Backup process for McAfee devices
|
|
- Johnathan Powell
- 8 years ago
- Views:
Transcription
1 Backup process for McAfee devices ESM (Standalone) Backup The backup process on the ESM is intended to create a backup of the tables on the ESM for restoring the configuration of the ESM. There are two backup types Full or incremental. They are described below. A Full backup is a backup of all database table files uncompressed to a remote storage location. This backup type can back up to a CIFS/NFS location. The storage location is mounted before the backup starts and is checked each time to ensure the backup begins. It is expected that the backup location will contain more than one backup file unless the backup location is maintained by the user. The files are copied uncompressed to the storage location for storage and subsequent restoration. For a list of the tables backed up from the ESM is listed the backup.log file is stored with backup. The path backup files will be copied to appears like this: xx.xx.xx.xx:/backupfolder/etm-xx_9.3.1_2013_12_25_215739_f/ An incremental backup is a backup of ESM configuration files compressed to a local or remote storage location. There is also an option to back up the event/flow/log data for the last 24 hours. (based off last backup time stamp) For a list of the tables backed up from the ESM, open the backup.log file is stored within the backup.zip file each time the backup is run. The backup log file contains the tables that are backed up and the records in each table that was backed up. See the output of the file below: TABLE ADGROPSM ( :12:05) (63928 record (s)) (0 deleted TABLE ADGroup ( :12:05) (336 record (s)) (0 deleted TABLE AGGXCPTN ( :12:05) (4 record (s)) (0 deleted TABLE ASSETGRP ( :12:05) (4 record (s)) (0 deleted TABLE ASSTGRRF ( :12:05) (20014 record (s)) (0 deleted TABLE ASSTVBLT ( :12:05) (2339 record (s)) (0 deleted TABLE ASSTVNDR ( :12:05) (20009 record (s)) (0 deleted TABLE ATCRTRL ( :12:05) (10 record (s)) (0 deleted TABLE ATCRTRLC ( :12:05) (160 record (s)) (0 deleted TABLE Access ( :12:05) (778 record (s)) (170 deleted TABLE Action ( :12:05) (39 record (s)) (0 deleted TABLE Asset ( :12:05) (20009 record (s)) (0 deleted TABLE BLACKLST ( :12:05) (1 record (s)) (0 deleted TABLE BLCKLFFR ( :12:05) (0 record (s)) (0 deleted TABLE CASEVNTS ( :12:05) (203 record (s)) (0 deleted TABLE CHANGELG ( :12:06) (41473 record (s)) (0 deleted TABLE CONDITIN ( :12:06) (26 record (s)) (0 deleted TABLE CaseMgt ( :12:06) (184 record (s)) (0 deleted
2 TABLE CaseOrg ( :12:06) (1 record (s)) (0 deleted TABLE Class ( :12:06) (68 record (s)) (0 deleted TABLE DEVICEFO ( :12:06) (7 record (s)) (0 deleted TABLE DTNRCHMT ( :12:06) (5 record (s)) (0 deleted TABLE DTNRCLDS ( :12:06) (3 record (s)) (0 deleted TABLE DTNRCPSD ( :12:06) (3 record (s)) (0 deleted TABLE DVCFLSJN ( :12:06) (28 record (s)) (67 deleted TABLE GRP ( :12:06) (1 record (s)) (0 deleted TABLE EMLDDRSS ( :12:06) (8 record (s)) (0 deleted TABLE Gro ( :12:06) (3 record (s)) (0 deleted TABLE ESMFLTRS ( :12:06) (0 record (s)) (0 deleted TABLE EVNTFDNG ( :12:06) (3 record (s)) (0 deleted TABLE EXTDVCTT ( :12:06) (259 record (s)) (0 deleted TABLE EXTRNLDV ( :12:06) (109 record (s)) (0 deleted TABLE GeoLoc ( :12:08) ( record (s)) (0 deleted TABLE Groups ( :12:08) (10 record (s)) (0 deleted TABLE HCFILTRS ( :12:08) (0 record (s)) (0 deleted TABLE HLTHSNGS ( :12:08) (16854 record (s)) (0 deleted TABLE Hosts ( :12:08) (489 record (s)) (0 deleted TABLE ICMPType ( :12:08) (66 record (s)) (0 deleted TABLE IPS ( :12:08) (153 record (s)) (2382 deleted TABLE IPSBlob ( :12:09) (731 record (s)) (612 deleted TABLE IPSCHANG ( :12:09) (153 record (s)) (2382 deleted TABLE IPSCheck ( :12:09) (15 record (s)) (0 deleted TABLE ITMRGHTS ( :12:09) (4 record (s)) (0 deleted TABLE LCLSTRNG ( :12:09) ( record (s)) (0 deleted TABLE LOGCATGR ( :12:09) (11 record (s)) (0 deleted TABLE MSSGTMPL ( :12:09) (11 record (s)) (0 deleted TABLE NDDVCNFC ( :12:09) (0 record (s)) (0 deleted TABLE NDDVCSSS ( :12:09) (0 record (s)) (0 deleted TABLE NDDVCVLN ( :12:09) (0 record (s)) (0 deleted TABLE NDDevice ( :12:09) (0 record (s)) (0 deleted TABLE NDEPDVCS ( :12:09) (0 record (s)) (0 deleted TABLE NDEPPRMS ( :12:09) (1 record (s)) (0 deleted TABLE NDFLDRDC ( :12:09) (0 record (s)) (0 deleted TABLE NDFolder ( :12:09) (0 record (s)) (0 deleted TABLE NDIPLoc ( :12:09) (419 record (s)) (0 deleted TABLE NDNDPHST ( :12:09) (0 record (s)) (0 deleted TABLE NDNDPNTP ( :12:09) (0 record (s)) (0 deleted TABLE NDNDPNTS ( :12:09) (0 record (s)) (0 deleted TABLE NDNDPSTR ( :12:09) (0 record (s)) (0 deleted TABLE NDNGHBRS ( :12:09) (0 record (s)) (0 deleted TABLE NDPRMLSN ( :12:09) (0 record (s)) (0 deleted TABLE NDPRMSDL ( :12:09) (1 record (s)) (0 deleted
3 TABLE NDPROCSS ( :12:09) (3 record (s)) (0 deleted TABLE NDPRTCRL ( :12:09) (0 record (s)) (0 deleted TABLE NDParams ( :12:09) (1 record (s)) (0 deleted TABLE NDSRCLTS ( :12:09) (0 record (s)) (0 deleted TABLE NOTIFCTN ( :12:09) (31 record (s)) (0 deleted TABLE NTFCTBRS ( :12:09) (123 record (s)) (53 deleted TABLE NTFCTNCH ( :12:09) (31 record (s)) (0 deleted TABLE NTFCTNCN ( :12:09) (61 record (s)) (1 deleted TABLE NTFCTNML ( :12:09) (0 record (s)) (0 deleted TABLE NTFCTNSR ( :12:09) (0 record (s)) (0 deleted TABLE NTFCTTTR ( :12:09) (326 record (s)) (0 deleted TABLE Notes ( :12:09) (0 record (s)) (0 deleted TABLE Notifica ( :12:09) (7 record (s)) (0 deleted TABLE Query ( :12:09) (1255 record (s)) (0 deleted TABLE RGHTSMNT ( :12:09) (147 record (s)) (0 deleted TABLE RMTCMMND ( :12:09) (1 record (s)) (0 deleted TABLE RMTCMTTR ( :12:09) (3 record (s)) (0 deleted TABLE RPRTCMNT ( :12:09) (2316 record (s)) (0 deleted TABLE RPRTFLDR ( :12:09) (96 record (s)) (0 deleted TABLE RULEPARA ( :12:09) (0 record (s)) (0 deleted TABLE RULEPARM ( :12:09) (404 record (s)) (3 deleted TABLE RULEUSEE ( :12:09) (50968 record (s)) ( deleted TABLE Reports ( :12:09) (900 record (s)) (0 deleted TABLE Rights ( :12:09) (27 record (s)) (0 deleted TABLE Rule ( :12:10) ( record (s)) (0 deleted TABLE RuleVA ( :12:10) (19445 record (s)) (0 deleted TABLE OS ( :12:09) (28 record (s)) (0 deleted TABLE RuleVIN ( :12:10) (16711 record (s)) (0 deleted TABLE PLUGINDT ( :12:09) (0 record (s)) (0 deleted TABLE PREPRCSS ( :12:09) (19 record (s)) (0 deleted TABLE PRPRCPTN ( :12:09) (3 record (s)) (0 deleted TABLE PRPRCSRP ( :12:09) (11 record (s)) (0 deleted TABLE Plugins ( :12:09) (0 record (s)) (0 deleted TABLE PortApps ( :12:09) (96 record (s)) (0 deleted TABLE Ports ( :12:09) (4460 record (s)) (0 deleted TABLE Profile ( :12:09) (11 record (s)) (0 deleted TABLE SENDEMAL ( :12:10) (0 record (s)) (1 deleted TABLE SENDSSLG ( :12:10) (0 record (s)) (0 deleted TABLE SLCTFLDM ( :12:10) (163 record (s)) (0 deleted TABLE SMXRef ( :12:10) (0 record (s)) (0 deleted TABLE SSSTTNGS ( :12:10) (269 record (s)) (0 deleted TABLE STRINGMP ( :12:10) ( record (s)) (0 deleted TABLE Scoring ( :12:10) (3 record (s)) (1 deleted TABLE TAGSVBTS ( :12:10) (74 record (s)) (0 deleted
4 TABLE TGPDTXTN ( :12:10) (57 record (s)) (29 deleted TABLE TGSSTGRP ( :12:10) (31 record (s)) (0 deleted TABLE TGSSTXTN ( :12:10) (64 record (s)) (0 deleted TABLE THRDPNFG ( :12:10) (1223 record (s)) (1701 deleted TABLE THRDPRTP ( :12:10) (440 record (s)) (0 deleted TABLE TPTPPPLC ( :12:10) (14 record (s)) (0 deleted TABLE TRGGRDLM ( :12:10) (2309 record (s)) (1 deleted TABLE USERLCNS ( :12:11) (17 record (s)) (0 deleted TABLE USERSTTS ( :12:11) (1 record (s)) (0 deleted TABLE USRFLTST ( :12:11) (5727 record (s)) (0 deleted TABLE USRPSDJN ( :12:11) (0 record (s)) (0 deleted TABLE USRVWXSN ( :12:11) (0 record (s)) (0 deleted TABLE User_IPS ( :12:11) (14 record (s)) (0 deleted TABLE Users ( :12:11) (32 record (s)) (0 deleted TABLE Tag ( :12:10) (917 record (s)) (0 deleted TABLE UsersPW ( :12:11) (22 record (s)) (0 deleted TABLE TagAsset ( :12:10) (20089 record (s)) (0 deleted TABLE TagRule ( :12:10) ( record (s)) (0 deleted TABLE Theme ( :12:10) (12 record (s)) (0 deleted TABLE Timezone ( :12:10) (74 record (s)) (0 deleted TABLE VAREXCEP ( :12:11) (9 record (s)) (0 deleted TABLE VIEWFLDR ( :12:11) (106 record (s)) (0 deleted TABLE VULNRBLT ( :12:11) (6293 record (s)) (0 deleted TABLE VWCMPNNT ( :12:11) (5362 record (s)) (0 deleted TABLE Triggere ( :12:10) (0 record (s)) (4 deleted TABLE UCFA2C ( :12:10) (3041 record (s)) (0 deleted TABLE Var TABLE View ( :12:11) (129 record (s)) (0 deleted ( :12:11) (893 record (s)) (0 deleted TABLE UCFC2U ( :12:10) (5432 record (s)) (0 deleted TABLE UCFN2U ( :12:10) (58 record (s)) (0 deleted TABLE UCFName ( :12:10) (3388 record (s)) (0 deleted TABLE UPDATBLB ( :12:11) (14 record (s)) (0 deleted TABLE WMIType ( :12:11) (336 record (s)) (0 deleted TABLE WTCHLSLS ( :12:47) ( record (s)) ( deleted TABLE WTCHLSTS ( :12:47) (20 record (s)) (0 deleted TABLE ZONEIPMA ( :12:47) (258 record (s)) (0 deleted TABLE USERFILD ( :12:11) (225 record (s)) (0 deleted TABLE USERFLDS ( :12:11) (228 record (s)) (0 deleted TABLE Zone ( :12:47) (257 record (s)) (0 deleted The backup occurs live so the ESM is not restarted as the backup proceeds. The files are stored into the folder /data_hd /usr/local/ess/dbbackupwork/ where they are tarred up and compressed in a.zip file. The final file is stored in /data_hd/usr/local/ess/dbbackup/ for presentation in the File Maintenance UI
5 in the SIEM GUI. The best way to follow the backup process is by watching the message box in the ESM GUI. It will look something like this: A remote backup type can back up to a CIFS/NFS location. The storage location is mounted before the backup starts and is checked each time to ensure the backup begins. It is expected that the backup location will contain more than one backup file unless the backup location is maintained by the user. The backup files are copied compressed to the storage location for storage and subsequent restoration. For remote folders the path name will look like this: xx.xx.xx.xx:/backupfolder/etm-xx_9.3.1_2013_12_25_021738_i.zip The restore process is used to restore the ESM configuration and data back to the ESM. It works in an opposite manner from the back up process. The file selected from the File Maintenance UI in the SIEM GUI is copied to the /data_hd/usr/local/ess/dbrestore folder. The ESM must be shut down to restore the DB tables correctly. After that process is stopped the.zip file is untarred up and placed in the /data_hd /usr/local/ess/dbbackupwork/ folder to be copied to the correct folders on the ESM. After that the ESM is restarted to recognize the new configuration placed on it. The best way to follow the process is by logging onto the console of the ESM and look at the /var/log/messages file. It will look something like this: Dec 20 02:22:25 McAfee [55337]: RestoreDB - started Dec 20 02:22:25 McAfee [55337]: Opened database - /db2/usr/local/ess/data/ngcp.dfl - system number - 1 Dec 20 02:22:26 McAfee [55337]: RestoreDB - extracting file: - /db1/usr/local/ess/dbrestore/etm- X4_9.3.1_2013_12_19_220919_I.zip
6 Dec 20 02:22:26 McAfee [55337]: Opened database - /db1/usr/local/ess/dbrestore/ngcpold.dfl - system number - 2 Dec 20 02:23:42 McAfee [55337]: RestoreDB - restoring file: - /db1/usr/local/ess/dbrestore/etmxx_9.3.1_2013_12_20_220919_i.zip Dec 20 02:23:42 McAfee [55337]: RestoreDB - restoring on primary.. Dec 20 02:25:48 McAfee [55337]: RestoreDB - restore system tables complete Dec 20 02:25:57 McAfee [55337]: RestoreDB - finished ESM( Redundant) A redundant ESM is limited on the functionality it can perform compared to a primary (standalone) ESM but it will get all settings that a standalone ESM is given to ensure it comes up fully configured when placed in primary mode. An error is given to indicate the backup capability is turned off. The redundant will still have access restore backups that are available on the remote backup folders. ELM The backup process on the ELM is intended to create a backup of the Management DB tables on the ELM for restoring the configuration of the ELM and the log file indexes currently on the ELM. The folders created by the backup and the backup files put there are described below.
7 Remote backup mount point: xx.xx.xx.xx:/backupfolder/ The files/folders created are: NitroGuard/ alloc.conf backupelm.conf customfields.conf das.conf elmer_file_timeout.conf ffg_fws.conf ffg_web.conf fips.conf freetds-gsql.conf globals.conf mgtdbloc.conf network.conf nitrosnmp.conf storage.conf thirdparty.conf vathirdparty.conf buildstamp mgtdb/ NitroError.Log ds2rg.data elm.cfd
8 elm.cfg elm.cpy elm.dfl elm.old elmmsg.txt rg/ rg.data rg2sh.data sh.data sr.data A log file indexes backup is a backup of all database table files (also called the Management DB) uncompressed to a remote storage location. This backup type can back up to a CIFS/NFS location. The storage location is mounted before the backup starts and is checked each time to ensure the backup begins. It is expected that the backup location will contain more than one backup file unless the backup location is maintained by the user. The data index files are copied uncompressed to the storage location for storage and subsequent restoration. For a list of the tables backed up from the ELM is listed above. A configuration backup is a backup of ELM configuration files uncompressed to a remote storage location. These files contain paths and configuration data for the processes that run on the ELM. Some of the configuration is use in the ELM GUI but most is configuration used by the runtime components of the ELM. For a list of the configuration files backed up from the ELM see above. When a backup is started the ELM Properties dialog will show the backup in progress. (see below)
9 A backup will usually complete in 5 10 minutes unless there are connection issues or speed issues copying files to the remote share. You can also follow the process is by logging onto the console of the ELM and look at the /var/log/messages file. It will look something like this: Dec 25 06:33:56 McAfee backupelm[21996]: Starting elm backup.. Dec 25 06:36:15 McAfee backupelm[22016]: Elm backup completed The restore process is used to restore the ELM configuration and log file indexes back to the ELM. It works in an opposite manner from the back up process. The Restore Backup button in the ELM Bakup and restore GUI is pressed and the ELM backup is copied to the /data_hd/usr/local/elm/ folder.
10 The ELM must be shut down to restore the DB tables correctly. After that process is stopped the ELM configuration files are copied to the correct folders on the ELM. After copying is finished the ELM is restarted to recognize the new configuration placed on it. The best way to follow the process is by logging onto the console of the ELM and look at the /var/log/messages file. It will look something like this: Dec 25 06:55:40 McAfee elmd[22713]: Stopping (Parent pid) = Dec 25 06:55:40 McAfee elmd[22713]: Flushing Database /usr/local/elm/mgtdb/elm.dfl Dec 25 06:55:40 McAfee elmd[22713]: Flushing Database /usr/local/elm/mgtdb/rg/rg_1/elmlf_1.dfl Dec 25 06:55:40 McAfee elmd[22713]: Flushing Database /usr/local/elm/mgtdb/rg/rg_2/elmlf_2.dfl Dec 25 06:55:41 McAfee elmd[22713]: Flushing Database /usr/local/elm/mgtdb/rg/rg_3/elmlf_3.dfl Dec 25 06:55:41 McAfee elmd[22713]: Flushing Database completed! Dec 25 06:56:37 McAfee SetStorageConf[3478]: Starting to mount Dec 25 06:56:37 McAfee SetStorageConf[3478]: mount returned [1] for Dec 25 06:56:37 McAfee SetStorageConf[3478]: Verifying NFS224 Dec 25 06:56:37 McAfee SetStorageConf[3478]: Verifying local The ELM restore will finish and you will see an OK in the ELM properties dialog.
11 Receiver (Standalone) There are no specific backup capabilities on the Receiver. The Receiver has a 25 partition design that stores the event/flow data long enough for the ESM to retrieve it off of the device. As long as the ESM is current pulling data over to the ESM the Receiver data is available and can be backed up on the ESM. Receiver (HA) HA Receivers employ a backup mechanism called a redundant device. (like the redundant ESM is to the primary ESM) The data shared between HA receivers keeps a back up active to allow for fail over of the Receiver device. As above, there are no specific backup capabilities on the Receiver. The Receiver has a 25 partition design that stores the event/flow data long enough for the ESM to retrieve it off of the device. As long as the ESM is current pulling data over to the ESM the Receiver data is available and can be backed up on the ESM. ACE There are no specific backup capabilities on the ACE. The ACE has a 25 partition design that stores the event/flow data long enough for the ESM to retrieve it off of the device. As long as the ESM is current pulling data over to the ESM the Receiver data is available and can be backed up on the ESM.
Moving the Web Security Log Database
Moving the Web Security Log Database Topic 50530 Web Security Solutions Version 7.7.x, 7.8.x Updated 22-Oct-2013 Version 7.8 introduces support for the Web Security Log Database on Microsoft SQL Server
More informationMoving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
More informationHow to protect, restore and recover SQL 2005 and SQL 2008 Databases
How to protect, restore and recover SQL 2005 and SQL 2008 Databases Introduction This document discusses steps to set up SQL Server Protection Plans and restore protected databases using our software.
More informationConfiguration Guide. Remote Backups How-To Guide. Overview
Configuration Guide Remote Backups How-To Guide Overview Remote Backups allow you to back-up your data from 1) a ShareCenter TM to either a Remote ShareCenter or Linux Server and 2) Remote ShareCenter
More informationMcAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do?
McAfee SIEM Alarms Setting up and Managing Alarms Introduction McAfee SIEM provides the ability to send alarms on a multitude of conditions. These alarms allow for users to be notified in near real time
More informationHow to Back Up and Restore an ACT! Database Answer ID 19211
How to Back Up and Restore an ACT! Database Answer ID 19211 Please note: Answer ID documents referenced in this article can be located at: http://www.act.com/support/index.cfm (Knowledge base link). The
More informationHyperoo 2.0 A (Very) Quick Start
Hyperoo 2.0 A (Very) Quick Start Download and install the Hyperoo 2.0 beta Hyperoo 2.0 is a client/server based application and as such requires that you install both the Hyperoo Client and Hyperoo Server
More informationMcAfee Enterprise Security Manager 9.3.2
Release Notes McAfee Enterprise Security Manager 9.3.2 Contents About this release New features for 9.3.2 Upgrade instructions for 9.3.2 Find product documentation About this release This document contains
More informationTime Stamp. Instruction Booklet
Time Stamp Instruction Booklet Time Stamp Introductions Time stamp is a useful solution for backing up and restoring system, it backs up the entire computer system to the Backup Zone. Time Stamp is used
More informationBrocade Network Advisor High Availability Using Microsoft Cluster Service
Brocade Network Advisor High Availability Using Microsoft Cluster Service This paper discusses how installing Brocade Network Advisor on a pair of Microsoft Cluster Service nodes provides automatic failover
More informationHow To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
More informationChapter 25 Backup and Restore
System 800xA Training Chapter 25 Backup and Restore TABLE OF CONTENTS Chapter 25 Backup and Restore... 1 25.1 General Information... 2 25.1.1 Objectives... 2 25.1.2 Legend... 2 25.1.3 Reference Documentation...
More informationBackup Server: User Manual. Version 2.1-p2
Backup Server: User Manual Version 2.1-p2 Table of Contents Overview... 1 High-Availability... 1 User Interface... 1 Login... 1 Resources... 1 List of Backups... 2 Resource Configuration... 3 Oracle Database
More informationHow to add your Weebly website to a TotalCloud hosted Server
How to add your Weebly website to a TotalCloud hosted Server Creating your Weebly website: 1.) Go to weebly.com and create a free account. 2.) Build and design your personal website using the Weebly features.
More informationActualtests.com - The Power of Knowing
Explanation: We should use Global Security groups. QUESTION 87 You are the network administrator for Certkiller.com. Your network consists of a single Active Directory domain named Certkiller.com. All
More informationHow To Set Up Dataprotect
How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact
More informationInstructions for update installation of ElsaWin 5.00
Instructions for update installation of ElsaWin 5.00 Page 1 of 21 Contents 1. Requirements... 3 2. Updating to version 5.00... 4 3. Client update... 19 Page 2 of 21 1. Requirements ElsaWin 4.10 must be
More informationSQL Server Replication Guide
SQL Server Replication Guide Rev: 2013-08-08 Sitecore CMS 6.3 and Later SQL Server Replication Guide Table of Contents Chapter 1 SQL Server Replication Guide... 3 1.1 SQL Server Replication Overview...
More informationHow To Run Paragon Boot Camp Backup On A Mac Computer (Windows) On A Pc Or Mac (Windows 2) On An Ntos 2 (Windows 3) On Your Computer Or Ipad (Windows 1) On Pc Or Ipa
PARAGON Software GmbH Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Internet www.paragon-software.com Email sales@paragon-software.com Paragon
More information5.6.3 Lab: Registry Backup and Recovery in Windows XP
5.6.3 Lab: Registry Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up a computer registry. You will also perform a recovery of a computer registry.
More informationBACKUP & RESTORE (FILE SYSTEM)
Table of Contents Table of Contents... 1 Perform a Backup (File System)... 1 What Gets Backed Up... 2 What Does Not Get Backed Up... 3 Perform a Restore... 4 Perform a Backup (File System) The following
More informationSetting up FileMaker 10 Server
Setting up FileMaker 10 Server Note : If your current live Database folder is located in the default database folder ( C:\Program Files\FileMaker\FileMaker Server\Data\Databases ), move\copy this folder
More informationSonicWALL CDP Local Archiving
This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving
More information1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
More informationepolicy Orchestrator Log Files
Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
More informationOnline Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
More informationGWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5
GWAVA 5 Migration Guide for Netware GWAVA 4 to Linux GWAVA 5 Copyright 2010 GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com Overview While GWAVA
More informationMigrating Mobile Security for Enterprise (TMMS) 8.0 to version 9.0
Before Migration Migrating Mobile Security for Enterprise (TMMS) 8.0 to version 9.0 You must have TMMS 8.0/8.0 SP1 installed before upgrading to TMMS 9.0. Pay attention to the following when migrating
More informationVTLBackup4i. Backup your IBM i data to remote location automatically. Quick Reference and Tutorial. Version 02.00
VTLBackup4i Backup your IBM i data to remote location automatically Quick Reference and Tutorial Version 02.00 Manufacture and distributed by VRTech.Biz LTD Last Update:16.9.2013 Contents 1. About VTLBackup4i...
More informationBackup/Restore Utility (Version 2.1)
TOSHIBA Strata CIX Product Bulletin PBCIX-0031 July 31, 2006 Backup/Restore Utility (Version 2.1) Backup/Restore The Backup and Restore Utility is a tool that connects to Stratagy ES, Strata ACD, Strata
More informationSyncThru Database Migration
SyncThru Database Migration Overview Database Migration for SyncThru application is an intuitive tool that enables the data stored in the database of an older version of SyncThru, to be moved to the database
More informationAhsay Offsite Backup Server and Ahsay Replication Server
Ahsay Offsite Backup Server and Ahsay Replication Server v6 Ahsay Systems Corporation Limited 19 April 2013 Ahsay Offsite Backup Server and Ahsay Replication Server Copyright Notice 2013 Ahsay Systems
More informationLieberman Software Corporation Enterprise Random Password Manager
Lieberman Software Corporation Enterprise Random Password Manager RSA envision Ready Implementation Guide Last Modified: January 27, 2011 Partner Information Product Information Partner Name Web Site Product
More informationPractice Fusion API Client Installation Guide for Windows
Practice Fusion API Client Installation Guide for Windows Quickly and easily connect your Results Information System with Practice Fusion s Electronic Health Record (EHR) System Table of Contents Introduction
More informationManaging ACE Software Licenses
CHAPTER 2 This chapter describes how to manage the software licenses for your Cisco 4700 Series Application Control Engine (ACE) appliance. It contains the following major sections: Information about ACE
More informationUsing Symantec NetBackup with Symantec Security Information Manager 4.5
Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights
More informationAlienVault. Unified Security Management 5.x Configuration Backup and Restore
AlienVault Unified Security Management 5.x Configuration Backup and Restore USM 5.x Configuration Backup and Restore Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
More informationOroTimesheet 7 Installation Guide
Installation Guide Copyright 1996-2011 OroLogic Inc. http://www.orologic.com Revision 7.00 Contents I Contents Installation Guide 2 Introduction 2 Installing OroTimesheet 2 Installing OroTimesheet in stand-alone
More informationDSX-HSCS Hot Swap Comm Server
DSX Access Systems, Inc. DSX-HSCS Hot Swap Comm Server WinDSX Hot Swap Redundancy Software Hot-Swap Redundant Communications Server provides continued availability of System Communications and Control
More informationRecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationAKCess Pro Server Backup & Restore Manual
www.akcp.com AKCess Pro Server Backup & Restore Manual Copyright 2015, AKCP Co., Ltd. Table of Contents Introduction... 3 Backup process... 4 Copying the backup export files to other media... 9 Tips for
More informationReflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.
Reflection DBR USER GUIDE 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Page 1 of 1 Table of Contents Overview 3 Reflection DBR Client and Console Installation 4
More informationMcAfee Security Information Event Management (SIEM) Administration Course 101
McAfee Security Information Event Management (SIEM) Administration Course 101 Intel Security Education Services Administration Course The McAfee SIEM Administration course from McAfee Education Services
More informationOnline Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
More informationOnline Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationHow to Test Out Backup & Replication 6.5 for Hyper-V
How to Test Out Backup & Replication 6.5 for Hyper-V Mike Resseler May, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication
More informationEMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager
EMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager Version 2.3 Installation and Configuration Guide 302-002-080 01 Copyright 2013-2015 EMC Corporation. All rights reserved.
More informationAvigilon Control Center System Integration Guide
Avigilon Control Center System Integration Guide with STENTOFON AlphaCom INT-STENTOFON-B-Rev3 Copyright 2013 Avigilon. All rights reserved. No copying, distribution, publication, modification, or incorporation
More informationStep-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
More informationBacking Up TestTrack Native Project Databases
Backing Up TestTrack Native Project Databases TestTrack projects should be backed up regularly. You can use the TestTrack Native Database Backup Command Line Utility to back up TestTrack 2012 and later
More informationStorage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
More informationCommVault Simpana Archive 8.0 Integration Guide
CommVault Simpana Archive 8.0 Integration Guide Data Domain, Inc. 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800 Version 1.0, Revision B September 2, 2009 Copyright 2009
More informationData Test/Restore on Network Drive for Windows 7
Information Technology Services Page 1 of 11 Data Test/Restore on Network Drive for Windows 7 Document No: V 1 Information Technology Services Page 2 of 11 Contents 1.0 Introduction... 3 2.0 Definitions:...
More informationAcronis Recovery TM for Microsoft Exchange TM
Acronis Recovery TM for Microsoft Exchange TM Reviewers Guide Introduction This guide is designed for members of the media, analysts and user organizations who will be evaluating Acronis Recovery for Microsoft
More informationSynchronizer Installation
Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient
More informationSonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in
More informationecopy ShareScan 5.0 SQL installs guide
ecopy ShareScan 5.0 SQL installs guide Created by Rob O Leary, 3/28/2011 5.0 SQL installs guide 2 ShareScan 5.0 has two SQL setup types: Complete: Installs and connects the local MS SQL Server 2008 Express
More informationTSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More informationCompiere ERP & CRM Installation Instructions Linux System - EnterpriseDB
Compiere ERP & CRM Installation Instructions Linux System - EnterpriseDB Compiere Learning Services Division Copyright 2007 Compiere, inc. All rights reserved www.compiere.com Table of Contents Compiere
More informationInstallation of MicroSoft Active Directory
Installation of MicroSoft Active Directory Before you start following this article you must be aware this is simply a lab setup and you need to assign relevant ip address, hostnames & domain names which
More informationManaging Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
More informationSourceAnywhere Service Configurator can be launched from Start -> All Programs -> Dynamsoft SourceAnywhere Server.
Contents For Administrators... 3 Set up SourceAnywhere... 3 SourceAnywhere Service Configurator... 3 Start Service... 3 IP & Port... 3 SQL Connection... 4 SourceAnywhere Server Manager... 4 Add User...
More informationUpgrade Guide BES12. Version 12.1
Upgrade Guide BES12 Version 12.1 Published: 2015-02-25 SWD-20150413111718083 Contents Supported upgrade environments...4 Upgrading from BES12 version 12.0 to BES12 version 12.1...5 Preupgrade tasks...5
More informationVess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved.
Vess A2000 Series NVR Storage Appliance Windows Recovery Instructions Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Different ways to backup the system disk 2 Before
More informationNexentaConnect for VMware Virtual SAN
NexentaConnect for VMware Virtual SAN User Guide 1.0.2 FP3 Date: April, 2016 Subject: NexentaConnect for VMware Virtual SAN User Guide Software: NexentaConnect for VMware Virtual SAN Software Version:
More informationZen Internet. Online Data Backup. Zen Vault Professional Plug-ins. Issue: 2.0.08
Zen Internet Online Data Backup Zen Vault Professional Plug-ins Issue: 2.0.08 Contents 1 Plug-in Installer... 3 1.1 Installation and Configuration... 3 2 Plug-ins... 5 2.1 Email Notification... 5 2.1.1
More informationWA1791 Designing and Developing Secure Web Services. Classroom Setup Guide. Web Age Solutions Inc. Web Age Solutions Inc. 1
WA1791 Designing and Developing Secure Web Services Classroom Setup Guide Web Age Solutions Inc. Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software
More informationUsing AppMetrics to Handle Hung Components and Applications
Using AppMetrics to Handle Hung Components and Applications AppMetrics has the ability to detect hung COM+ components and applications, providing a means of alerting staff to situations where critical
More informationRSA Authentication Manager
McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: RSA Authentication Manager February 26, 2015 RSA Authentication Manager Page 1 of 9 Important Note: The information contained
More informationLICENSE4J FLOATING LICENSE SERVER USER GUIDE
LICENSE4J FLOATING LICENSE SERVER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 2 Floating License Usage... 2 Installation... 4 Windows Installation... 4 Linux
More informationNote: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.
Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.
More informationClient for Macintosh
Client for Macintosh Installation Instructions Sequencher Server Network Overview Page 2 Installing the KeyAccess Client Page 3 Logging on to the Server on OSX Page 4 Logging on to the Server in Classic
More informationPerforming Administrative Tasks
This chapter describes how to perform administrative tasks using Cisco CMX. Users who are assigned administration privileges can perform administrative tasks. Cisco CMX User Accounts, page 1 Backing Up
More informationFileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
More informationAvira Management Console AMC server configuration for managing online remote computers. HowTo
Avira Management Console AMC server configuration for managing online remote computers HowTo Table of Contents 1. General... 3 2. Network layout plan... 3 3. Configuration... 4 3.1 Port forwarding...4
More informationCONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
More informationLivestock Office Backup Database
Livestock Office Backup Database 29/01/2015 Contents Backup Database... 2 Manual Backup... 2 System Management Backup Options... 4 Run Now... 5 Schedule Backup... 6 Tape Backup... 8 Restore Backup... 8
More informationTSM Studio Server User Guide 2.9.0.0
TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio
More informationAttix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
More informationHP Data Protector Integration with Autonomy IDOL Server
HP Data Protector Integration with Autonomy IDOL Server Introducing e-discovery for HP Data Protector environments Technical white paper Table of contents Summary... 2 Introduction... 2 Integration concepts...
More informationNetNumen U31 R06. Backup and Recovery Guide. Unified Element Management System. Version: V12.14.30
NetNumen U31 R06 Unified Element Management System Backup and Recovery Guide Version: V12.14.30 ZTE CORPORATION No. 55, Hi-tech Road South, ShenZhen, P.R.China Postcode: 518057 Tel: +86-755-26771900 Fax:
More informationUSB Bare Metal Restore: Getting Started
USB Bare Metal Restore: Getting Started Prerequisites Requirements for the target hardware: Must be able to boot from USB Must be on the same network as the Datto device Must be 64 bit hardware Any OSs
More informationServerPronto Cloud User Guide
ServerPronto Cloud User Guide Virtual machines Virtual machines are based on templates and are deployed on hypervisors. Hypervisors give them access to CPU, disk and network resources. The ServerPronto
More informationDS License Server. Installation and Configuration Guide. 3DEXPERIENCE R2014x
DS License Server Installation and Configuration Guide 3DEXPERIENCE R2014x Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology Edition, Version
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationMDM Mass Configuration Tool User s Manual
User s Manual First Edition, October 2010 www.moxa.com/product 2010 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. User s Manual The software described in this manual is
More informationGetting Started. Backup Repositories. Getting Started 1/6
Getting Started 1/6 Getting Started The Server Backup application enables you to backup and restore data that is stored on the OmniVista server. You can specify that a backup be performed immediately,
More informationSetting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationStudio 5.0 User s Guide
Studio 5.0 User s Guide wls-ug-administrator-20060728-05 Revised 8/8/06 ii Copyright 2006 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,
More informationDCS-COMPASS project backup procedure C.Q. 29/08/03
DCS-COMPASS project backup procedure C.Q. 29/08/03 The DCS project consists of several parts: the PVSS panels, the PVSS database (containing the datapoint elements and their configuration) and the events
More informationCA /BrightStor ARCserve9 Backup Software
CA /BrightStor ARCserve9 Backup Software The CA BrightStor ARCserve9 Backup program can be installed on the TANDBERG NAS and launched from a browser. You can use this software to manage either an autoloader
More informationAppAssure Software Information Collection Utility: AAInfo
AppAssure Software Information Collection Utility: AAInfo Introduction AppAssure Software understands the value of being able to quickly and easily provide our technical staff valuable system information
More informationDS License Server V6R2013x
DS License Server V6R2013x DS License Server V6R2013x Installation and Configuration Guide Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology
More informationVOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0
VOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0 This document contains the backup and recovery procedures for the NWR CRS VIP. These procedures shall be used by all
More informationTechnical Support Set-up Procedure
Technical Support Set-up Procedure How to Setup the Amazon S3 Application on the DSN-320 Amazon S3 (Simple Storage Service) is an online storage web service offered by AWS (Amazon Web Services), and it
More informationSetting up Hyper-V for 2X VirtualDesktopServer Manual
Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationHow To Recover From A Disaster In An Exchange 5.5 Server
9 Backup and Recovery Operations Systems do not always run as smoothly as you would like. Hardware failures, software failures, human error, hacker attacks, and sometimes even natural disasters can disrupt
More informationMaintaining the Content Server
CHAPTER 7 This chapter includes the following Content Server maintenance procedures: Backing Up the Content Server, page 7-1 Restoring Files, page 7-3 Upgrading the Content Server, page 7-5 Shutting Down
More informationVMware@SoftLayer Cookbook Backup, Recovery, Archival (BURA)
VMware@SoftLayer Cookbook Backup, Recovery, Archival (BURA) IBM Global Technology Services: Khoa Huynh (khoa@us.ibm.com) Daniel De Araujo (ddearaujo@us.ibm.com) Bob Kellenberger (kellenbe@us.ibm.com) 1
More informationZyWALL OTPv2 Support Notes
ZyWALL OTPv2 Support Notes Revision 1.00 September, 2010 Written by CSO Table of Contents 1. Introduction... 3 2. Server Installation... 7 2.1 Pre-requisites... 7 2.2 Installations walk through... 7 3.
More information