Answer ID documents referenced in this article can be located at: http://www.act.com/support/index.cfm (Knowledge base link). The

More information

Hyperoo 2.0 A (Very) Quick Start

Hyperoo 2.0 A (Very) Quick Start Hyperoo 2.0 A (Very) Quick Start Download and install the Hyperoo 2.0 beta Hyperoo 2.0 is a client/server based application and as such requires that you install both the Hyperoo Client and Hyperoo Server

More information

McAfee Enterprise Security Manager 9.3.2

McAfee Enterprise Security Manager 9.3.2 Release Notes McAfee Enterprise Security Manager 9.3.2 Contents About this release New features for 9.3.2 Upgrade instructions for 9.3.2 Find product documentation About this release This document contains

More information

Time Stamp. Instruction Booklet

Time Stamp. Instruction Booklet Time Stamp Instruction Booklet Time Stamp Introductions Time stamp is a useful solution for backing up and restoring system, it backs up the entire computer system to the Backup Zone. Time Stamp is used

More information

Brocade Network Advisor High Availability Using Microsoft Cluster Service

Brocade Network Advisor High Availability Using Microsoft Cluster Service Brocade Network Advisor High Availability Using Microsoft Cluster Service This paper discusses how installing Brocade Network Advisor on a pair of Microsoft Cluster Service nodes provides automatic failover

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

Chapter 25 Backup and Restore

Chapter 25 Backup and Restore System 800xA Training Chapter 25 Backup and Restore TABLE OF CONTENTS Chapter 25 Backup and Restore... 1 25.1 General Information... 2 25.1.1 Objectives... 2 25.1.2 Legend... 2 25.1.3 Reference Documentation...

More information

Backup Server: User Manual. Version 2.1-p2

Backup Server: User Manual. Version 2.1-p2 Backup Server: User Manual Version 2.1-p2 Table of Contents Overview... 1 High-Availability... 1 User Interface... 1 Login... 1 Resources... 1 List of Backups... 2 Resource Configuration... 3 Oracle Database

More information

How to add your Weebly website to a TotalCloud hosted Server

How to add your Weebly website to a TotalCloud hosted Server How to add your Weebly website to a TotalCloud hosted Server Creating your Weebly website: 1.) Go to weebly.com and create a free account. 2.) Build and design your personal website using the Weebly features.

More information

Actualtests.com - The Power of Knowing

Actualtests.com - The Power of Knowing Explanation: We should use Global Security groups. QUESTION 87 You are the network administrator for Certkiller.com. Your network consists of a single Active Directory domain named Certkiller.com. All

More information

How To Set Up Dataprotect

How To Set Up Dataprotect How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact

More information

Instructions for update installation of ElsaWin 5.00

Instructions for update installation of ElsaWin 5.00 Instructions for update installation of ElsaWin 5.00 Page 1 of 21 Contents 1. Requirements... 3 2. Updating to version 5.00... 4 3. Client update... 19 Page 2 of 21 1. Requirements ElsaWin 4.10 must be

More information

SQL Server Replication Guide

SQL Server Replication Guide SQL Server Replication Guide Rev: 2013-08-08 Sitecore CMS 6.3 and Later SQL Server Replication Guide Table of Contents Chapter 1 SQL Server Replication Guide... 3 1.1 SQL Server Replication Overview...

More information

How To Run Paragon Boot Camp Backup On A Mac Computer (Windows) On A Pc Or Mac (Windows 2) On An Ntos 2 (Windows 3) On Your Computer Or Ipad (Windows 1) On Pc Or Ipa

How To Run Paragon Boot Camp Backup On A Mac Computer (Windows) On A Pc Or Mac (Windows 2) On An Ntos 2 (Windows 3) On Your Computer Or Ipad (Windows 1) On Pc Or Ipa PARAGON Software GmbH Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Internet www.paragon-software.com Email sales@paragon-software.com Paragon

More information

5.6.3 Lab: Registry Backup and Recovery in Windows XP

5.6.3 Lab: Registry Backup and Recovery in Windows XP 5.6.3 Lab: Registry Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up a computer registry. You will also perform a recovery of a computer registry.

More information

BACKUP & RESTORE (FILE SYSTEM)

BACKUP & RESTORE (FILE SYSTEM) Table of Contents Table of Contents... 1 Perform a Backup (File System)... 1 What Gets Backed Up... 2 What Does Not Get Backed Up... 3 Perform a Restore... 4 Perform a Backup (File System) The following

More information

Setting up FileMaker 10 Server

Setting up FileMaker 10 Server Setting up FileMaker 10 Server Note : If your current live Database folder is located in the default database folder ( C:\Program Files\FileMaker\FileMaker Server\Data\Databases ), move\copy this folder

More information

SonicWALL CDP Local Archiving

SonicWALL CDP Local Archiving This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

epolicy Orchestrator Log Files

epolicy Orchestrator Log Files Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5

GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5 GWAVA 5 Migration Guide for Netware GWAVA 4 to Linux GWAVA 5 Copyright 2010 GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com Overview While GWAVA

More information

Migrating Mobile Security for Enterprise (TMMS) 8.0 to version 9.0

Migrating Mobile Security for Enterprise (TMMS) 8.0 to version 9.0 Before Migration Migrating Mobile Security for Enterprise (TMMS) 8.0 to version 9.0 You must have TMMS 8.0/8.0 SP1 installed before upgrading to TMMS 9.0. Pay attention to the following when migrating

More information

VTLBackup4i. Backup your IBM i data to remote location automatically. Quick Reference and Tutorial. Version 02.00

VTLBackup4i. Backup your IBM i data to remote location automatically. Quick Reference and Tutorial. Version 02.00 VTLBackup4i Backup your IBM i data to remote location automatically Quick Reference and Tutorial Version 02.00 Manufacture and distributed by VRTech.Biz LTD Last Update:16.9.2013 Contents 1. About VTLBackup4i...

More information

Backup/Restore Utility (Version 2.1)

Backup/Restore Utility (Version 2.1) TOSHIBA Strata CIX Product Bulletin PBCIX-0031 July 31, 2006 Backup/Restore Utility (Version 2.1) Backup/Restore The Backup and Restore Utility is a tool that connects to Stratagy ES, Strata ACD, Strata

More information

SyncThru Database Migration

SyncThru Database Migration SyncThru Database Migration Overview Database Migration for SyncThru application is an intuitive tool that enables the data stored in the database of an older version of SyncThru, to be moved to the database

More information

Ahsay Offsite Backup Server and Ahsay Replication Server

Ahsay Offsite Backup Server and Ahsay Replication Server Ahsay Offsite Backup Server and Ahsay Replication Server v6 Ahsay Systems Corporation Limited 19 April 2013 Ahsay Offsite Backup Server and Ahsay Replication Server Copyright Notice 2013 Ahsay Systems

More information

Lieberman Software Corporation Enterprise Random Password Manager

Lieberman Software Corporation Enterprise Random Password Manager Lieberman Software Corporation Enterprise Random Password Manager RSA envision Ready Implementation Guide Last Modified: January 27, 2011 Partner Information Product Information Partner Name Web Site Product

More information

Practice Fusion API Client Installation Guide for Windows

Practice Fusion API Client Installation Guide for Windows Practice Fusion API Client Installation Guide for Windows Quickly and easily connect your Results Information System with Practice Fusion s Electronic Health Record (EHR) System Table of Contents Introduction

More information

Managing ACE Software Licenses

Managing ACE Software Licenses CHAPTER 2 This chapter describes how to manage the software licenses for your Cisco 4700 Series Application Control Engine (ACE) appliance. It contains the following major sections: Information about ACE

More information

Using Symantec NetBackup with Symantec Security Information Manager 4.5

Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights

More information

AlienVault. Unified Security Management 5.x Configuration Backup and Restore

AlienVault. Unified Security Management 5.x Configuration Backup and Restore AlienVault Unified Security Management 5.x Configuration Backup and Restore USM 5.x Configuration Backup and Restore Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

OroTimesheet 7 Installation Guide

OroTimesheet 7 Installation Guide Installation Guide Copyright 1996-2011 OroLogic Inc. http://www.orologic.com Revision 7.00 Contents I Contents Installation Guide 2 Introduction 2 Installing OroTimesheet 2 Installing OroTimesheet in stand-alone

More information

DSX-HSCS Hot Swap Comm Server

DSX-HSCS Hot Swap Comm Server DSX Access Systems, Inc. DSX-HSCS Hot Swap Comm Server WinDSX Hot Swap Redundancy Software Hot-Swap Redundant Communications Server provides continued availability of System Communications and Control

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

AKCess Pro Server Backup & Restore Manual

AKCess Pro Server Backup & Restore Manual www.akcp.com AKCess Pro Server Backup & Restore Manual Copyright 2015, AKCP Co., Ltd. Table of Contents Introduction... 3 Backup process... 4 Copying the backup export files to other media... 9 Tips for

More information

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip. Reflection DBR USER GUIDE 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Page 1 of 1 Table of Contents Overview 3 Reflection DBR Client and Console Installation 4

More information

McAfee Security Information Event Management (SIEM) Administration Course 101

McAfee Security Information Event Management (SIEM) Administration Course 101 McAfee Security Information Event Management (SIEM) Administration Course 101 Intel Security Education Services Administration Course The McAfee SIEM Administration course from McAfee Education Services

More information

Online Backup Linux Client User Manual

Online Backup Linux Client User Manual Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might

More information

Online Backup Client User Manual

Online Backup Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

How to Test Out Backup & Replication 6.5 for Hyper-V

How to Test Out Backup & Replication 6.5 for Hyper-V How to Test Out Backup & Replication 6.5 for Hyper-V Mike Resseler May, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information

EMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager

EMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager EMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager Version 2.3 Installation and Configuration Guide 302-002-080 01 Copyright 2013-2015 EMC Corporation. All rights reserved.

More information

Avigilon Control Center System Integration Guide

Avigilon Control Center System Integration Guide Avigilon Control Center System Integration Guide with STENTOFON AlphaCom INT-STENTOFON-B-Rev3 Copyright 2013 Avigilon. All rights reserved. No copying, distribution, publication, modification, or incorporation

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.

More information

Backing Up TestTrack Native Project Databases

Backing Up TestTrack Native Project Databases Backing Up TestTrack Native Project Databases TestTrack projects should be backed up regularly. You can use the TestTrack Native Database Backup Command Line Utility to back up TestTrack 2012 and later

More information

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised

More information

CommVault Simpana Archive 8.0 Integration Guide

CommVault Simpana Archive 8.0 Integration Guide CommVault Simpana Archive 8.0 Integration Guide Data Domain, Inc. 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800 Version 1.0, Revision B September 2, 2009 Copyright 2009

More information

Data Test/Restore on Network Drive for Windows 7

Data Test/Restore on Network Drive for Windows 7 Information Technology Services Page 1 of 11 Data Test/Restore on Network Drive for Windows 7 Document No: V 1 Information Technology Services Page 2 of 11 Contents 1.0 Introduction... 3 2.0 Definitions:...

More information

Acronis Recovery TM for Microsoft Exchange TM

Acronis Recovery TM for Microsoft Exchange TM Acronis Recovery TM for Microsoft Exchange TM Reviewers Guide Introduction This guide is designed for members of the media, analysts and user organizations who will be evaluating Acronis Recovery for Microsoft

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in

More information

ecopy ShareScan 5.0 SQL installs guide

ecopy ShareScan 5.0 SQL installs guide ecopy ShareScan 5.0 SQL installs guide Created by Rob O Leary, 3/28/2011 5.0 SQL installs guide 2 ShareScan 5.0 has two SQL setup types: Complete: Installs and connects the local MS SQL Server 2008 Express

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

Compiere ERP & CRM Installation Instructions Linux System - EnterpriseDB

Compiere ERP & CRM Installation Instructions Linux System - EnterpriseDB Compiere ERP & CRM Installation Instructions Linux System - EnterpriseDB Compiere Learning Services Division Copyright 2007 Compiere, inc. All rights reserved www.compiere.com Table of Contents Compiere

More information

Installation of MicroSoft Active Directory

Installation of MicroSoft Active Directory Installation of MicroSoft Active Directory Before you start following this article you must be aware this is simply a lab setup and you need to assign relevant ip address, hostnames & domain names which

More information

Managing Software and Configurations

Managing Software and Configurations 55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page

More information

SourceAnywhere Service Configurator can be launched from Start -> All Programs -> Dynamsoft SourceAnywhere Server.

SourceAnywhere Service Configurator can be launched from Start -> All Programs -> Dynamsoft SourceAnywhere Server. Contents For Administrators... 3 Set up SourceAnywhere... 3 SourceAnywhere Service Configurator... 3 Start Service... 3 IP & Port... 3 SQL Connection... 4 SourceAnywhere Server Manager... 4 Add User...

More information

Upgrade Guide BES12. Version 12.1

Upgrade Guide BES12. Version 12.1 Upgrade Guide BES12 Version 12.1 Published: 2015-02-25 SWD-20150413111718083 Contents Supported upgrade environments...4 Upgrading from BES12 version 12.0 to BES12 version 12.1...5 Preupgrade tasks...5

More information

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved.

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved. Vess A2000 Series NVR Storage Appliance Windows Recovery Instructions Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Different ways to backup the system disk 2 Before

More information

NexentaConnect for VMware Virtual SAN

NexentaConnect for VMware Virtual SAN NexentaConnect for VMware Virtual SAN User Guide 1.0.2 FP3 Date: April, 2016 Subject: NexentaConnect for VMware Virtual SAN User Guide Software: NexentaConnect for VMware Virtual SAN Software Version:

More information

Zen Internet. Online Data Backup. Zen Vault Professional Plug-ins. Issue: 2.0.08

Zen Internet. Online Data Backup. Zen Vault Professional Plug-ins. Issue: 2.0.08 Zen Internet Online Data Backup Zen Vault Professional Plug-ins Issue: 2.0.08 Contents 1 Plug-in Installer... 3 1.1 Installation and Configuration... 3 2 Plug-ins... 5 2.1 Email Notification... 5 2.1.1

More information

WA1791 Designing and Developing Secure Web Services. Classroom Setup Guide. Web Age Solutions Inc. Web Age Solutions Inc. 1

WA1791 Designing and Developing Secure Web Services. Classroom Setup Guide. Web Age Solutions Inc. Web Age Solutions Inc. 1 WA1791 Designing and Developing Secure Web Services Classroom Setup Guide Web Age Solutions Inc. Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software

More information

Using AppMetrics to Handle Hung Components and Applications

Using AppMetrics to Handle Hung Components and Applications Using AppMetrics to Handle Hung Components and Applications AppMetrics has the ability to detect hung COM+ components and applications, providing a means of alerting staff to situations where critical

More information

RSA Authentication Manager

RSA Authentication Manager McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: RSA Authentication Manager February 26, 2015 RSA Authentication Manager Page 1 of 9 Important Note: The information contained

More information

LICENSE4J FLOATING LICENSE SERVER USER GUIDE

LICENSE4J FLOATING LICENSE SERVER USER GUIDE LICENSE4J FLOATING LICENSE SERVER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 2 Floating License Usage... 2 Installation... 4 Windows Installation... 4 Linux

More information

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve. Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.

More information

Client for Macintosh

Client for Macintosh Client for Macintosh Installation Instructions Sequencher Server Network Overview Page 2 Installing the KeyAccess Client Page 3 Logging on to the Server on OSX Page 4 Logging on to the Server in Classic

More information

Performing Administrative Tasks

Performing Administrative Tasks This chapter describes how to perform administrative tasks using Cisco CMX. Users who are assigned administration privileges can perform administrative tasks. Cisco CMX User Accounts, page 1 Backing Up

More information

FileMaker Server 11. FileMaker Server Help

FileMaker Server 11. FileMaker Server Help FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered

More information

Avira Management Console AMC server configuration for managing online remote computers. HowTo

Avira Management Console AMC server configuration for managing online remote computers. HowTo Avira Management Console AMC server configuration for managing online remote computers HowTo Table of Contents 1. General... 3 2. Network layout plan... 3 3. Configuration... 4 3.1 Port forwarding...4

More information

CONNECT-TO-CHOP USER GUIDE

CONNECT-TO-CHOP USER GUIDE CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...

More information

Livestock Office Backup Database

Livestock Office Backup Database Livestock Office Backup Database 29/01/2015 Contents Backup Database... 2 Manual Backup... 2 System Management Backup Options... 4 Run Now... 5 Schedule Backup... 6 Tape Backup... 8 Restore Backup... 8

More information

TSM Studio Server User Guide 2.9.0.0

TSM Studio Server User Guide 2.9.0.0 TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.

More information

HP Data Protector Integration with Autonomy IDOL Server

HP Data Protector Integration with Autonomy IDOL Server HP Data Protector Integration with Autonomy IDOL Server Introducing e-discovery for HP Data Protector environments Technical white paper Table of contents Summary... 2 Introduction... 2 Integration concepts...

More information

NetNumen U31 R06. Backup and Recovery Guide. Unified Element Management System. Version: V12.14.30

NetNumen U31 R06. Backup and Recovery Guide. Unified Element Management System. Version: V12.14.30 NetNumen U31 R06 Unified Element Management System Backup and Recovery Guide Version: V12.14.30 ZTE CORPORATION No. 55, Hi-tech Road South, ShenZhen, P.R.China Postcode: 518057 Tel: +86-755-26771900 Fax:

More information

USB Bare Metal Restore: Getting Started

USB Bare Metal Restore: Getting Started USB Bare Metal Restore: Getting Started Prerequisites Requirements for the target hardware: Must be able to boot from USB Must be on the same network as the Datto device Must be 64 bit hardware Any OSs

More information

ServerPronto Cloud User Guide

ServerPronto Cloud User Guide ServerPronto Cloud User Guide Virtual machines Virtual machines are based on templates and are deployed on hypervisors. Hypervisors give them access to CPU, disk and network resources. The ServerPronto

More information

DS License Server. Installation and Configuration Guide. 3DEXPERIENCE R2014x

DS License Server. Installation and Configuration Guide. 3DEXPERIENCE R2014x DS License Server Installation and Configuration Guide 3DEXPERIENCE R2014x Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology Edition, Version

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

MDM Mass Configuration Tool User s Manual

MDM Mass Configuration Tool User s Manual User s Manual First Edition, October 2010 www.moxa.com/product 2010 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. User s Manual The software described in this manual is

More information

Getting Started. Backup Repositories. Getting Started 1/6

Getting Started. Backup Repositories. Getting Started 1/6 Getting Started 1/6 Getting Started The Server Backup application enables you to backup and restore data that is stored on the OmniVista server. You can specify that a backup be performed immediately,

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Studio 5.0 User s Guide

Studio 5.0 User s Guide Studio 5.0 User s Guide wls-ug-administrator-20060728-05 Revised 8/8/06 ii Copyright 2006 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

DCS-COMPASS project backup procedure C.Q. 29/08/03

DCS-COMPASS project backup procedure C.Q. 29/08/03 DCS-COMPASS project backup procedure C.Q. 29/08/03 The DCS project consists of several parts: the PVSS panels, the PVSS database (containing the datapoint elements and their configuration) and the events

More information

CA /BrightStor ARCserve9 Backup Software

CA /BrightStor ARCserve9 Backup Software CA /BrightStor ARCserve9 Backup Software The CA BrightStor ARCserve9 Backup program can be installed on the TANDBERG NAS and launched from a browser. You can use this software to manage either an autoloader

More information

AppAssure Software Information Collection Utility: AAInfo

AppAssure Software Information Collection Utility: AAInfo AppAssure Software Information Collection Utility: AAInfo Introduction AppAssure Software understands the value of being able to quickly and easily provide our technical staff valuable system information

More information

DS License Server V6R2013x

DS License Server V6R2013x DS License Server V6R2013x DS License Server V6R2013x Installation and Configuration Guide Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology

More information

VOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0

VOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0 VOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0 This document contains the backup and recovery procedures for the NWR CRS VIP. These procedures shall be used by all

More information

Technical Support Set-up Procedure

Technical Support Set-up Procedure Technical Support Set-up Procedure How to Setup the Amazon S3 Application on the DSN-320 Amazon S3 (Simple Storage Service) is an online storage web service offered by AWS (Amazon Web Services), and it

More information

Setting up Hyper-V for 2X VirtualDesktopServer Manual

Setting up Hyper-V for 2X VirtualDesktopServer Manual Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

How To Recover From A Disaster In An Exchange 5.5 Server

How To Recover From A Disaster In An Exchange 5.5 Server 9 Backup and Recovery Operations Systems do not always run as smoothly as you would like. Hardware failures, software failures, human error, hacker attacks, and sometimes even natural disasters can disrupt

More information

Maintaining the Content Server

Maintaining the Content Server CHAPTER 7 This chapter includes the following Content Server maintenance procedures: Backing Up the Content Server, page 7-1 Restoring Files, page 7-3 Upgrading the Content Server, page 7-5 Shutting Down

More information

VMware@SoftLayer Cookbook Backup, Recovery, Archival (BURA)

VMware@SoftLayer Cookbook Backup, Recovery, Archival (BURA) VMware@SoftLayer Cookbook Backup, Recovery, Archival (BURA) IBM Global Technology Services: Khoa Huynh (khoa@us.ibm.com) Daniel De Araujo (ddearaujo@us.ibm.com) Bob Kellenberger (kellenbe@us.ibm.com) 1

More information

ZyWALL OTPv2 Support Notes

ZyWALL OTPv2 Support Notes ZyWALL OTPv2 Support Notes Revision 1.00 September, 2010 Written by CSO Table of Contents 1. Introduction... 3 2. Server Installation... 7 2.1 Pre-requisites... 7 2.2 Installations walk through... 7 3.

More information