Intel RAID Controller Premium Feature Key Training
|
|
- Sophie Evans
- 8 years ago
- Views:
Transcription
1 Intel RAID Controller Premium Feature Key Training AXXRPFKSNSH Snapshot Recovery AXXRPFKDE Self Encrypting Drive (SED) AXXRPFKSSD SSD Cache with Fastpath Note: Graphics for this training is based on RAID FW1094 and RWC
2 What are RAID Premium Features? Premium Features are additional features that can be added to an Intel RAID controller through the application of an add-on enablement key. Implementation of these features is designed to improve specific RAID usage models by adding additional performance, data protection, or other benefit to the targeted usage model. 2
3 Supported Intel RAID Controllers The following Controllers Support addition of Premium Feature Keys: RS2BL080 RS2BL040 RS2MB044 RS2PI008 RS2WG160 RS2SG244 3
4 Course Agenda The course includes the following modules: Module 1: Premium Feature Key Descriptions Module 2: Premium Feature Key Installation and Removal Module 3: Self Encrypting Drive (SED) Configuration and Use Module 4: Snapshot Recovery Configuration and Use Module 5: SSD Cache with Fastpath* Configuration and Use 4
5 Module 1 Premium Feature Key Descriptions A High Level Description of the Benefits of Each Premium Feature 5
6 Snapshot Recovery AXXRPFKSNSH The Snapshot Recovery feature offers a simplified way to recover data and can also provide automatic protection for the boot volume. You can use MegaRAID Recovery to take a snapshot of a volume and to restore a volume or file Snapshot functionality allows users to capture data changes to the volume. If data is deleted accidentally or maliciously, you can restore the data from view or roll back to a snapshot at a previous Point in Time (PiT) You can make up to 8 snapshots of Point in Times for each volume You can either restore files or roll back applications to a previous point in time Snapshot allows recovery of deleted, modified, or corrupted data from disk in minutes Minimizing downtime experienced by users and eliminates the lengthy process of restoring data from tape A Snapshot allows easy recovery of a server s boot volume in case corruption of operating system occurs Allows easy recovery of the boot volume in the case of an errant update or a corrupted or deleted file. NOTE: Snapshot Recovery is not a substitute for a tested backup strategy. Snapshot never makes a complete backup of a volume, only changes to the selected volume are tracked. When a roll back to a snapshot at a previous Point in Time (PiT) is done, you are undoing changes to the volume that caused corruption or a file deletion. 6
7 Full Disk Encryption AXXRPFKDE Full Disk Encryption support allows the RAID controller to manage the encryption keys for Self Encrypting Drives (SED). It enables authentication key management, auto-lock, and instant erase of self-encrypting drives Data going to the drive is encrypted by the drive, data read from the drive is decrypted by the drive. The controller provides the key management and password interface to the drive. Auto-Locks the volumes when powered down Encryption secures data when a drive is misplaced, failed, or stolen Instant Secure Erase deletes encryption keys from the drive before returning leased Drives or when redeploying with the datacenter, making data unreadable. Reduces the risk of data being compromised when drives eventually leave the data center Significantly reduces the cost and time of repurposing or retiring drives 100% Transparent to Storage Systems / End Users Appears the same as traditional non-encrypting drives Operates at full drive speed - No impact to performance Automatically encrypts/ decrypts all data 128Bit encryption, there is no backdoor *Strong enough for the National Security Agency* 7
8 SSD Cache with FastPath* I/O AXXRPFKSSD Two Separate Features resident on the key that are mutually exclusive SSD Cache Uses solid-state drives (SSDs) as additional cache for the RAID controller. Frequently accessed information is stored in SSD cache to allow for rapid access. SSD Cache can support from 1 to 32 SSD in a second level cache pool Data frequently re-read is copied to the cache pool with the benefit of higher SSD throughput and IO response of the SSD drives. Based on LSI* Cachecade Technology, it is sometimes referred to as SSD Cache (SSC). FastPath I/O Accelerates virtual drives made up of all SSDs by streamlining the RAID FW stack, providing up to 150,000 I/O reads per second for small block I/O activity; this is a dramatic increase over solutions that do not use FastPath. Without FastPath enabled, SSD arrays can reach up to 80,000 IOPs. FastPath streamlines the software stack for use with SSDs to optimize throughput with up to150,000 IO operations Per Second 8
9 Module 2 Premium Feature Key Installation and Removal Understand how to install and remove the feature key from an Intel RAID Controller 9
10 Install the Premium Feature Key IMPORTANT: Your Intel RAID Controller must be programmed with the latest Intel RAID Controller firmware to enable Intel RAID Premium Features Minimum requirements for Premium Feature Key usage. The latest FW is available at The feature key is designed to plug onto a Mainstream or Scalable Performance Intel RAID Controller that has a RAID Premium Feature Key connector. The Intel RAID Premium Feature Key must remain attached to the connector in order to enable the premium feature. Entry level controllers do not support the key features. In the figure, the arrow points to the location of the RAID Premium Feature Key connector for the Intel RAID Controller RS2BL080. This is a 2-pin shielded connector The location of Premium Feature Key connector on your Intel RAID Controller may vary Refer to the Intel RAID Controller User Guide for the location of this connector Intel RAID Controller RS2BL080 10
11 Install the Premium Feature Key 1. Carefully remove the Premium Feature Key from its packaging 2. Locate the Premium Feature Key connector on the Intel RAID Controller 3. With the 2-hole edge of the Premium Feature key pointing to the RAID Premium Feature Key 2-pin connector of the RAID controller, push the key onto the connector on the RAID controller 4. Refer to RAID Controller documentation to finish installing the RAID controller and Software User s Guide for PFK configuration details Premium Feature Key Installed 11
12 Install the Premium Feature Key With the Feature Key installed, unless noted specifically, the added feature must be enabled and/or configured using the RAID BIOS Console utility or RAID Web Console 2 utility. For detailed information on enabling and configuring the feature key option, please refer to the Intel RAID Software User s Guide available under your selected controller at Remove the Premium Feature Key Removing the PFK is done by firmly holding the RAID controller on a flat surface, and pulling the Intel RAID Premium Feature Key from the connector Note: Only single PFK installations are allowed (one PFK header per controller). Multiple premium features may be provided on a single key. When the PFK is removed all premium features provided by the key are disabled 12
13 Determining PFK Enablement BIOS Console To determine available features, select Manage Advanced Software Options in the left pane of the main view. Raid Web Console 2 Feature enabled/disabled status in RWC2 Dashboard view. 13
14 Module 3 Self Encrypting Drive (SED) Configuration and Use Understanding The SED Premium Feature Configuration Steps 14
15 Full Disk Encryption - AXXRPFKDE The Full Disk Encryption Premium Feature is offered as an add-on PFK and is also available on Intel RAID controllers with product code that ends in DE (RS2BL080DE and RS2PI008DE) Full Disk Encryption is encrypting data at rest on a hard disk drive. Although several methods can accomplish this, including software and host-based encryption, the Intel implementation relies on Self Encrypting Drive Technology (SED) Self Encrypting Drive Technology incorporates the encryption circuitry directly on the disk drive. SED drives encrypt everything written to the drive and de-crypt everything read from the drive. When the drive is powered down the SED drive is locked and the encryption key within that drive will not encrypt or decrypt data making the drive unreadable to an individual who does not have the correct authorizations. A security-enabled SED drive may be lost or stolen, but it will not expose its data to an unauthorized user Enabling encryption key management on the RAID controller allows the controller to manage the encryption key on the drive SED Auto-Lock functionality is enabled and managed within the RAID controller configuration utilities. Disk Encryption Services are available only for Intel 6Gbs Mainstream and Scalable Performance RAID controllers when the AXXRPFKDE PFK is installed 15
16 Encryption Management FAQs SED functionality affect on disk drive performance The SED has its AES engine built into the electronics, the throughput affect is imperceptibly small (a few millionths of a second). SED drives operate at the same throughput and response time levels as non-sed drives. Incorporation of the SED into the drives allows encryption performance to scale with the number of drives in the system. AES 128 bit implementation Both the NSA and NIST have asserted that AES-128 provides sufficient protection. There are 2^128 = 3.4 x 10^38 possible keys with 128 bits, which is a huge key space. NIST estimates that AES 128 is safe from key-search techniques for at least the next 30 years. The Seagate implementation of AES in drive circuitry has received NIST certification through an independent laboratory, as tested against the FIPS 197 standard. 16
17 Encryption Management FAQs (Cont) There are there no backdoors to the SED drives There is no way to circumvent the security measures provided by the drive. Security best practices dictate that sensitive or critical data should be backed up, as well as critical parameters like Security Keys. SED and non-sed drives can be mixed in the same Volume Non-SED drives cannot be part of an encryption-protected RAID set. SED drives can be used in non-encryption-protected RAID groups. A customer should purchase all SED drives to achieve an encrypted volume. The locking function is configured by selecting the appropriate feature on the RAID management console for those drives and defining a Security Key. SED drives have the same usable capacity as non SED drives The usable capacity of a drive is not reduced with SED 17
18 Encryption Management FAQs (Cont.) Instant secure erase functionality An authorized administrator can remove the on-board encryption key, thereby rendering the encrypted data unreadable. Intel RAID supports this feature on all 6Gbs products, even when a PFK is not present. It is not possible to erase a secure drive that is part of a secure volume group. You must first delete the volume configuration on the drive so that it is marked as Unconfigured. Boot protection for a system with SEDs The server can be configured to pause during the boot sequence for a password. If the appropriate password is not entered in three attempts, the server will still boot but the data on the SEDs will be inaccessible. This protects the data on the SEDs in the event the server is stolen. If the OS boot partition is secured via SED, the server can be configured to pause during the MegaRAID boot sequence for a password. If the appropriate password is not entered in three attempts, the server will not boot 18
19 Managing Self Encrypting drives Three Steps to enable and manage self encrypting drives (graphics on following pages): 1. Verify Encryption Capability after the PFK is installed 2. Enable the controller encryption support within the RAID Utility (BIOS Console or RAID Web Console 2) 3. Build a logical volume containing Self-Encrypting Disks (SEDs) 19
20 Step 1: Verify Device Encryption Capability Controller capability Select the controller and view the Properties tab FDE = Full Disk Encryption Drive encryption capability (SED) Select a drive and view the Properties tab 20
21 Step 2a: Enable Encryption (Drive Security) Support in RAID BIOS Console Security Wizard starts 1. Chose Drive Security from the left panel of the main view. 2. Accept security enablement. 3. Click OK for local key management. 4. Create the required Security key Identifier. Use the default suggestion, or create your own 5. Create the required Security key. Use the default suggestion, or create your own 6. Create an optional Pass Phrase for additional security 7. Accept the confirmation to complete the wizard and enable drive security 8. Drive Security is now enabled 21
22 Step 2b: Enable Encryption (Drive Security) Support in RAID Web Console Go To > Controller > Enable Drive Security Or Right Click on the controller and Enable Drive Security 22
23 Step 2b (cont): Enable Encryption (Drive Security) Support in RAID Web Console 2 Security Wizard starts 1. Click OK for local key management. 2. Create the required Security key Identifier. Use the default suggestion, or create your own 3. Create the required Security key. Use the default suggestion, or create your own 4. Create an optional Pass Phrase for additional security 5. Place a check mark in the reminder box to record the contents of this page. 6. Click Yes to complete the wizard and enable drive security 7. Controller properties will now indicate Drive security is enabled 23
24 Step 3: Build a Logical Volume Containing SEDs 1. Right click on the controller and select Create a Virtual Drive. 2. Choose the Advanced configuration. 3. Choose the desired RAID level, disk encryption, and auto power save mode. Click on the drives to be added to the array and select Add. Then click Next. 4. Select the Name and cache properties, then Click Create Virtual Drive. Click to acknowledge the Write Back Cache Warning, then click next. 5. Review the configuration information and click Finish. 24
25 Instant Secure Erase Description Instant Secure Erase removes the drive encryption key from the drive. Data encrypted with previous key is now unintelligible This action is Non-reversible Benefits Instant Secure Erase drives for secure disposal or repurposing It takes less than 1 second to remove the key. Easy to use from the GUI utility Steps to instant Secure Erase are in the following slides. Note, Instant Secure Erase is only available for Unconfigured Good Drives. The must be removed from a volume via the GUI before they can be erased. 25
26 Instant Secure Erase in RAID BIOS Console Note: Instant Secure Erase is only permitted on unconfigured drives to remove possibility of deleting array data Click on the target drive to erase Click on the radio button for Instant Secure Erase, then click on Go, and then accept the warning. 26
27 Instant Secure Erase in RAID Web Console 2 Note: Instant Secure Erase is only permitted on unconfigured drives to remove possibility of deleting array data Go To > Physical Drive > Instant Secure Erase Or Right Click on the physical drive and select Instant Secure Erase 27
28 Instant Secure Erase in RAID Web Console 2 (Cont) Accept confirmation to permanently erase disk drive 28
29 Module 4 Snapshot Recovery Configuration and Use Understand, configure, and use the Snapshot Recovery premium feature. 29
30 Snapshot Overview The Snapshot feature offers a simplified way to recover lost or corrupted data and provides automatic protection for the boot volume. You can use this feature to take a snapshot of a volume at a Point in Time (PiT) and then later roll back an individual file or a complete volume to that point in time. A Base Volume, or volume containing data, is designated and a repository volume is created to contain changed data. No data is copied at the time the snapshot is created, including the first snapshot. A PiT marker is set in the respository and any data that is changed will first be written to the repository volume. Data is copied on a block basis, not a file basis. So only blocks to be changed are copied to the repository. Note: Snapshot Recovery is not a substitute for a tested backup strategy. When Snapshot Recovery is enabled, a complete copy of the volume is NOT taken, but rather changes to the selected volume are tracked. When a roll back to a snapshot at a previous Point in Time (PiT) is done, you are undoing changes. 30
31 Snapshot Overview (cont) You can use RAID Web Console 2 (RWC2) to create up to eight snapshots of a volume. Creating a snapshot closes the previous snapshot and future changes are then tracked in the new snapshot until it is closed by creating a new snapshot. RWC2 shows the snapshots in chronological order from the oldest to the newest. Each snapshot is a PiT snapshot of the Base virtual drive Once the maximum number of 8 snapshots are created, the Create Snapshot button is disabled until a previous snapshot is deleted. Within RWC2 you can create views of the PiT snapshots. You can search the snapshot view to find and recover data that is not corrupted or missing. Data from view can be copied to the Snapshot Base, or working, volume. 31
32 Snapshot Overview (Cont) The size of the repository should be determined by the amount of data being written and the frequency of snapshots being taken. This is highly application dependent on the behavior of the application and how it manages files. If the repository runs out of space and resizing the repository becomes necessary, it is required to disable the feature and reenable it while re-sizing the repository. One issue with this process is that the existing snapshots are lost when the feature is disabled. Repository virtual drives will be lost if you disable snapshots. A future update will allow to grow the size of the repository dynamically, without losing snapshots. 32
33 Enabling Snapshot Recovery in RAID Web Console 2 1. When you enable Snapshot Recovery, you select two virtual drives -- one as a Snapshot Base and the other as a Snapshot Repository. 2. The base virtual drive contains the data that is stored in the repository virtual drive. 3. To enable the feature, highlight the Virtual drive to be the snapshot based, and go to manage=>virtual drive=>enable MegaRAID recovery; or right click Virtual Drive and select Enable MegaRAID Recovery The Enable MegaRAID Recovery Wizard will then appear 33
34 Enabling Snapshot Recovery in RAID Web Console 2 (cont) 4. On the Enable MegaRAID Recovery Wizard screen, highlight the virtual drive to use as the Snapshot Repository in the Snapshot Repository field. 5. Enter the capacity to use in the Snapshot Repository for changes to the base virtual drive. The available capacity is the largest free block of capacity on the snapshot repository virtual drive. 34
35 Enabling Snapshot Recovery in RAID Web Console 2 6. Choose to create a snapshot schedule or choose to disable the scheduling option. 7. Choose whether to automatically delete the oldest snapshot or to have a snapshot taken on reboot. To enable this option, check the box next to the Take snapshot on reboot field a. If you select this option, a snapshot is taken on boot after every successful shutdown. b. You can use this snapshot of the boot virtual drive to restore the operating system on the virtual drive in case the virtual drive becomes corrupted. CAUTION: Make sure that all data existing on the virtual drive chosen as the snapshot repository is backed up. If there is any existing data on this repository virtual drive, it will be lost after converting to the Snapshot repository. Notes: If you enable Take snapshot on reboot option and the Enable auto deletion of snapshot option (described later), after creating 8 snapshots, the system will automatically delete the oldest snapshot and then create a new one after reboot. 7. Click Finish 35
36 Enabling Snapshot Recovery in RAID Web Console 2 (cont) A confirmation dialog box appears 8. Check the box next to the Confirm field to enable snapshots on the selected virtual drive and then click Yes Snapshot Base This volume will contain the OS or usable data. Snapshot Repository This volume is used only for storing snapshot related data CAUTION: After you enable snapshots on this virtual drive, you cannot change the allocated percentage of capacity or the snapshot repository without first disabling snapshots and losing any snapshot data 36
37 Creating Snapshots 1. Click the Logical view on the main menu screen 2. Right Click the Snapshot Base virtual drive in the left frame 3. Click Manage Snapshots. This screen shows the Snapshot Base details and any existing snapshots 4. Within the window on the right, the snapshot schedule can be edited or a snapshot can be created. 5. Click Create Snapshot 37
38 Creating Snapshots (Cont) 6. A prompt pops up for a snapshot name. Edit the name as desired and Click Ok to continue. 7. The snapshot will appear in the snapshot List. Note: When you Enable auto deletion of snapshots, after 8 snapshots have been created the oldest snapshot will be automatically deleted when you can continue to create additional snapshots 38
39 Snapshot Recovery Views 1. In the manage snapshot screen, click on Create a View 2. Enter the name of the view in the Enter View name field and the capacity to set aside in the snapshot 3. Click OK 39
40 Snapshot Recovery - Rolling Back Snapshots Follow these steps to roll back the volume version to an earlier version 1. Open the Manage Snapshots view. 2. Highlight a snapshot in the snapshot list that is the most recent PiT snapshot that does not contain the corrupt or malicious file, or the PiT that was current when a file was deleted. 3. Click the Create View button. 4. Enter into My computer, and then you can see a new drive 5. Copy the files in the new drive to the original drive and cover them 6. The system rolls back to the selected PiT You can roll back to a previous Point in Time one snapshot at a time beginning with the newest snapshot until you find one that does not contain the corrupt or malicious file. 40
41 Snapshot Recovery - Deleting and Clearing Snapshots Note: When deleting snapshots, you can only delete the oldest snapshot Follow these steps to delete a single snapshot 1. Right Click the Snapshot base volume and then manage snap shots option 2. Highlight the oldest snap shot and choose delete snap shot 3. Snapshots must be deleted one at a time. 41
42 Setting Snapshot Recovery Properties Follow these steps to Set Snapshot Recovery Properties. 1. Open the Manage Snap Shot view by right clicking on the Snap Shot base volume. 2. Click on the Advanced Button 3. Advanced options are presented Enable or disable. Options include: A. Automatically delete the oldest snapshot B. Stop taking snapshots C. Take a snapshot on every reboot 42
43 Disable Snapshot Recovery Follow these steps to Disable MegaRAID Recovery 1. Click the Logical view on the main menu screen 2. Right Click the Snapshot Base virtual drive in the left frame 3. Disable MegaRAID Recovery on the menu bar 43
44 Disable Snapshot Recovery (cont) A confirmation dialog box appears. It warns that any snapshot-related data that is on the associated Snapshot Repository virtual drives will be lost if you disable snapshots 5. Check the box next to the Confirm field and click Yes 6. The snapshots are disabled 44
45 Module 5 SSD Cache with Fastpath* IO Configuration and Use Understanding SSD Cache and Fastpath Premium Feature Configuration and Use 45
46 SSD Cache with Fastpath IO SSD Cache (also referred to as SSD Cache (SSC) or CacheCade* Technology) uses one or more Solid State Devices (SSD) as additional controller cache, allowing for very large data sets to be copied to that cache to improve performance of data that is re-read. SSD Cache provides performance improvement in READ-intensive applications This solution is ideal for cost sensitive server environments, by offering a highperformance upgrade that requires only a small investment in SSD technology. This solution also reduces the need to invest expensive IT cycles to hand-tune applications running on hard drive-only disk arrays Up to 32 SSDs can be added as a second level cache pool. Fastpath IO is a performance tuned IO Accelerator feature for use with all SSD disk arrays. Raid firmware supporting Solid State Drive configurations is tuned for small, random block-size IO activity Can sustain over 150,000 IO READS Per Second. This feature requires that only SSD drives be connected to the RAID controller. Any Volume created with these SSD drives will then utilized Fastpath IO 46
47 Fastpath IO Enablement 1. Fastpath IO is enabled by default if the Premium Feature Key is installed 2. Login into Intel RAID Web Console 2 3. Select the Dashboard view 4. View the enablement in the Advanced Software Options area 47
48 SSD Cache Creation 1. Login into Intel RAID Web Console 2 2. Select the Dashboard view 3. Click Create SSD cache in the Actions tab 48
49 SSD Cache Creation 4. Or right click the RAID Controller and select Create SSCD (SSD Cache Drive) 49
50 SSD Cache Creation 5. The Create SSD Cache Drive group screen appears 6. Select the unconfigured SSD drive(s) 7. Click Add > -> Create SSC Drive Group -> Next 50
51 SSD Cache Creation 8. The Create SSD Cache Drive screen appears 9. Enter the SSD Cache Drive name in the name Field or leave the default 10. Click Create to create a SSC drive group 11. Click Next 12. Create SSD Cache screen appears. Click Finish to confirm the information and create SSD Cache Volume 51
52 SSD Cache Creation 13. An informational screen appears showing details of the configuration. Click Finish to complete and then click to acknowledge the configuration 14. You can see SSD Cache Drive Group in the logical view 52
53 Delete a SSD Cache Disk Follow these steps to delete the SSD Cache Volume 1. Click the Logical view tab on the main menu screen 2. Click the SSD Cache virtual drive 3. Click Go To -> Virtual Drive -> Delete Virtual Drive on the menu bar 4. Or Right click on the SSD Cache VD in the volume list ->Delete Virtual Drive 5. A confirmation dialog box appears 6. Check the box next to the Confirm field and click Yes 7. The SSCD is deleted 53
54 54
Intel RAID Premium Features
Intel RAID Premium Features Description and use Revision 1.0 August, 2010 Enterprise Platforms and Services Division - Marketing Revision History Intel RAID Premium Features Revision History Date Revision
More informationIntel RAID. INTEL raid
Intel RAID Intel offers multiple categories of RAID products to protect data, increase performance, scale storage, and enhance server availability. A brief description of each category is listed below
More informationServeRAID M5000 Series Performance Accelerator Key for IBM System x Product Guide
ServeRAID M5000 Series Performance Accelerator Key for IBM System x Product Guide The ServeRAID M5000 Series Performance Accelerator Key for System x enables performance enhancements needed by emerging
More informationIntel RAID Web Console 2 and StorCLI Command Line Tool
SOLUTIONS Brief Intel RAID Web Console 2 and StorCLI Command Line Tool Powered by LSI* MegaRAID technology Instant access, intuitive configuration/navigation, easy standard storage management and advanced
More informationServeRAID M5000 Series Performance Accelerator Key for IBM System x IBM System x at-a-glance guide
:: Seite 1 von 13 :: Datenblatt zum Produkt IBM ServeRAID M5000 Series Performance Accel mit DC# 601672 :: ServeRAID M5000 Series Performance Accelerator Key for IBM System x IBM System x at-a-glance guide
More informationStarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection
StarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright
More informationTime Stamp. Instruction Booklet
Time Stamp Instruction Booklet Time Stamp Introductions Time stamp is a useful solution for backing up and restoring system, it backs up the entire computer system to the Backup Zone. Time Stamp is used
More informationIntel Matrix Storage Console
Intel Matrix Storage Console Reference Content January 2010 Revision 1.0 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE,
More informationBounceBack User Guide
Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:
More informationTechnical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.
Technical Note Installing Micron SEDs in Windows 8 and 10 TN-FD-28: Installing Micron SEDs in Windows 8 and 10 Introduction Introduction Self-encrypting drives (SEDs) can provide an effective way of protecting
More informationMotion Computing Tablet PC
Motion Computing Tablet PC TRUSTED PLATFORM MODULE (TPM) ACTIVATION User Guide Trusted Platform Module Activation With the Infineon Security Platform Tools and the built-in Trusted Computing Group compliant
More informationHP ProtectTools for Small Business Security Software, Version 5.10. User Guide
HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
More informationMaxAttach NAS 4000 Series OS 2.2 Hard Disk Drive Replacement
MaxAttach NAS 4000 Series MaxAttach NAS 4000 Series OS 2.2 Hard Disk Drive Replacement DOCUMENT OVERVIEW Who Should Use This Instruction Set This MaxAttach NAS 4000 Series by Maxtor HDD Replacement Instruction
More informationHow to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
More informationThe following is a preview of an Nfina storage system with an embedded LSI RAID controller using MegaRAID Storage Manager software.
Nfina Technologies uses RAID technology to increase performance, storage capacity, and fault tolerance in our storage systems. Nfina RAID network servers use only best-in-class components like Enterprise-class
More informationHiva-network.com. Microsoft_70-680_v2011-06-22_Kat. Exam A
Exam A Microsoft_70-680_v2011-06-22_Kat QUESTION 1 You have a computer that runs Windows 7. The computer has a single volume. You install 15 applications and customize the environment. You complete the
More information4 Backing Up and Restoring System Software
4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring
More informationWindows 8 Backup, Restore & Recovery By John Allen
Windows 8 Backup, Restore & Recovery By John Allen Restore and recovery options for Windows 8 are different to earlier versions of Windows, and, of course, the terminology has changed. These are a lot
More informationVIA RAID Installation Guide
VIA RAID Installation Guide 1 VIA BIOS RAID Installation Guide.... 3 1.1 Introduction of RAID... 3 1.2 RAID Configuration Precautions... 3 1.3 BIOS Configuration Utility.. 4 1.3.1 Enter BIOS Configuration
More informationZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
More informationChapter 2 Array Configuration [SATA Setup Utility] This chapter explains array configurations using this array controller.
Embedded MegaRAID SATA User's Guide Areas Covered Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview This chapter introduces
More informationSmart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R
Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install
More informationThis user guide describes features that are common to most models. Some features may not be available on your computer.
RAID User Guide Copyright 2011 Hewlett-Packard Development Company, L.P. Intel is a trademark of Intel Corporation in the U.S. and other countries. Microsoft and Windows are U.S. registered trademarks
More informationTable of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2
Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.
More informationAgilent Modular Products Connecting and Configuring JMR RAID to Work with the Agilent M9392A Vector Signal Analyzer System
Agilent Modular Products Connecting and Configuring JMR RAID to Work with the Agilent M9392A Vector Signal Analyzer System White Paper Abstract This document describes the key steps to connect and configure
More informationCautions When Using BitLocker Drive Encryption on PRIMERGY
Cautions When Using BitLocker Drive Encryption on PRIMERGY July 2008 Fujitsu Limited Table of Contents Preface...3 1 Recovery mode...4 2 Changes in hardware configurations...5 3 Prior to hardware maintenance
More informationVIA / JMicron RAID Installation Guide
VIA / JMicron RAID Installation Guide 1. Introduction to VIA / JMicron RAID Installation Guide. 3 2. VIA RAID Installation Guide. 3 2.1 VIA BIOS RAID Installation Guide.. 3 2.1.1 Introduction of RAID.
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry
GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for
More informationBounceBack Server Solution Reference Guide
BounceBack Server Solution Reference Guide Contents Introduction... 2 System Requirements... 3 Initial Setup... 4 BounceBack Server Appliance Front View... 5 BounceBack Server Appliance Rear View... 6
More informationTrusted Platform Module (TPM) Quick Reference Guide
Trusted Platform Module (TPM) Quick Reference Guide System builders/integrators should give this Guide to the system owners to assist them in enabling and activating the Trusted Platform Module. Warning
More informationIntel Rapid Storage Technology
Intel Rapid Storage Technology User Guide August 2011 Revision 1.0 1 Document Number: XXXXXX INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
More informationMSM Software Feature Difference Between the MR Controller and the IR Controller
MSM Software Feature Difference Between the MR Controller and the IR Controller Systems Engineering Note S11252, Version 1.0 DB05-000341-00 For a comprehensive list of changes to this document, see the
More informationMTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.
STUDENT ACTIVITY 6.1: UNDERSTAND BACKUP AND RECOVERY METHODS MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.1 Lesson
More information1. System Requirements
BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data
More informationAVLOR SERVER CLOUD RECOVERY
AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties
More informationGladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
More informationHP EliteBook and ProBook Notebook PCs - Upgrading from Windows 7 to Windows 8
HP EliteBook and ProBook Notebook PCs - Upgrading from Windows 7 to Windows 8 This document pertains to HP business notebook computers to be upgraded from Windows 7 using a digital copy of Windows 8. You
More informationKeep Your Data Secure: Fighting Back With Flash
Keep Your Data Secure: Fighting Back With Flash CONTENTS: Executive Summary...1 Data Encryption: Ensuring Peace of Mind...2 Enhanced Encryption and Device Decommission in the Enterprise...3 Freeing Up
More informationGuide to SATA Hard Disks Installation and RAID Configuration
Guide to SATA Hard Disks Installation and RAID Configuration 1. Guide to SATA Hard Disks Installation... 2 1.1 Serial ATA (SATA) Hard Disks Installation... 2 2. Guide to RAID Configurations... 3 2.1 Introduction
More informationSOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
More informationNVIDIA RAID Installation Guide
NVIDIA RAID Installation Guide 1. NVIDIA BIOS RAID Installation Guide.. 2 1.1 Introduction to RAID. 2 1.2 RAID Configurations Precautions.. 3 1.3 Create Disk Array. 4 2. NVIDIA Windows RAID Installation
More informationOnline Backup and Recovery Manager Setup for Microsoft Windows.
Online Backup and Recovery Manager Setup for Microsoft Windows. Backup Wizard Default Interface Recovery Wizard Online Backup and Recovery Manager Setup Backup Wizard After installing and launching the
More informationOutlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions
HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange
More informationDirect Storage Access Using NetApp SnapDrive. Installation & Administration Guide
Direct Storage Access Using NetApp SnapDrive Installation & Administration Guide SnapDrive overview... 3 What SnapDrive does... 3 What SnapDrive does not do... 3 Recommendations for using SnapDrive...
More informationHi-Speed USB Flash Disk User s Manual Guide
Hi-Speed USB Flash Disk User s Manual Guide System Requirements Windows 98, ME, 2000, XP, Mac OS 10.1, Linux 2.4 or above AMD or Intel Pentium 133MHz or better based computer USB 1.1, USB 2.0 or higher
More informationSamsung Magician v.4.5 Introduction and Installation Guide
Samsung Magician v.4.5 Introduction and Installation Guide 1 Legal Disclaimer SAMSUNG ELECTRONICS RESERVES THE RIGHT TO CHANGE PRODUCTS, INFORMATION AND SPECIFICATIONS WITHOUT NOTICE. Products and specifications
More informationNEC Express5800 Series MegaRAID Storage Manager User's Guide - Windows Edition -
NEC Express5800 Series MegaRAID Storage Manager User's Guide - Windows Edition - 7th Edition 12-2006 808-882425-676-G Preface The User's Guide explains the utility MegaRAID Storage Manager to be used for
More informationUsing iscsi with BackupAssist. User Guide
User Guide Contents 1. Introduction... 2 Documentation... 2 Terminology... 2 Advantages of iscsi... 2 Supported environments... 2 2. Overview... 3 About iscsi... 3 iscsi best practices with BackupAssist...
More informationUsing the IPMI interface
Using the IPMI interface The T800, T1600 and T3200 server models are equipped with an IPMI interface with KVM / IP functionality. This enables you to access the server console if it becomes inaccessible
More informationSelf-encrypting drives (SED): helping prevent data loss, theft, and misplacement
Self-encrypting drives (SED): helping prevent data loss, theft, and misplacement White paper Version: 1.0 Updated: Abstract: This white paper introduces Infortrend self-encrypting drive technology, or
More information1 of 10 1/31/2014 4:08 PM
1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings
More informationHP ProtectTools. Getting Started
HP ProtectTools Getting Started Copyright 2012 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Intel is a trademark
More informationGoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
More informationBitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011
BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011 Purpose To provide a step-by-step procedure for encrypting installed laptop
More informationUser Guide - English. Embedded MegaRAID Software
User Guide - English Embedded MegaRAID Software April 2015 Comments Suggestions Corrections The User Documentation Department would like to know your opinion of this manual. Your feedback helps us optimize
More informationTSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More informationAccelerating Server Storage Performance on Lenovo ThinkServer
Accelerating Server Storage Performance on Lenovo ThinkServer Lenovo Enterprise Product Group April 214 Copyright Lenovo 214 LENOVO PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER
More informationHyperoo 2 User Guide. Hyperoo 2 User Guide
1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous
More informationUSER MANUAL DataLocker Enterprise
USER MANUAL DataLocker Enterprise ------------------------ March 2014 ------------------------ 1 Contents At a Glance Advanced 3 Introduction 17 Special features 5 About the Enterprise 19 Master admin
More informationFAQ. How does the new Big Bend Backup (powered by Keepit) work?
FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control
More informationHow to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
More informationWebBIOS Configuration Utility Guide
Dell PowerEdge Expandable RAID Controller 3/QC, 3/DC, 3/DCL and 3/SC WebBIOS Configuration Utility Guide www.dell.com support.dell.com Information in this document is subject to change without notice.
More informationHP Array Configuration Utility User Guide
HP Array Configuration Utility User Guide January 2006 (First Edition) Part Number 416146-001 Copyright 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change
More informationFull Disk Encryption Agent Reference
www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or
More informationVOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0
VOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0 This document contains the backup and recovery procedures for the NWR CRS VIP. These procedures shall be used by all
More informationLenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
More information1. Open the preferences screen by opening the Mail menu and selecting Preferences...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
More informationIntel Matrix Storage Manager 8.x
Intel Matrix Storage Manager 8.x User's Manual January 2009 Revision 1.0 Document Number: XXXXXX INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
More informationRAID Utility User Guide. Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card
RAID Utility User Guide Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card Contents 3 RAID Utility User Guide 3 The RAID Utility Window 4 Running RAID Utility
More informationEncrypting with BitLocker for disk volumes under Windows 7
Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1
More informationEMC VNX2: Data at Rest Encryption
White Paper EMC VNX2: Data at Rest Encryption Abstract This white paper introduces Data at Rest Encryption for EMC VNX 2, a feature that provides data protection if a drive is stolen or misplaced. This
More informationDisk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
More informatione- storage Mail Archive
e- storage Mail Archive 1 TABLE OF CONTENTS 1.0 OVERVIEW 3 1.1 INTRODUCTION... 3 1.2 REQUIREMENT. 4 2.0 SETUP AND CONFIGURATION. 6 2.1 CREATE NEW ARCHIVE PROFILE. 6 2.1.1 Gmail Account.. 8 2.1.2 Hotmail
More informationIntel RAID Software User s Guide:
Intel RAID Software User s Guide: Intel Embedded Server RAID Technology 2 Intel IT/IR RAID Intel Integrated Server RAID Intel RAID Controllers using the Intel RAID Software Stack 3 Revision 21.0 March,
More informationBackups and Maintenance
Backups and Maintenance Backups and Maintenance Objectives Learn how to create a backup strategy to suit your needs. Learn how to back up a database. Learn how to restore from a backup. Use the Database
More informationLSI MegaRAID CacheCade Performance Evaluation in a Web Server Environment
LSI MegaRAID CacheCade Performance Evaluation in a Web Server Environment Evaluation report prepared under contract with LSI Corporation Introduction Interest in solid-state storage (SSS) is high, and
More informationContents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...
Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4
More informationTeam Foundation Server 2013 Installation Guide
Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day benday@benday.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide
More informationShutting down / Rebooting Small Business Server 2003 Version 1.00
Shutting down / Rebooting Small Business Server 2003 Version 1.00 Need to Know TM It may be necessary at some stage of the life of Small Business Server 2003 that it be shutdown or rebooted. In many cases
More informationRAID User Guide. Edition. Trademarks V1.0 P/N: 91-187C51GME0-00
RAID User Guide Edition V1.0 P/N: 91-187C51GME0-00 Trademarks All brand or product names mentioned are trademarks or registered trademarks of their respective holders. Contents NVIDIA RAID...1 RAID Arrays...1
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
More informationSystem 800xA Tools. System Version 5.1. Power and productivity for a better world TM
System 800xA Tools System Version 5.1 Power and productivity for a better world TM System 800xA Tools System Version 5.1 NOTICE This document contains information about one or more ABB products and may
More informationInstalling the Operating System or Hypervisor
Installing the Operating System or Hypervisor If you purchased E-Series Server Option 1 (E-Series Server without preinstalled operating system or hypervisor), you must install an operating system or hypervisor.
More informationSSD Guru. Installation and User Guide. Software Version 1.4
SSD Guru Installation and User Guide Software Version 1.4 Contents Welcome!............................................................................. 1 Key features.........................................................................
More informationOverview... 2. Customer Login... 2. Main Page... 2. VM Management... 4. Creation... 4 Editing a Virtual Machine... 6
July 2013 Contents Overview... 2 Customer Login... 2 Main Page... 2 VM Management... 4 Creation... 4 Editing a Virtual Machine... 6 Disk Management... 7 Deletion... 7 Power On / Off... 8 Network Management...
More informationHow To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
More informationIntel RAID Software User s Guide:
Intel RAID Software User s Guide: Intel Embedded Server RAID Technology 2 Intel IT/IR RAID Intel Integrated Server RAID Intel RAID Controllers using the Intel RAID Software Stack 3 Revision 19.0 April,
More informationHow To Add Drives To A Dip7080-00N Recording Appliance
CCTV Video Solutions Technical Brief DIP-7080-00N Initial RAID Setup 1 DIP-7080-00N Initial RAID Setup Technical Brief Purpose The purpose of this technical brief is to provide the step-by-step process
More informationServeRAID M5015 and M5014 SAS/SATA Controllers for IBM System x IBM Redbooks Product Guide
ServeRAID M5015 and M5014 SAS/SATA Controllers for IBM System x IBM Redbooks Product Guide The ServeRAID M5015 and ServeRAID M5014 SAS/SATA Controllers for IBM System x are the next-generation 6 Gbps SAS
More informationConfiguring HP Elite, EliteBook, and Z220 systems for Intel Smart Response Technology
Technical white paper Configuring HP Elite, EliteBook, and Z220 systems for Intel Smart Response Technology Table of contents Overview 2 System requirements 3 How to enable Intel Smart Response Technology
More informationBackup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
More informationUpgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2
Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2 Installation and Configuration Introduction This document will walk you step by step in removing MSDE and the setup and
More informationUsing Drobo Storage with CrashPlan Pro for On-Site & Cloud Backup
Drobo How-To Guide Protecting critical data is key to ensuring business continuity. Drobo storage systems excel as backup- to- disk target as they provide high throughput and random access for near instantaneous
More information2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
More informationHigh-Availability User s Guide v2.00
Intended Audience The information presented in this manual is written for storage administrators to build Thecus High-Availability system. Requirement Two Thecus NAS with High-Availability Firmware 2.00.00
More informationMoving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
More informationHow To Backup In Cisco Uk Central And Cisco Cusd (Cisco) Cusm (Custodian) (Cusd) (Uk) (Usd).Com) (Ucs) (Cyse
This chapter includes the following sections: Backup and Import in Cisco UCS Central, page 1 Backing up and Restoring Cisco UCS Central, page 4 Backing up and Restoring Cisco UCS Domains, page 8 Import
More informationActiveImage Protector 3.5 for Hyper-V with SHR. User Guide - Back up Hyper-V Server 2012 R2 host and
ActiveImage Protector 3.5 for Hyper-V with SHR User Guide - Back up Hyper-V Server 2012 R2 host and restore individual virtual machines 2 nd Edition July 7, 2014 Copyright NetJapan, Inc. All Rights Reserved.
More informationBULLGUARD BAckUp GUIDE
BULLGUARD backup GUIDE CONTENTS BullGuard Backup introduction page 3 Installing BullGuard Backup page 6 Uninstalling BullGuard Backup page 11 Registering BullGuard Backup: creating an account page 12 Running
More information