I. If you are running a Release 9.0 CommCell then please follow these auditing steps... 2
|
|
- Beverly Gallagher
- 8 years ago
- Views:
Transcription
1 June 29, 2011 As a CommVault capacity licensing customer, we are notifying you of the following updated features in the Capacity Licensing Program related to audit reporting. Customers covered by an Auditing capacity licensing agreement are bound by periodic reporting procedures to validate all licensed CommCells are within the licensed usage levels and initiate required reconciliation of excess usage. In an effort to automate and streamline the Capacity Licensing Program we have introduced several new options within the Simpana 9.0 platform to help automate the reporting process. This document provides new guidelines and recommendations for those users. We would like to remind all Simpana 9.0 CLA customers currently in an Audit capacity licensing agreement that a reporting-free option exists in the Capacity Licensing Program which utilizes the automatic capacity measurement and alerting controls in the Simpana 9.0 platform. An option exists for CommCell IDs to be provisioned with the licensed quantity and no expiration windows will be applied to the licensed software. This option will eliminate the need for periodic reporting and reconciliation; rather the customer can track usage using the software capacity measurement tool and alerts and contact the account team when new capacity is desired. Please contact the CLA-Help alias for more details on that program. Please forward any questions to CLA-Help@Commvault.com. Thank You, CommVault Licensing Team Recommendations I. If you are running a Release 9.0 CommCell then please follow these auditing steps Release 9: Detailed Usage Reporting from the License Summary Report... 2 II. If you are running a Release 8.0 CommCell then please follow these auditing steps III. If you are running a Release 7.0 CommCell then please follow these auditing steps IV. Data Usage Reporting Rules... 7 Updates to the Data Protection Usage Algorithm... 7 Updates to the Reporting Utility... 8 Reviewing the Output to find Older or Orphaned Policies to Filter... 8 V. Capacity Program Reporting Rules Data Protection Usage Rules Data Archive Usage Rules... 12
2 I. If you are running a Release 9.0 CommCell then please follow these auditing steps. This procedure can be used to measure the active capacity usage on a 9.0 CommCell for sizing or audit purposes. As of 9.0 SP2A (May), new automated reporting options are now available to the user to simplify audit needs. The audit report can be run directly from the CommCell reporting features eliminating the need to run any qscript routines. The CommCell License summary report now includes an option to report on the capacity usage levels, which include the client level details. The user can create a scheduled report job to run automatically at each defined audit period and direct the report output to an addressed to the CLA help alias. The report action details are outlined below or please follow this BOL link for guided steps: (Create/Template/Schedule a license summary report for CLA Usage ) The License Administration / Capacity Dashboard view shows a summary of active usage at any point in time. This is active on all 9.0 SP2A CommCells. The graphical report view can be saved as a report file and used for audit purposes. Please follow the steps outlined under this books-on-line link (Release 9.0 Capacity License Dashboard) to monitor the active levels at all times. Release 9: Detailed Usage Reporting from the License Summary Report Determining the current CommCell actual usage is now available directly off the CommCell License Summary report. When you select the include Capacity Usage option on the summary report it will automatically include the detailed current usage report in the output. This new enhancement was introduced with 9.0 SP2 (May 2010) and it replaces the need to run the external reporting script on a 9.0 active CommCell. Please note that a special reporting option exists in this report to include Imported Jobs (EDC) in the output. This is used with the External Data Connector use-case when third party backup server jobs have been ingested for reporting purposes. Clients/jobs associated with the EDC process are normally imported in the deconfigured state (license-free) and, by default, those jobs are excluded from capacity usage reporting. In this special use-case it can be quite helpful to use the capacity report to help size and scope a site level migration Page 2 CommVault Capacity Licensing Program: Audit Reporting Recommendations
3 opportunity after the external clients and job details have been imported into the CommCell. This option is designed to over-ride the normal reporting filter and include the usage details on the deconfigured clients; this option should not be used with a CLA audit report. In all other normal CommCell operations that option should be left blank. Page 3 CommVault Capacity Licensing Program: Audit Reporting Recommendations
4 II. If you are running a Release 8.0 CommCell then please follow these auditing steps. This procedure can be used to measure the active capacity usage on an 8.0 CommCell for sizing or audit purposes. The output text file will provide a detailed listing of the client policy usage charges including a summary of the Cell-level usage charges at the bottom of the report. Begin by downloading and applying update or 8.0 SP6 1 to the CommServe machine; this update can be downloaded from the Maintenance Advantage or Automatic Updates site. The update installs the current qscript reporting utility to the match the latest algorithm and filter features. After installing 8.0 SP5 and update 19650, the user should log onto the CommServe windows server, open a command prompt and follow these simple steps to produce the usage report. 1. Change to the <BASE> directory under the Programs\Simpana (or OEM equivalent) 2. Login using the Qlogin command, specify an CV Administrator username and password Using the Qlogin command, you can start a User login session, removing the need to log in for every command. You will need to sign-in using a CommCell Administrator user profile. If you are running on a Windows2008 server you may need to run the command line session with the Windows Administrator privileges. Once the Qlogin command is successful, the login session for all computers remains valid until you explicitly log out using the Qlogout command. This is true for all command sessions, not just the one for which the login took place. If you have an error logging in, then you may already have a session open. Try using the Qlogout command and retry the Qlogin sequence. 3. Use the qoperation execscript command to run the reporting routine and create the results output file. This script is used to summarize the overall current data usage across the entire CommCell. The report includes Data Protection and Data Archive usage for the and Core categories. qoperation.exe execscript -sn CommCellAverageDataTransfer.sql >> F txt The reporting logic will analyze all the active jobs on file CommCell and produce a summary report for current capacity usage under the Data Protection and Data Archive rules based on each unique, active Client\Agent\DataSet\Subclient policy within the CommCell SP6 was released June 20, 2010 and this includes the prior update. Page 4 CommVault Capacity Licensing Program: Audit Reporting Recommendations
5 qoperation.exe execscript -sn CommCellAverageDataTransfer.sql si HideClientName >> F txt An additional option is now available to hide the client name property in the output results. When this option is set the client name field will contain XXX. This can be used with security conscious customers who wish to hide the common display name of the client from the job results output. To engage this feature, add the -si HideClientName option to the script input. The results will be posted to a text based output file as designated by the qscript command. We recommend that users should name that file with CommCell ID and the run date to help tracking and auditing. Enter your command line script with the correct qualifiers and it will run and produce the output file. The output file now lists the JobID to identify the job that qualified for usage measurement based on the rules, only FULL or SYNFULL jobs are analyzed and included in the report for Data Protection, and the results now use terabytes (TB) as the unit of measure. 4. Please send the output file as an attachment to the CLA Help alias as instructed in the audit notice. The output file is now standardized for both versions and it will only list the policies /jobs that qualified for the usage charges in the report summary. In addition, the output now presents the usage in Terabyte (TB) units so the user can immediately read the results. This text file can be opened with Excel to allow sorting or filtering of the detailed results for further review. Page 5 CommVault Capacity Licensing Program: Audit Reporting Recommendations
6 III. If you are running a Release 7.0 CommCell then please follow these auditing steps. The 7.0 CommCell environment does not support the qscript framework so direct reporting is not possible within the CLA measurement framework. The recommended reporting approach is to stage a new 9.0 SP-Latest (empty) CommServe instance, upload a recent 7.0 CommCell DR backup instance collected from the customer and use the CommserveDisasterRecoveryGUI.exe tool to import that 7.0 database. The tool usage methods are available on this BOL link ( CommserveDisasterRecoveryGUI Tool ). After that step, the dbupgradeui.exe procedure should be used to upgrade the system to the 9.0 level. The tool usage methods are available on this BOL link ( 9.0 DB_UpgradeUI Tool ). Follow steps 1-4 from the BOL methods. This procedure will produce a staged-9.0 CS using the 7.0 operational data. The user can start the services and run the standard CLA reports using the 9.0 methods listed above. Typically a Virtual Machine (Windows Guest Host) can be used with this method to support the staged-9.0 CS instance. We would recommend 7.0 users contact the Support desk for assistance before they try this procedure the first time. Since many existing customers are evaluating the benefits of a conversion into the CLA licensing program in combination with upgrade plans to 9.0, this 7.0 auditing process may only need to be employed once for the initial sizing /quoting process. The existing 7.0 job summary reports will not provide an accurate answer for CLA quoting. Page 6 CommVault Capacity Licensing Program: Audit Reporting Recommendations
7 IV. Data Usage Reporting Rules Updates to the Data Protection Usage Algorithm The Data Protection usage algorithm now assesses the LAST Full or Synthetic Full backup job per unique policy (vs. prior MAXIMUM/90 day rule). This produces a more accurate measurement of the active Data Protection levels within the environment and allows a user to correct mistakes for example, if a rogue backup job increased 50% in size because users dumped some contraband data onto a file server, the Administrator can adjust the backup policy filters and run a new Full job to skip that data and reset the usage measurement assessed on that policy. The algorithm will now exclude any client or agent policy that has been deconfigured which releases the license and prevents the ability to run new backup or archive jobs. Additionally, the exclusion filter will now apply to any subclient policy which has the backup or archive service disabled. This filter can be used to disqualify older clients or subclients that were configured for a special one-time use or apply to older clients that have been deconfigured. If the backup services are re-enabled or the client/agent is reconfigured for new use then it will be included in the usage calculation. After disabling the policy, you should run the data aging cycle once to see the measurement report reflect the filter. Any existing backup job or archive job associated to those de-activated policies will remain available for restore until that job is normally aged out of the Storage Policy. Use this option to filter out older clients that are obsolete and no longer actively backed up in your Protection schedule. A Release 9.0 CommCell now offers simple and convenient new options to deconfigure a client or agent policy from a right click option. See link: (Deconfiguring / Releasing Licenses with 9.0 CommCells). Page 7 CommVault Capacity Licensing Program: Audit Reporting Recommendations
8 Updates to the Reporting Utility The utility now analyzes both the Data Protection (Backup) and Data Archive usage measurements for the entire CommCell within a single run/report. The reporting procedure no longer requires any specific date ranges or extra arguments. This change simplifies reporting. Reviewing the Output to find Older or Orphaned Policies to Filter The output from the capacity detailed report will provide the line item usage charges which are accumulated and displayed in the dashboard view. The report provides a summary of the categorized usage in the header and each line in the report will detail the unique client/agent/dataset/subclient policy (App ID combination) along with the usage value, the JOB ID and the class attributes. This report is quite useful in identifying older clients that are no longer actively run but remain configured for use and roll-up into aggregate usage charge. The report is designed to allow the administrator to review the Page 8 CommVault Capacity Licensing Program: Audit Reporting Recommendations
9 JOBID listing column to identify JOBID sequence numbers from much earlier operational periods. In many cases, that cans distinguish a client that is no longer run or was created for a one-time need. The Administrator can investigate those client policies and potentially deconfigure the client/agent or disable the action on the subclient to remove them from the usage charges. This affords the administrator with a simple and easy housekeeping method to keep the active policy configuration in check and avoid unnecessary usage charges on migrated or obsoleted clients. Core Backup Size: GB Backup Size: GB Core Archive Size: 6.53 GB Archive Size: GB Job ID Job Type Client Agent Backup Set Subclient Storage Policy Job Size Deduplication Secondary Encryption Backup accord Linux File System defaultbackupset default Bronze Sandbox 1.47 GB Yes No Backup appweb01 Windows File System defaultbackupset default Gold General Data GB Yes No Backup appweb02 Windows File System defaultbackupset default Gold General Data GB Yes No Backup Core archiverex Exchange Mailbox MB group1 Grp1 Silver Compliance 7.89 GB No No Backup Core archiverex Exchange Mailbox MB group2 Grp2 Silver Compliance 3.21 GB No No Backup BXman Linux File System defaultbackupset default Gold General Data 2.06 GB Yes No Backup bes01 SQL Server defaultbackupset default Gold General Data 1.79 GB Yes No Backup bes01 Windows File System defaultbackupset default Gold General Data GB Yes No Backup bes02 Windows File System defaultbackupset default Gold Compliance GB Yes No Backup beuhler Windows bit File System defaultbackupset default Gold Compliance GB Yes No Backup Core billsys Solaris File System defaultbackupset default Silver Compliance GB No No Page 9 CommVault Capacity Licensing Program: Audit Reporting Recommendations
10 V. Capacity Program Reporting Rules Data Protection Usage Rules Data Protection usage is measured based on the amount of active protection policies in the CommCell. The measurement summarizes the size of the last active FULL or SYNTHETIC FULL job for each unique, individual active client/subclient policy within the CommCell. A unique, active client policy is defined as the combination of the Client/BackupSet/Agent/Subclient otherwise referred to as the APP-ID global unique identifier (GUID). The measurement is based on the entire CommCell and it is calculated in Front-End -TB units. Each active backup client/subclient policy is checked within the usage algorithm. Only the Last Full or Synthetic Full backup job applies. If a client is no longer actively used create new backup jobs then it should be deconfigured or marked disabled to avoid usage charges. to The cumulative usage charge is assessed at the whole CommCell level and reported in the Dashboard view. Jobs may be classified under the or Core rules depending on the feature options employed on the policy. All active policies apply there is no time range applied. Page 10 CommVault Capacity Licensing Program: Audit Reporting Recommendations
11 The following table summarizes the core usage measurement rules and filters applied in the Data Protection CLA licensing program. Data Protection Usage What usage do we measure? What makes usage increase? Summary of the Incremental growth in the overall data set Last Full or SFull that the client backup policy protects will job for each increase the size of FULL/SFULL job, unique active increasing the usage figure backup policy Deploying new clients or subclient policies on the entire against new content sources will increase CommCell the usage figure Active backup clients only enabled for backup services What makes usage decrease? If the source data is deleted or archived from a client, then typically the next Full or SFull job size will show a decrease in DP usage. Deactivating/ deconfiguring clients, this will release the client license and all subclient policies under that client will be excluded from the measurement Deleting a subclient policy, yet retaining the backups will also exclude those jobs from the measurement. Deactivating the subclient by disabling the backup service will also drop it from the measurement service, it if it enabled later it will apply to the measurement Deleting the LAST Full or SFULL backup job can reduce the usage slightly if the prior FULL was incrementally smaller. This can be useful if a random FULL spiked in size. What do we exclude in the measurement rules? Multiple instances of same backup job across different copies in the Storage Policy made with AuxCopy; we only measure the LAST FULL or SFULL job, we do not consider any multiple copies In the event that the same subclient policy is repeated over two BackupSets we only analyze the largest (this eliminates double counts when you run redundant Full jobs for compliance reasons) Jobs from deconfigured clients or agents3 (When the license has been released. If the client is reconfigured for new backup operations then it will start counting again.) Jobs from deleted subclient policies; the backup job is retained for restore but the subclient is no longer available for new backups Secondary, deduped SILO Backup Jobs which are part of the CDSO option. In this case the original backup job is charged, we exclude the consolidated /secondary SILO backup jobs. All Legal Hold jobs, these jobs are charged as Data Archive capacity. Content Indexing / Content Director jobs are excluded Imported foreign jobs which reflect jobs that are actively managed in other CommCells (GRC option) or 3rd party jobs from the External Data Collector EDC (these jobs qualify as readonly, deconfigured clients) Combined backup/archive subclients which employ the Archive-Add-in option are classified as archive jobs and will be reported under the DataArchive capacity. 3 A deconfigured client will release the license and exclude its jobs from the CLA measurement process. As long as the actual client is not deleted, those jobs will remain active in the Storage Policy for restore needs. If the client is enabled (reconfigure = license is reinstalled) so it can run new backup jobs then it will automatically count against the CLA measurement. We suggest using this method when a client/dataset is migrated to a new server, deconfigure the original client and reinstall the client on the new server. This will avoid double counts under the CLA methodology. Page 11 CommVault Capacity Licensing Program: Audit Reporting Recommendations
12 Data Archive Usage Rules Data Archive usage is measured based on the amount of active archive policies in the CommCell. The measurement summarizes the cumulative size of the all active archive jobs, legal hold jobs or content store jobs (objects) currently managed within the Storage Policies in the CommCell. Each archive job will be added to the usage figure although this does not consider the number of copies. The measurement is based on the entire CommCell and it is calculated in Front-End -TB units. Each active archive client/subclient policy is checked within the usage algorithm. We add up the size of each Archive job (independent of number of copies). If a client is no longer actively used to create new backup jobs then it should be deconfigured or marked disabled to avoid usage charges. The cumulative usage charge is assessed at the whole CommCell level and reported in the Dashboard view. Jobs may be classified under the or Core rules depending on the feature options employed on the policy. Page 12 CommVault Capacity Licensing Program: Audit Reporting Recommendations
13 The following table summarizes the core usage measurement rules and filters applied in the Data Archive CLA licensing program. Data Archive Usage What usage do we measure? Total size of all active archive jobs on the system All Legal Hold jobs, these jobs are charged as Data Archive capacity All Content Store jobs All Content Archive (Archive- Add-on) clients - last cycle jobs What makes usage increase? Each new archive job will incrementally add to the overall total Data Archive TB usage figure What makes usage decrease? Archive jobs that age off or that are fully deleted are no longer active and are excluded from the measurement. Deleting a subclient policy, yet retaining the archive job will also exclude those jobs from the measurement. Deactivating the subclient by disabling the archive service will also drop it from the measurement service, it if it enabled later it will apply to the measurement What do we exclude in the measurement rules? Multiple instances of same archive job across different copies in the Storage Policy made with AuxCopy Jobs from deconfigured clients (disabled for new Archive services) Secondary, deduped SILO Backup Jobs which are part of the CDSO option. In this case the original archive job is charged, we exclude the consolidated /secondary SILO backup jobs. Imported foreign jobs which reflect jobs that are actively managed in other CommCells (GRC option) or 3rd party jobs from the External Data Collector EDC (these jobs qualify as read-only, deconfigured clients) Content Indexing or Content Director jobs Please note that 9.0 SP2 introduced a change in the Application Size reporting algorithm for jobs that backup/protect file environments with sparse attributes. File System backup jobs run after applying SP2 will now report the reduced or sparse size in the job details. This change is critical in systems that employ backup and archive strategies since archived stub files use the sparse setting. This change ensures that customers can reap the benefits of using an integrated backup and archive strategy to contain the overall usage charges on the backup environment by frequently archiving off older data (reducing the active size of the production store/backup size) to more cost efficient locations. Page 13 CommVault Capacity Licensing Program: Audit Reporting Recommendations
External Data Connector (EMC Networker)
Page 1 of 26 External Data Connector (EMC Networker) TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS INSTALLATION (WINDOWS) INSTALLATION (UNIX) GETTING STARTED Perform a Discovery Perform a Migration ADVANCED
More information(Subject to Change Without Notice) COMMVAULT SIMPANA PRICE LIST
Applicable as of 7/1/2015 (Subject to Change Without Notice) COMMVAULT SIMPANA PRICE LIST Short Name Short Description Version Dependency Part Number US Price CA Price Current Promotions This section highlights
More informationTABLE OF CONTENTS. Quick Start Guide - Active Directory idataagent. Page 1 of 25 OVERVIEW NEW FEATURES SYSTEM REQUIREMENTS SUPPORTED FEATURES
Page 1 of 25 Quick Start Guide - Active Directory idataagent TABLE OF CONTENTS OVERVIEW NEW FEATURES SYSTEM REQUIREMENTS SUPPORTED FEATURES GETTING STARTED - ACTIVE DIRECTORY DEPLOYMENT GETTING STARTED
More informationFeatures - Microsoft Data Protection Manager
Page 1 of 36 Features - Microsoft Data Protection Manager TABLE OF CONTENTS OVERVIEW NEW FEATURES SYSTEM REQUIREMENTS SUPPORTED FEATURES GETTING STARTED - DATA PROTECTION MANAGER DEPLOYMENT GETTING STARTED
More informationTABLE OF CONTENTS. Features - SharePoint Server idataagent. Page 1 of 72 OVERVIEW SYSTEM REQUIREMENTS - SHAREPOINT SERVER IDATAAGENT INSTALLATION
Page 1 of 72 Features - SharePoint Server idataagent TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS - SHAREPOINT SERVER IDATAAGENT INSTALLATION Install the SharePoint Server idataagent BACKUP DATA - SHAREPOINT
More informationCommVault Simpana Archive 8.0 Integration Guide
CommVault Simpana Archive 8.0 Integration Guide Data Domain, Inc. 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800 Version 1.0, Revision B September 2, 2009 Copyright 2009
More informationAdministration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201
Administration GUIDE SharePoint Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Getting Started - SharePoint Server idataagent Overview Deployment Configuration Decision Table
More informationQuick Start - NetApp File Archiver
Page 1 of 19 Quick Start - NetApp File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method 2: Install
More informationTABLE OF CONTENTS. User Guide - Active Directory idataagent. Page 1 of 95 OVERVIEW NEW FEATURES SYSTEM REQUIREMENTS DEPLOYMENT
User Guide - Active Directory idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Comprehensive Data Protection and Recovery Point-in-Time Recovery Efficient Job Management and Recovery Backup
More informationAdministration Guide - OnePass Agent for Windows File System
Page 1 of 44 Administration Guide - OnePass Agent for Windows File System TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive
More informationHow To Use A Microsoft Microsoft Database Server With Idataagent And Restore On A Microsable 2.5 (Windows) And Microsourge (Windows 2) On A Pcode (Windows 3) On An Uniden 2
Page 1 of 175 User Guide - SQL Server idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology NEW FEATURES SYSTEM REQUIREMENTS SUPPORTED FEATURES GETTING STARTED SQL
More informationQuick Start - Generic NAS File Archiver
Page 1 of 19 Quick Start - Generic NAS File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method 2:
More informationAdministration GUIDE. SQL Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 240
Administration GUIDE SQL Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 240 User Guide - SQL Server idataagent Table of Contents Overview System Requirements Supported Features
More informationRecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationTABLE OF CONTENTS GETTING STARTED ADVANCED. User Guide - SQL Server idataagent. Page 1 of 175 OVERVIEW NEW FEATURES SYSTEM REQUIREMENTS
Page 1 of 175 User Guide - SQL Server idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology NEW FEATURES SYSTEM REQUIREMENTS SUPPORTED FEATURES GETTING STARTED SQL
More informationOnline Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
More informationQuick Start - Virtual Server idataagent (Microsoft/Hyper-V)
Page 1 of 19 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data
More information1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
More informationOnline Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationOnline Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
More informationHow To Manage Your Email On A Microsoft Powerbook 2.5 (For Microsoft) On A Macbook 2 (For A Mac) On An Iphone Or Ipad (For An Ipad) On Your Pc Or Macbook
Page 1 of 285 User Guide - Exchange Mailbox idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE MAILBOX IDATAAGENT DEPLOYMENT -
More informationTABLE OF CONTENTS. Quick Start Guide - SQL Server idataagent. Page 1 of 53 OVERVIEW NEW FEATURES SYSTEM REQUIREMENTS SUPPORTED FEATURES
Page 1 of 53 Quick Start Guide - SQL Server idataagent TABLE OF CONTENTS OVERVIEW NEW FEATURES SYSTEM REQUIREMENTS SUPPORTED FEATURES GETTING STARTED - SQL SERVER DEPLOYMENT GETTING STARTED - SQL SERVER
More informationDiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
More informationTABLE OF CONTENTS GETTING STARTED ADVANCED OVERVIEW NEW FEATURES SYSTEM REQUIREMENTS SUPPORTED FEATURES DEPLOYMENT CONFIGURATION BACKUP RESTORE
Page 1 of 104 User Guide - Macintosh File System idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Simplified Data Management Point-In-Time Recovery Backup and Recovery Failovers Efficient
More informationXopero Centrally managed backup solution. User Manual
Centrally managed backup solution User Manual Contents Desktop application...2 Requirements...2 The installation process...3 Logging in to the application...6 First logging in to the application...7 First
More informationHow To Install The Exchange Idataagent On A Windows 7.5.1 (Windows 7) (Windows 8) (Powerpoint) (For Windows 7) And Windows 7 (Windows) (Netware) (Operations) (X
Page 1 of 208 User Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS
More informationTABLE OF CONTENTS. User Guide - Active Directory idataagent. Page 1 of 85 OVERVIEW NEW FEATURES SYSTEM REQUIREMENTS DEPLOYMENT
Page 1 of 85 User Guide - Active Directory idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Comprehensive Data Protection and Recovery Point-in-Time Recovery Efficient Job Management and
More informationREDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION
REDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION SD003 V2.3 Issue Date 02 July 2014 1) SERVICE OVERVIEW The Managed Backup Service (MBS) is a streamlined alternative to traditional backup and restore
More informationWimba Pronto. Version 3.1. Administrator Guide
Wimba Pronto Version 3.1 Administrator Guide Wimba Pronto 3.1 Administrator Guide Overview 1 Accessing the Wimba Pronto Administration Interface 2 Managing Multiple Institutions 3 General Features 4 Configuring
More informationTSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More informationQuick Start - Virtual Server idataagent (VMware)
Page 1 of 24 Quick Start - Virtual Server idataagent (VMware) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data Minimal
More informationUser Guide - Exchange Public Folder idataagent
Page 1 of 191 User Guide - Exchange Public Folder idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE PUBLIC FOLDER IDATAAGENT DEPLOYMENT
More informationSecureVault Online Backup Service FAQ
SecureVault Online Backup Service FAQ C0110 SecureVault FAQ (EN) - 1 - Rev. 19-Nov-2007 Table of Contents 1. General 4 Q1. Can I exchange the client type between SecureVault PC Backup Manager and SecureVault
More informationRelease 2.0. Cox Business Online Backup Quick Start Guide
Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.
More informationMultiSite Manager. User Guide
MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.
More informationOnline Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
More informationFeatures - Microsoft Data Protection Manager
Page 1 of 63 Features - Microsoft Data Protection Manager TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS - MICROSOFT DATA PROTECTION MANAGER INSTALLATION Install the Microsoft Data Protection Manager BACKUP
More informationUser Guide - Exchange Mailbox Archiver Agent
Page 1 of 245 User Guide - Exchange Mailbox Archiver Agent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE MAILBOX ARCHIVER AGENT DEPLOYMENT
More informationQuick Start - NetApp File Archiver
Quick Start - NetApp File Archiver TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS GETTING STARTED Upgrade Configuration Archive Recover Page 1 of 14 Overview - NetApp File Archiver Agent TABLE OF CONTENTS
More informationReporting Installation Checklist
This checklist is designed to help you before and during your Websense Enterprise Reporting installation. Print this checklist for reference as you prepare for and perform the installation, especially
More informationAdministration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233
Administration GUIDE Exchange Database idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 User Guide - Exchange Database idataagent Table of Contents Overview Introduction Key Features
More informationTABLE OF CONTENTS. Quick Start - Windows File System idataagent. Page 1 of 44 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT
Page 1 of 44 Quick Start - Windows File System idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Simplified Data Management Point-In-Time Recovery System State SnapProtect Backup Office Communications
More informationVMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationUser Guide Online Backup
User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading
More informationRelease Notes. LiveVault. Contents. Version 7.65. Revision 0
R E L E A S E N O T E S LiveVault Version 7.65 Release Notes Revision 0 This document describes new features and resolved issues for LiveVault 7.65. You can retrieve the latest available product documentation
More informationVirtual Server Agent v9 with VMware. March 2011
Virtual Server Agent v9 with VMware March 2011 Contents Summary... 3 Backup Transport Methods... 3 Deployment Scenarios... 3 VSA Installation Requirements... 4 VSA Patch Requirements... 4 VDDK Installation...
More information1 of 10 1/31/2014 4:08 PM
1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings
More informationWebSphere Application Server security auditing
Copyright IBM Corporation 2008 All rights reserved IBM WebSphere Application Server V7 LAB EXERCISE WebSphere Application Server security auditing What this exercise is about... 1 Lab requirements... 1
More informationGP REPORTS VIEWER USER GUIDE
GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated
More informationHow To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (
GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationOnline Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
More informationOnline Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
More informationCentral Security Server
Central Security Server Installation and Administration Guide Release 12.3 Please direct questions about {Compuware Product} or comments on this document to: Customer Support https://community.compuwareapm.com/community/display/support
More informationTABLE OF CONTENTS. User Guide - Windows File System idataagent. Page 1 of 379 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT
Page 1 of 379 User Guide - Windows File System idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Simplified Data Management Point-In-Time Recovery System State SnapProtect Backup Office Communications
More informationWorkflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
More informationINSTALLATION GUIDE Datapolis Process System v 4.2.0.4294
Datapolis.com, ul Wiktorska 63, 02-587 Warsaw, Poland tel. (+48 22) 398-37-53; fax. (+ 48 22) 398-37-93, office@datapolis.com INSTALLATION GUIDE Datapolis Process System v 4.2.0.4294 Last modification
More informationUSER GUIDE for Salesforce
for Salesforce USER GUIDE Contents 3 Introduction to Backupify 5 Quick-start guide 6 Administration 6 Logging in 6 Administrative dashboard 7 General settings 8 Account settings 9 Add services 9 Contact
More informationIntroweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
More informationCloud. Hosted Exchange Administration Manual
Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...
More informationPRiSM Security. Configuration and considerations
PRiSM Security Configuration and considerations Agenda Security overview Authentication Adding a User Security Groups Security Roles Asset Roles Security Overview Three Aspects of Security Authentication
More informationDeltaV Event Chronicle
January 2013 Page 1 This document provides information on how to configure, use, and manage the. www.deltav.com January 2013 Page 2 Table of Contents Introduction... 3 Database Technology... 3 Database
More informationOnline Backup Client User Manual
For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.
More informationTABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS - SAP FOR ORACLE IDATAAGENT GETTING STARTED - DEPLOYING ON WINDOWS
Page 1 of 44 Quick Start - SAP for Oracle idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Full Range of Backup and Recovery Options SnapProtect Backup Command Line Support Backup and Recovery
More information1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2
User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers
More informationTANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
More informationDOCSVAULT Document Management System for everyone
Installation Guide DOCSVAULT Document Management System for everyone 9 v Desktop and Web Client v On Premises Solution v Intelligent Data Capture v Email Automation v Workflow & Record Retention Installing
More informationTABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS GETTING STARTED - DEPLOYMENT GETTING STARTED - DEPLOYMENT ON A CLUSTER
Page 1 of 30 Quick Start - AIX File System idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS GETTING STARTED - DEPLOYMENT Where to Install
More informationUser Guide - Exchange Database idataagent
User Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS - EXCHANGE
More informationKaseya 2. User Guide. Version 7.0. English
Kaseya 2 Patch Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS
More informationWhatsUp Log Management Installation and Migration Guide, including Getting Started Information. (Applies to v10.1.5 and later)
WhatsUp Log Management Installation and Migration Guide, including Getting Started Information (Applies to v10.1.5 and later) C o n t e n t s Getting Started with WhatsUp Log Management Before You Begin...
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationUser Guide - NAS idataagent
Page 1 of 192 User Guide - NAS idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology NEW FEATURES SYSTEM REQUIREMENTS SUPPORTED FEATURES SUPPORTED VENDORS GETTING
More informationVPS Hosting User Guide
TM VPS Hosting User Guide VPS Hosting Control Panel Managing VPS... 1 Opening Power Panel...... 1 Starting/Stopping VPS... 2 Changing VPS Hostname... 2 Enabling/Disabling Automatic Updates... 5 Installing
More informationJet Data Manager 2012 User Guide
Jet Data Manager 2012 User Guide Welcome This documentation provides descriptions of the concepts and features of the Jet Data Manager and how to use with them. With the Jet Data Manager you can transform
More informationLaptop Backup - Administrator Guide (Windows)
Laptop Backup - Administrator Guide (Windows) Page 1 of 86 Page 2 of 86 Laptop Backup - Administrator Guide (Windows) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL
More informationFeatures - NAS NDMP Client
Page 1 of 78 Features - NAS NDMP Client TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS - NAS NDMP IDATAAGENT INSTALLATION Install the MediaAgent - Windows Install the MediaAgent - Windows -Clustered Environment
More informationAcronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide
Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License
More informationInstalling and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
More informationManaging users. Account sources. Chapter 1
Chapter 1 Managing users The Users page in Cloud Manager lists all of the user accounts in the Centrify identity platform. This includes all of the users you create in the Centrify for Mobile user service
More informationSpector 360 Deployment Guide. Version 7
Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...
More informationSpector 360 Deployment Guide. Version 7.3 January 3, 2012
Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server
More informationMailEnable Connector for Microsoft Outlook
MailEnable Connector for Microsoft Outlook Version 2.23 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for
More informationMIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER
MIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER This document provides instructions for migrating to Avalanche 5.0 from an installation of Avalanche MC 4.6 or newer using MS SQL Server 2005. You can continue
More informationVodacom Managed Hosted Backups
Vodacom Managed Hosted Backups Robust Data Protection for your Business Critical Data Enterprise class Backup and Recovery and Data Management on Diverse Platforms Vodacom s Managed Hosted Backup offers
More informationGeBro-BACKUP. Die Online-Datensicherung. MANUAL EXCHANGE 2003, 2007 & 2010. FOR THE GeBro-BACKUP "PRO" MANAGER 5.5.7.2 AND HIGHER
GeBro-BACKUP Die Online-Datensicherung. MANUAL EXCHANGE 2003, 2007 & 2010 FOR THE GeBro-BACKUP "PRO" MANAGER 5.5.7.2 AND HIGHER AGENTUR BROGLIE Moserstr. 13 72760 Reutlingen www.gebro-backup.de info@agentur-broglie.de
More informationBackup Exec System Recovery Management Solution 2010 FAQ
Backup Exec System Recovery Management Solution 2010 FAQ Contents Overview... 1 Supported Backup Exec System Recovery Versions and Configurations... 6 Backup Exec System Recovery Management Solution Installation
More informationUsing and Contributing Virtual Machines to VM Depot
Using and Contributing Virtual Machines to VM Depot Introduction VM Depot is a library of open source virtual machine images that members of the online community have contributed. You can browse the library
More informationSQL Server Hardening
Considerations, page 1 SQL Server 2008 R2 Security Considerations, page 4 Considerations Top SQL Hardening Considerations Top SQL Hardening considerations: 1 Do not install SQL Server on an Active Directory
More informationCommVault Simpana 8.0 Application Introduction
CommVault Simpana 8.0 Application Introduction EMC Data Domain, Inc. 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800 Version 1.0, Revision B December 14, 2011 Copyright
More informationWhat s New Guide: Version 5.6
What s New Guide: Version 5.6 A QUEST SOFTWARE COMPANY 1. 8 0 0. 4 2 4. 9 4 1 1 w w w. s c r i p t l o g i c. c o m WHAT S NEW IN ACTIVE ADMINISTRATOR 5.6? Contents...3 Active Administrator Product Overview...3
More informationIf you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods:
ArchMail (www.archbalt.org/archmail) is a centrally hosted email system for the employees of the Archdiocese. To simplify employee access multiple methods for accessing email have been established. This
More informationNAS 253 Introduction to Backup Plan
NAS 253 Introduction to Backup Plan Create backup jobs using Backup Plan in Windows A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Create backup
More informationAPS Package Certification Guide
APS Package Certification Guide Revision 1.0.15 Copyright 1999-2012 by Parallels Holdings Ltd. and its affiliates. rights reserved. All Contents Feedback If you have found a mistake in this guide, or if
More informationIT Service Desk Manual Ver. 2.0. Document Prepared By: IT Department. Page 1 of 12
Document Prepared By: Page 1 of 12 INDEX 1. Introduction. 3 2. Home Page..... 4 2.1 My Request Summary..... 4 2.2 Announcement....... 5 2.3 Submit your Request...... 5 2.4 Report a Problem...... 6 2.5
More informationQbox User Manual. Version 7.0
Qbox User Manual Version 7.0 Index Page 3 Page 6 Page 8 Page 9 Page 10 Page 12 Page 14 Page 16 Introduction Setup instructions: users creating their own account Setup instructions: invited users and team
More informationNTP Software VFM Administration Web Site for EMC Atmos
NTP Software VFM Administration Web Site for EMC Atmos User Manual Revision 1.1 - July 2015 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective.
More informationG-Lock EasyMail7. Admin Guide. Client-Server Email Marketing Solution for Windows. Copyright G-Lock Software. All Rights Reserved.
G-Lock EasyMail7 Client-Server Email Marketing Solution for Windows Admin Guide Copyright G-Lock Software. All Rights Reserved. 1 Table of Contents This document is your admin guide for G-Lock EasyMail7
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationExchange Mailbox Protection Whitepaper
Exchange Mailbox Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Exchange add-on comparison... 2 Advantages and disadvantages of the different PST formats... 3 2. How Exchange
More informationSeagate Dashboard User Guide
Seagate Dashboard User Guide Seagate Dashboard User Guide 2013 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks
More information