5nine Cloud Monitor for Hyper-V
|
|
|
- Felicia Shaw
- 10 years ago
- Views:
Transcription
1 5nine Cloud Monitor for Hyper-V Getting Started Guide Table of Contents System Requirements... 2 Installation... 3 Getting Started... 8 Settings... 9 Authentication nine Cloud Monitor for Hyper-V objects Monitoring settings Alert settings Monitoring Datacenter Level Cluster level Host level Virtual machine level Port level Service level Uninstallation... 44
2 System Requirements Supported Operating Systems: Microsoft Windows Server 2008 R2 SP1 Microsoft Windows Server 2008 R2 Core SP1 Microsoft Hyper-V Server 2008 R2 SP1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 Core Microsoft Hyper-V Server 2012 Prerequisites:.NET Framework 4.0, Microsoft SQL Server.
3 Installation Before installing 5nine Cloud Monitor for Hyper-V on Server Core/Hyper-V operating systems you must perform the following steps: 1) Confirm you have Server 2008 R2 SP1 or later 2) Enable the following features on your Operating System: DISM.exe /online /enable-feature /featurename:servercore-wow64 DISM.exe /online /enable-feature /featurename:netfx2-servercore DISM.exe /online /enable-feature /featurename:netfx3-servercore DISM.exe /online /enable-feature /featurename:netfx2-servercore-wow64 DISM.exe /online /enable-feature /featurename:netfx3-servercore-wow64 DISM.exe /online /enable-feature /featurename:microsoftwindowspowershell DISM.exe /online /enable-feature /featurename:microsoftwindowspowershell-wow64 3) Install.NET 4.0 for Server Core. You can download it at: 4) Use the command net share (or Remote Management) to share folder on Server Core machine, and copy the setup.exe, MainSetup.msi and the license.txt files 5) Execute setup.exe on Server Core machine and follow instructions described below. The Web application will be installed by default to You can then navigate to the console from any machine with a browser:
4 All necessary firewall rules will be added automatically during the installation. Installation package consists of 2 files: 1.) Web application console setup and 2.) agent setup. The agent setup is only needed for a virtual machine inbound and outbound traffic statistics on remote hosts. For other indicators Management console setup is enough, solution is agentless. To setup the Web application the administrator needs to run setup.exe application from the downloaded 5nine Cloud Monitor for Hyper-V archive on the host server or virtual machine that matches the 5nine Cloud Monitor for Hyper-V System Requirements and enter the appropriate license when prompted: Then the 5nine Cloud Monitor for Hyper-V Setup Wizard will be opened, click Next on the dialog window to start installation:
5 Read the 5nine Cloud Monitor for Hyper-V License Agreement and then click Next: Select the folder where 5nine Cloud Monitor for Hyper-V will be installed:
6 You can check the physical space available on your drives and the space required for the installation by pressing the Disk Cost button on the window shown above: Confirm installation and click Next:
7 Enter the credentials of the domain user who has access to Hyper-V machines for the service account: Note: A best practice is to avoid using an existing real user account, but to create a dedicated user with corresponding rights and assign it to the service. Set the SQL Server instance that will be used and connect to it by entering user name and password. There could be either SQL Server Authentication or Windows Authentication used while gaining access to your database. To find out which authentication is used and get the user name and password contact your database administrator. After setup finishes the 5nine Hyper-V Cloud vmonitor service will be started automatically.
8 Getting Started To get 5nine Cloud Monitor for Hyper-V Web application ready to work, the following actions are required: First, the authentication is required prior to do anything further. The authentication as well as master credentials setting processes are described in the Authentication section of Settings chapter. Then, the objects are required to be added for monitoring. This is described in 5nine Cloud Monitor for Hyper-V objects section of the Settings chapter. Monitoring settings adjustment process is described in Monitoring settings section of the Settings chapter. Alert settings adjustment process is described in Alert settings section of the Settings chapter. Monitoring of the objects on the different levels is described in the Monitoring chapter.
9 Settings This chapter describes the necessary settings for preparing 5nine Cloud Monitor for Hyper-V Web application to perfrom as desired. Authentication Upon opening in your browser you will be prompted to enter your authentication credentials: To first logon you should use the credentials under which the service was installed. It s highly recommended to execute the action Master Credentials and set a predefined internal Admin user password. Then for security reasons use only these Master credentials to log on to the console. You can use these Master credentials for direct authentication to REST, OData and PowerShell API in the case of building integration with own systems and when it is not desirable to use/store windows user credentials anywhere. For details about the API integration see the 5nine Hyper-V Cloud vmonitor API.docx file also installed in application folder.
10 5nine Cloud Monitor for Hyper-V objects The monitoring process in 5nine Cloud Monitor for Hyper-V means controlling the certain physical and logical objects by monitoring their state parameters on the corresponding diagrams and checking the alerts. The object types that are monitored by 5nine Cloud Monitor for Hyper-V are described below. Object Types The following objects exist in 5nine Cloud Monitor for Hyper-V: DataCenter. This is the necessary object required to be added prior to any further objects. DataCenter is a formal aggregating entity that exists for the purpose of joining the other objects into the process as its as subsidiaries. Cluster. Cluster object represents multiple servers, two or more, joined into a cluster. Host. Host object represents a single server, which normally hosts virtual machines. Port. Port object represents a standard TCP port, e.g., :3389. Service. Service object represents any OS Windows service, e.g., 59CBTService. Adding objects for monitoring To begin monitoring objects first you must add the DataCenter object. There is a panel menu on the left upper corner: You must specify the name of DataCenter, and optionally Login and Password of windows (domain) user under which performance information will be collected from objects. In most cases you can leave these
11 fields empty then those credentials under which service is running will be used. In the case in which you have several datacenters belonging to different domains then of course you must specify credentials for each of these datacenters. During monitoring these credentials will flow from the root objects to their descendants, however you can always specify some of the descendants have their own credentials. After DataCenter is added, you can select it in the tree view and then the other menus will be un-grayed. On selecting the DataCenter item, there will be un-grayed dropdown menus for adding other types of objects. Click on Add Cluster and enter name, address, login and password in the appropriate fields of the appeared dialog:
12 After a short time (less than 1 minute) you can expand the tree and see its nodes and VMs: Then add host(s):
13 port(s): and service(s):
14 Note: Make sure to enter exactly windows Service name value in the Service Name field of the dialog (do not confuse it with Display Name that is shown in the services list and does not identify the Windows service)! Clicking on the node will display the information summary for the selected object at the main Summary tab. The current status of the selected object is also displayed on the Summary tab. You can also Enable or Disable monitoring of the selected object by simply clicking the Enable/Disable Monitoring button which appears on the right-upper spot of the window depending on the current status: The view will differ depending on which object is selected. The sections of the Monitoring chapter below will describe the monitoring tabs view on all levels.
15 Other panel menu commands If you want to edit the selected object, click Edit Object button on the left panel: Then enter new parameters in the corresponding dialog that will appear depending on what object is selected: for datacenter: for cluster:
16 for host: for port: for service:
17 If you want to set or change credentials for the selected object, click the Set Credentials button on the left panel: Then enter your login and password in the appeared dialog as required and click OK. If you want to remove the selected object, click the Remove Object button on the left panel: Then confirm the removal of the object in the dialog shown: If you want to refresh the list of monitored objects, click the Refresh List button on the left panel: If you want to refresh the information of the selected object, click the Refresh Information button on the right panel:
18 If you finished working with the application you can close the session, by clicking the Log Out button in right-upper corner of the 5nine Hyper-V Cloud vmonitor main window: By default if there is no any activity for a period of 20 minutes thesession will be closed automatically.
19 Monitoring settings You can change the global monitoring settings, set up SMTP alert actions and mail settings by clicking the Monitoring Settings button in right-upper corner of the 5nine Cloud Monitor for Hyper-V main window:
20 Set the monitoring parameters as follows: Clear the Enable Guest Monitoring checkbox if you wish to exclude virtual machines from monitoring. All the other added objects will still be monitored. Set the monitoring frequency: the values are chosen from the Poll frequency list box (1,2,3,4,5,10,15 minutes): Enter credentials in the fields Login and Password, if needed. It is not necessarily to do this in the case in which the service is installed already has permissions to collect information on monitored objects. Set alert actions for warnings and errors. There are two similar list boxes for each alert type with the following choices: None do not document alerts. Add Event to Event Log add events to log (will be displayed on Alerts tab of main window). Send Notification send to the chosen recipients (settings described below). Add Event and Send Notification perform both of the actions above. Set up mail parameters for notifications: Specify SMTP server address (e.g., mail.crossinform.ru or ). Enter the port. Tick Requires Authentication box if authentication is necessary. Tick SSL box if security socket layer usage required when sending notification s. Enter credentials user name and password if SMTP server requires authentication (Requires Authentication box was ticked as described above). Specify address from which notification s will be sent. Enter addresses of recipients, separated by a semicolon (;).
21 Alert settings You can browse alerts on a per object basis by clicking the corresponding objects in the tree, or you can select datacenter and see all alerts for the datacenter s descendant objects: You can dismiss some of alerts or all at once by clicking corresponding clear alerts buttons: All of the actions with alerts are similar no matter which object is selected.
22 If you want to overview the current alert settings click Alert Settings button in right-upper corner of the 5nine Cloud Monitor for Hyper-V main window: If you want to change the setting of the alert then just click the pencil button icon on the left of the alert list. The following dialog will appear:
23 Set the alert parameters as follows and (change predefined values if necessary): Enter the alert name. There are predefined names for all the factors, though you can alter them at your own wish. The new alert name will be shown then in all other places. Enter the new description. Choose the new category. Values are chosen from the Category list box: None neither of the parameters will be monitored. Health parameter health will be monitored. Processor processor state/usage will be monitored. Memory memory utilization/availability will be monitored. Network network utilization/performance will be monitored. Storage disk utilization/performance will be monitored. Chose the scope for monitoring. Values are chosen from the Scope list box: None neither level will be read. Host parameters will be read on the host level. Guest parameters will be read on the VM level. Cluster parameters will be read on the cluster level. Node parameters will be read on the node level. Port parameters will be read on the port level. Service parameters will be read on the service level. DataCenter parameters will be read on Data Center level. Global parameters will be read on the global level. Choose the alert condition from the Condition list box: Equals the reading must be equal to the set threshold value for the alert. Above the reading must exceed the set threshold value for the alert. Below the reading must be below the set threshold value for the alert.
24 Choose the unit of measure from the UOM list box: Percent for the percent. KB for the kilobytes. MB for the megabytes. GB for the gigabytes. KBPerSec for the kilobytes per second. MBPerSec for the megabytes per second. GBPerSec for the gigabytes per second. Count for counting the number of necessary units/events etc. Trigger Rule. It is advised not to alter this predefined parameter. Enter warning threshold for the alert. This figure refers to the numerical value of the alert parameters entered above for the warning alert to happen. Enter error threshold for the alert. This figure refers to the numerical value of the alert parameters entered above for the error alert to happen. Enter the condition length in seconds that must be reached for the alert. Enter the report range. Enter the report frequency in seconds. Clear Enabled check box if you no longer wish for the current alert to happen. Click OK in the Modify Alert Definition dialog when you are finished. The table below contains the description of predefined failures and matching parameters: Parameter Failure Description High Logical Processor Usage Host processor overutilization A condition when the percentage of time spent by the processor in guest and hypervisor code is greater than specified threshold High Memory Pressure Host memory low performance A condition when the rate at which pages are read from or written to disk is greater than specified threshold. Low Network Performance Network throughput insufficiency A condition when the network interface output queue length is greater than specified threshold. High Disk I/O Utilization Host disk input/output overload A condition when condition when the disk I/O utilization is greater than specified threshold.
25 Parameter Failure Description High Virtual Processor Usage Low Disk Performance Host Connection Failure High VP to LP Ratio Low Available Memory VM Health Critical High Network Utilization High Virtual Network Utilization High Daily Inbound Network Traffic High Guest Processor Usage High Guest Processor Frequency Low Dynamic Memory Buffer High Assigned Memory Usage Low Free Space Overutilization of host processor resources assigned for virtual machines Host disk performance insufficiency Impossibility to set the connection with the host in a timely manner Over usage of host processor resources in terms of its share assigned to virtual machines Critically low amount of available memory on the host Greater amount of VMs in critical health Network resources comparative overutilization Virtual network traffic is over limit Virtual daily inbound network traffic is over limit Over usage of a host processor resources assigned for virtual machine in percentage Frequency of a host processor when serving virtual machine is over limit Available dynamic memory buffer for virtual machine is below limit Assigned virtual machine memory overutilization Disk free space assigned for virtual machine is below limit A condition when the percentage of time spent by the virtual processor in guest and hypervisor code is greater than specified threshold. A condition when the storage output queue length is greater than specified threshold. A condition when the host connection cannot be established during the specified threshold timeout. A condition when the virtual to logical processors ratio is greater than specified threshold. A condition when the percentage of available memory is less than specified threshold. A condition when the number of virtual machines that with critical health is greater than specified threshold. A condition when the percentage of network utilization is greater than specified threshold. A condition when the virtual network adapter utilization is greater than specified threshold. A condition when the inbound network traffic from the beginning of the current day is greater than specified threshold. A condition when guest processor load is greater than specified threshold. A condition when guest processor frequency is greater than specified threshold. A condition when available memory buffer is less than specified threshold. A condition when the assigned memory usage is greater than specified threshold. A condition when the free space is lower than specified threshold.
26 Parameter Failure Description High Daily Outbound Network Traffic High Virtual Disk Utilization High Memory Usage Cluster Connection Failure Port Connection Failure Service Failure Virtual daily outbound network traffic is over limit Virtual disk resources overload Assigned virtual memory over usage in percent Impossible to set the connection with the cluster in a timely manner Impossible to set the connection through the port in a timely manner Service unavailability or inactive state (not running) during specified time period A condition when the outbound network traffic from the beginning of the current day is greater than specified threshold. A condition when the virtual disk utilization is greater than specified threshold. A condition when the memory usage is greater than specified threshold. A condition when the cluster connection cannot be established during the specified threshold timeout. A condition when the port connection cannot be established during the specified threshold timeout. A condition when the service cannot be found or state is not running during the specified threshold timeout.
27 Monitoring The chapter describes monitoring the interface view for different objects by levels. Datacenter Level When the selected object is Datacenter there will be the following tab information view: Summary
28 The information shown here differs from that on the single host as datacenter is supposed used to join multiple objects. The total figures are displayed here with the top 3 resource consumers shown for each performance parameter. Alerts Alerts tab displays the list of alerts for the selected datacenter:
29 Cluster level When the selected object is a Cluster there will be the following tab information view: Summary The information shown on the Summary tab for a cluster looks to the same as that for a datacenter. There are total figures are displayed here with top 3 resource consumers shown for each performance parameter.
30 Alerts Alerts tab displays the list of alerts for the selected cluster:
31 Host level When the selected object is the host there will be the following tab information view: Summary
32 CPU CPU tab displays recent CPU information for the selected host: The upper diagram shows the host logical processor usage in percent with the predefined poll frequency either by default value or set by user (will be described below). The lower diagram shows the CPU utilization percentage by virtual machines running on the current host.
33 Memory Memory tab displays recent memory information of the selected host: The diagram in the picture shows the total percentage of memory utilization on the current host. Network Network tab displays recent network utilization data of the selected host: The diagram in the picture shows the total percentage of network activity on the current host.
34 Disk Disk tab displays recent disk utilization data for the selected host: The diagram in the picture shows the total disk usage information on the current host in real figures (bps/kbps/mbps). Alerts Alerts tab displays the list of alerts for the selected host:
35 Virtual machine level The Virtual machine must be on and running so that all the tabs for it are displayed. When the selected object is a virtual machine there will be the following tab information view: Summary
36 CPU CPU tab displays recent CPU information for the selected virtual machine: The diagram shows the host CPU utilization percentage share of current virtual machine. Memory Memory tab displays recent memory information for the selected virtual machine: The upper diagram shows the dynamic memory buffer availability in percent for the current virtual machine. The lower diagram shows the guest memory utilization percentage for the current virtual
37 machine. Network Network tab displays recent network utilization data for the selected virtual machine. There are 3 diagrams in the Network tab: Virtual Network Usage
38 Outbound Traffic Outbound traffic diagram displays the top IP statistics for outbound traffic, i.e. top IP-address traffic contributors are shown in descending order for a selected VM. Percentage shows the frequency IP-address is the top traffic contributor within the period shown in the diagram. Inbound Traffic Outbound traffic diagram displays similar information but for inbound traffic for a selected VM.
39 Note: The last two diagrams are shown only if the 5nine Monitor capturing extension is installed and switched on. Disk Disk tab displays recent disk utilization data for the selected virtual machine: The upper diagram shows the virtual disk usage information on the current virtual machine in real figures (bps/kbps/mbps). The lower diagram shows the free space on the virtual disk using the total memory share assigned for current virtual machine from the host as the total available.
40 Win2012 Resource Metering Win2012 Resource Metering tab shows the new parameters specifically for the virtual machines of the host with OS Windows Server 2012 installed. It currently shows the host CPU and memory usage parameters for the current virtual machine as it appears in the display picture: - Average CPU Usage (in MHz); - Average memory use (in Mb); - Minimum memory use (in Mb).
41 Alerts Alerts tab displays the list of alerts for the selected virtual machine:
42 Port level When the selected object is a port the following tab information view will display: Summary Alerts Alerts tab displays the list of alerts for the selected port:
43 Service level When the selected object is a service the following tab information view will display: Summary Alerts Alerts tab displays the list of alerts for the selected service:
44 Uninstallation To uninstall 5nine Cloud Monitor for Hyper-V from your server, go to Control Panel Programs Programs and Features Uninstall a Program. Then choose 5nine Hyper-V Cloud vmonitor on the program list and click Uninstall to run 5nine Cloud Monitor for Hyper-V uninstallation process, and then follow the system hints.
5nine EASY Backup Quick User Guide
5nine EASY Backup Quick User Guide Installation Supported Operating Systems: Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2008 R2 Core SP1 Microsoft Hyper-V Server
5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager
5nine Security for Hyper-V Datacenter Edition Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager November 2013 11 Table of Contents Summary... 5 System requirements... 5 Permissions...
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide
Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License
Web Sites, Virtual Machines, Service Management Portal and Service Management API Beta Installation Guide
Web Sites, Virtual Machines, Service Management Portal and Service Management API Beta Installation Guide Contents Introduction... 2 Environment Topology... 2 Virtual Machines / System Requirements...
VMware/Hyper-V Backup Plug-in User Guide
VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
WEBCONNECT INSTALLATION GUIDE. Version 1.96
WEBCONNECT INSTALLATION GUIDE Version 1.96 Copyright 1981-2015 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop Business
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
PHD Virtual Backup for Hyper-V
PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Veeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
Altaro Hyper-V Backup - Getting Started
Altaro Hyper-V Backup - Getting Started System Requirements Supported Host Operating Systems: Altaro Hyper-V Backup: o Windows 2008 R2 (all editions) o Windows 2008 R2 SP1 o Windows Hyper-V Server 2008
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide
Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live
NovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
User s Manual. Management Software for ATS
ATS Monitor User s Manual Management Software for ATS Table of Contents 1. ATS Monitor Overview... 2 2. ATS Monitor Install and Uninstall... 2 2.1. System Requirement... 2 2.2. Software Install... 2 2.3.
Enterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
ArCycle vmbackup. for VMware/Hyper-V. User Guide
ArCycle vmbackup for VMware/Hyper-V User Guide 2 Copyright Copyright ArCycle Software, Ltd., 2011-2014. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,
intertrax Suite resource MGR Web
intertrax Suite resource MGR Web Resource Management Installation Guide Version 4 2012 Copyright 2003-2012 by Salamander Technologies, Inc. Protected by US Patents 5,573,278; 5,596,652; 5,793,882; 6,761,312;
Unitrends Virtual Backup Installation Guide Version 8.0
Unitrends Virtual Backup Installation Guide Version 8.0 Release June 2014 7 Technology Circle, Suite 100 Columbia, SC 29203 Phone: 803.454.0300 Contents Chapter 1 Getting Started... 1 Version 8 Architecture...
LepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
Server Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
OneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
Desktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Creating client-server setup with multiple clients
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
Team Foundation Server 2012 Installation Guide
Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day [email protected] v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation
SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE
SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE Contents Introduction... 3 Step 1 Create Azure Components... 5 Step 1.1 Virtual Network... 5 Step 1.1.1 Virtual Network Details... 6 Step 1.1.2 DNS Servers
SmartSync Monitor Help
1.0 (Build 15) 2 Table of Contents Foreword 0 Part I Welcome to SmartSync Monitor 3 Part II Getting Started 4 1 Copyright... 4 2 System... requirements and installation 4 3 Uninstalling... 5 6 Part III
Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition
Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition The installation of Lync Server 2010 is a fairly task-intensive process. In this article, I will walk you through each of the tasks,
Installation Guide. Live Maps 7.4 for System Center 2012
Installation Guide Live Maps 7.4 for System Center 2012 1 Introduction... 4 1.1 1.2 About This Guide... 4 Supported Products... 4 1.3 1.4 Related Documents... 4 Understanding Live Maps... 4 1.5 Upgrade
ADFS 2.0 Application Director Blueprint Deployment Guide
Introduction: ADFS 2.0 Application Director Blueprint Deployment Guide Active Directory Federation Service (ADFS) is a software component from Microsoft that allows users to use single sign-on (SSO) to
Virtualizing your Datacenter
Virtualizing your Datacenter with Windows Server 2012 R2 & System Center 2012 R2 Part 2 Hands-On Lab Step-by-Step Guide For the VMs the following credentials: Username: Contoso\Administrator Password:
CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
User Guide Online Backup
User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading
Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
TecLocal 4.0 MultiUser Database
Tec Local 4.0 - Installation Manual: Byer Mode & Multi-User (Server) TecLocal 4.0 MultiUser Database Installation Manual: Buyer Mode & Multi-User (Part I - Server) Version: 1.0 Author: TecCom Solution
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
XenDesktop Implementation Guide
Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation
Shavlik Patch for Microsoft System Center
Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
5nine Manager for Hyper-V PLUS. Version 7.1
5nine Manager for Hyper-V PLUS Version 7.1 August 2015 11 Table of Contents Summary... 7 System requirements... 9 Installation... 10 5nine Management Service for Hyper-V PLUS installation... 11 5nine Manager
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
Immotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.
Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
NETWRIX CHANGE NOTIFIER
NETWRIX CHANGE NOTIFIER FOR SQL SERVER QUICK-START GUIDE Product Version: 2.6.194 February 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute
Acronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
5nine Manager for Hyper-V. Version 7.1
5nine Manager for Hyper-V Version 7.1 August 2015 11 Table of Contents Summary... 7 System requirements... 9 Installation... 10 Launching 5nine Manager... 14 Single instance launch... 14 Multiple instances
NETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and
StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with Hyper-V Cluster
#1 HyperConverged Appliance for SMB and ROBO StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with MARCH 2015 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the
StarWind iscsi SAN: Global Deduplication with Veeam Backup&Replication
StarWind iscsi SAN: Global Deduplication with Veeam Backup&Replication May 2012 TRADEMARKS StarWind, StarWind Software, and the StarWind and StarWind Software logos are trademarks of StarWind Software
How To Set Up A Two Node Hyperv Cluster With Failover Clustering And Cluster Shared Volume (Csv) Enabled
Getting Started with Hyper-V and the Scale Computing Cluster Scale Computing 5225 Exploration Drive Indianapolis, IN, 46241 Contents Contents CHAPTER 1 Introduction to Hyper-V: BEFORE YOU START. vii Revision
Ekran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Remote Application Server Version 14. Last updated: 25-02-15
Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces
ITA Mail Archive Setup Guide
This version of ITA Mail Archive is optimized to archive emails on both Microsoft Exchange 2000 and 2003 and 2007 servers. It is highly recommended that ITA Mail Archive should run on a server other than
Hyper-V Protection. User guide
Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Windows Server 2012 Hyper-V support... 3 2. Hyper-V protection features... 3
Synchronizer Installation
Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient
1. Open the preferences screen by opening the Mail menu and selecting Preferences...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
efolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Quick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix
Standard Setup Guide 1 2 3 4 5 Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix Read this manual carefully before you use this product and keep it
Trial environment setup. Exchange Server Archiver - 3.0
Trial environment setup Exchange Server Archiver - 3.0 Introduction This document describes how you can set up a trial environment for using Exchange Server Archiver with Exchange Server 2007. You do not
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
NovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
3 Setting up Databases on a Microsoft SQL 7.0 Server
3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other
with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.
with the ArchiveSync Add-On Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 Required Add-Ons for ArchiveSync in Real-Time... 3 Communications
DOCSVAULT Document Management System for everyone
Installation Guide DOCSVAULT Document Management System for everyone 9 v Desktop and Web Client v On Premises Solution v Intelligent Data Capture v Email Automation v Workflow & Record Retention Installing
Lab 1: Windows Azure Virtual Machines
Lab 1: Windows Azure Virtual Machines Overview In this hands-on Lab, you will learn how to deploy a simple web page to a Web server hosted in Windows Azure and configure load balancing. Objectives In this
SiteCount v2.0 Revised: 10/30/2009
SiteCount v2.0 Revised: 10/30/2009 Copyright 2009, Traf-SYS, Inc. Contents Introduction... 4 Requirements... 4 General... 4 Software... 4 Hardware... 4 Fulfilling Software Requirements... 5 Installation
NETWRIX USER ACTIVITY VIDEO REPORTER
NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
Juniper Networks Management Pack Documentation
Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
Pharos Control User Guide
Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter
5nine Cloud Security for Hyper-V. Version 6.0
5nine Cloud Security for Hyper-V Version 6.0 July 2015 2015 5nine Software All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
GFI Product Manual. ReportPack Manual
GFI Product Manual ReportPack Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of
KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
Pro Bundle Evaluator s Guide. 2015 Software Pursuits, Inc.
Pro Bundle Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 About the Communications Agent Add-On... 3 Other SureSync Add-Ons... 4 File Locking
Acronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
AVG 8.5 Anti-Virus Network Edition
AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide
Direct Storage Access Using NetApp SnapDrive Installation & Administration Guide SnapDrive overview... 3 What SnapDrive does... 3 What SnapDrive does not do... 3 Recommendations for using SnapDrive...
How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2
BANDWIDTH METER FOR HYPER-V NEW FEATURES OF 2.0 The Bandwidth Meter is an active application now, not just a passive observer. It can send email notifications if some bandwidth threshold reached, run scripts
Netwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
