EMC Celerra Network Server
|
|
|
- Paulina Fox
- 10 years ago
- Views:
Transcription
1 EMC Celerra Network Server Release Using Windows Administrative Tools with Celerra P/N REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA
2 Copyright 2009 EMC Corporation. All rights reserved. Published December 2009 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date regulatory document for your product line, go to the Technical Documentation and Advisories section on EMC Powerlink. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. All other trademarks used herein are the property of their respective owners. Corporate Headquarters: Hopkinton, MA Using Windows Administrative Tools with Celerra
3 Contents Preface...5 Chapter 1: Introduction...7 System requirements...8 Related information...8 Chapter 2: Concepts...11 Local groups...12 User rights...12 Auditing...13 Chapter 3: Managing the Windows Server...17 Open Computer Management MMC...18 Create local groups on a Data Mover using MMC...20 Assign user rights using Celerra Management Console...22 Create shares and set ACLs using MMC...24 Monitor Data Mover connections and resource usage using MMC...26 Monitor users on the Data Mover...27 Monitor access to shares on the Data Mover...28 Monitor use of files on the Data Mover...29 Audit CIFS users and objects using Celerra Management Console...30 Specify the audit policy...31 Set the audit log parameters...33 Change log file size...34 View the audit events...37 Disable auditing...39 Connect the MMC to a CIFS server...40 Using Windows Administrative Tools with Celerra
4 Contents Chapter 4: Managing Windows NT...43 Access Windows NT management interfaces for a CIFS server...44 Access User Manager for Domains...44 Access Server Manager for Domains...46 Access Event Viewer...47 Create local groups on a Data Mover using User Manager...48 Assign user rights using User Manager...50 Create shares and set ACLs using Server Manager...52 Monitor Data Mover connections and resource usage using Server Manager...54 Monitor users on the Data Mover...55 Monitor access to shares on the Data Mover...57 Monitor use of Data Mover resources...58 Audit CIFS users and objects using Windows NT management interfaces...59 Specify the auditing policy...59 Set the audit log parameters...61 Change log file size...62 View the audit events...64 Disable auditing using User Manager...65 Enable auditing on a folder or file...66 Chapter 5: Troubleshooting...73 Where to get help...74 EMC E-Lab Interoperability Navigator...74 EMC Training and Professional Services...74 Terminology...77 Index Using Windows Administrative Tools with Celerra
5 Preface As part of an effort to improve and enhance the performance and capabilities of its product lines, EMC periodically releases revisions of its hardware and software. Therefore, some functions described in this document may not be supported by all versions of the software or hardware currently in use. For the most up-to-date information on product features, refer to your product release notes. If a product does not function properly or does not function as described in this document, please contact your EMC representative. Using Windows Administrative Tools with Celerra
6 Preface Special notice conventions EMC uses the following conventions for special notices: A caution contains information essential to avoid data loss or damage to the system or equipment. Important: An important note contains information essential to operation of the software. Note: A note presents information that is important, but not hazard-related. Hint: A note that provides suggested advice to users, often involving follow-on activity for a particular action. Where to get help EMC support, product, and licensing information can be obtained as follows: Product information For documentation, release notes, software updates, or for information about EMC products, licensing, and service, go to the EMC Powerlink website (registration required) at Troubleshooting Go to Powerlink, search for Celerra Tools, and select Celerra Troubleshooting from the navigation panel on the left. Technical support For technical support, go to EMC Customer Service on Powerlink. After logging in to the Powerlink website, go to Support Request Support. To open a service request through Powerlink, you must have a valid support agreement. Contact your EMC Customer Support Representative for details about obtaining a valid support agreement or to answer any questions about your account. Note: Do not request a specific support representative unless one has already been assigned to your particular system problem. Your comments Your suggestions will help us continue to improve the accuracy, organization, and overall quality of the user publications. Please send your opinion of this document to: [email protected] 6 Using Windows Administrative Tools with Celerra
7 1 Introduction The EMC Celerra Network Server supports the CIFS protocol that allows Windows clients to access files stored on the Celerra Network Server. After you configure the Celerra Network Server to support Windows clients on the network, use Windows tools to perform a variety of administrative tasks on the Data Mover. The Configuring and Managing CIFS on Celerra provides more information about how to configure the Celerra Network Server for CIFS support. This document is part of the Celerra Network Server documentation set and is intended for system administrators responsible for implementing the Celerra Network Server in their Windows network or for adding Windows clients to their existing UNIX network. System requirements on page 8 Related information on page 8 Using Windows Administrative Tools with Celerra
8 Introduction System requirements Table 1 on page 8 describes the Celerra Network Server software, hardware, network, and storage configurations. Table 1. System requirements Software Hardware Network Storage Celerra Network Server version No specific hardware requirements No specific network requirements No specific storage requirements Related information For specific information related to the features and functionality described in this document: Configuring and Managing CIFS on Celerra Celerra Network Server Command Reference Manual ManagingCelerra for a Multiprotocol Environment Using International Character Sets with Celerra Using Wizards to Configure Celerra Configuring Celerra User Mapping Using NT Migrate with Celerra Online Celerra man pages EMC Celerra Network Server Documentation CD The EMC Celerra Network Server Documentation CD, supplied with Celerra and also available on the EMC Powerlink website, provides the complete set of EMC Celerra customer publications. After logging in to Powerlink, go to Support Technical Documentation and Advisories Hardware/Platforms Documentation Celerra Network Server. On this page, click Add to Favorites. The Favorites section on your Powerlink home page provides a link that takes you directly to this page. To request an EMC Celerra Network Server Documentation CD, send an request to: [email protected] 8 Using Windows Administrative Tools with Celerra
9 Introduction Celerra Support Demos Celerra Support Demos are available on Powerlink. Use these instructional videos to learn how to perform a variety of Celerra configuration and management tasks. After logging in to Powerlink, go to Support Product and Diagnostic Tools Celerra Tools Celerra Support Demos. Celerra wizards Celerra wizards can be used to perform Celerra Manager tasks. Using Wizards to Configure Celerra provides you with an overview of the steps required to configure a Celerra Network Server by using the Set Up Celerra wizard in Celerra Manager. Related information 9
10 Introduction 10 Using Windows Administrative Tools with Celerra
11 2 Concepts The concepts to understand the administrative tools are: Local groups on page 12 User rights on page 12 Auditing on page 13 Using Windows Administrative Tools with Celerra
12 Concepts Local groups When a new CIFS service is created on a Data Mover and it becomes a domain member, there are no local groups resident on the Data Mover. After you create a CIFS service on a Data Mover and add the Data Mover to the domain, use Windows NT User Manager to create and manage local groups on the Data Mover. A local group is granted permissions and rights from its own computer to only those resources on its own computer on which the group resides. In the Windows Server native domain, local groups can contain user accounts, global groups, and domain local groups, but not other local groups. Celerra Network Server supports all types of Microsoft Windows Server user groups and nested groups. Celerra Network Server also supports local user accounts if they are set up. Configuring and Managing CIFS for Celerra provides more information about local groups. In a Windows NT domain, local groups can contain user accounts and global groups, but not other local groups. Celerra Network Server supports all types of Windows NT users groups. However, Celerra Network Server does not support local user accounts. Windows NT online help provides more information on creating and managing local groups. User rights You can use user rights assignments to manage which users and groups can log in to or execute tasks on a Data Mover. User rights assignments are local policies that apply only to the selected Data Mover. Local groups, individual users, and global groups can be assigned privileges to: Access this computer from the network Back up files and directories Bypass traverse checking (improves performance) Perform EMC Virus Checking Generate security audits Increase quotas Log in as a batch job Log in as a service Log in locally Manage auditing and security log Restore files and directories Set security audit (users with this privilege can manage audits on the server) 12 Using Windows Administrative Tools with Celerra
13 Concepts Take ownership of files or object (all administrators have this capability) Note: This capability is not supported for Data Movers in the current release. To set user rights for individual users and global groups on a Data Mover, use the Celerra Data Mover Security Management Console, which is an MMC snap-in to the Celerra Management Console. Installing Celerra Management Applications provides information about installing the Celerra Management Console. The Celerra Data Mover Security Management snap-in online help provides information about setting user rights. Note: You cannot use Microsoft Windows Local Policy Setting tools to manage user rights assignments on a Data Mover because in Windows servers, these tools do not support managing user rights on a remote computer. Auditing To audit CIFS servers on a Data Mover, use the Celerra Data Mover Security Management Console, which is a MMC snap-in to the Celerra Management Console. By default, auditing is disabled for all Windows object classes. To enable auditing, you must explicitly turn it on for specific events on specific Data Movers. After it is enabled, auditing is initiated whenever the CIFS service on the relevant Data Mover is started, and terminated whenever the CIFS service is stopped. Installing Celerra Management Applications contains information about installing the Celerra Management Console. The Celerra Data Mover Security Management snap-in online help provides information on setting audit policies. If the Group Policy Object (GPO) is configured and enabled on the Data Mover, then the GPO configuration of the audit settings is used. Configuring and Managing CIFS on Celerra provides more information about configuring audit settings. The log files (security.evt, application.evt, and system.evt) are typically stored in the root file system, which has a maximum capacity of 128 MB. If you expect to retain large Event Viewer logs, you should select a different directory for storing these log files. To do so, edit the Registry residing on the Data Mover. If you do not have experience editing the Registry, seek assistance. You can use the Windows NT Event Viewer to audit Data Movers for certain events and activities. Many of the event types available for monitoring and auditing on a Windows NT server can be audited on a Data Mover. Auditing is available only on the specific object classes and events listed in Table 2 on page 14. Only members of the Administrators local group can set auditing on a server. Auditing 13
14 Concepts Table 2. Auditing object classes Object class Event Audited for Logon/logoff CIFS user login success CIFS guest login Windows NT/UNIX mapping (user/domain combination not found) failure Password authentication error returned by domain controller (DC) DC returned a nonprocessed error code No reply from DC (insufficient resources or bad protocol) File and object access Object Open: success File and directory access, if system access control list (SACL) is set, for read, write, delete, execute, set permissions, and take ownership Security Access Manager (SAM) local group modification Close Handle: File and directory access (if SACL set) for read, write, delete, execute, set permissions, and take ownership SAM database close Object Open for Delete: File and directory access (if SACL set) Delete Object: File and directory access (if SACL set) Process tracking System restart/shutdown SAM database access (lookup) Not supported Restart: success and failure N/A success CIFS service startup (includes DART release number) CIFS service shutdown Audit log cleared 14 Using Windows Administrative Tools with Celerra
15 Concepts Table 2. Auditing object classes (continued) Object class Security policies Event Session Privileges: Audited for success Enumerate user privileges User rights assigned User rights deleted Use of user rights Policy Change: List policy categories and associated audit state Not supported N/A User and group management Create local group success Delete local group Add member to local group Remove member from local group When auditing is enabled, the Event Viewer creates a Security log with the default settings shown in Table 3 on page 15. Table 3. Default log settings Log type Windows NT filename Maximum file size Retention Security C:\security.evt 512 KB 10 days Note: Before you can modify these values, you must complete the procedure in "Change log file size on page 62" All Windows NT network users can establish auditing on directories or files they own, or to which they have read, write, and execute rights. The Celerra Network Server supports auditing on individual folders and files. Auditing 15
16 Concepts 16 Using Windows Administrative Tools with Celerra
17 3 Managing the Windows Server The administrative tasks to manage Windows on the CIFS server are: Note: For purposes of illustrating management steps, Windows 2000 is used in this document. Depending on your version of Windows the steps required to accomplish these steps may vary. Open Computer Management MMC on page 18 Create local groups on a Data Mover using MMC on page 20 Assign user rights using Celerra Management Console on page 22 Create shares and set ACLs using MMC on page 24 Monitor Data Mover connections and resource usage using MMC on page 26 Audit CIFS users and objects using Celerra Management Console on page 30 Disable auditing on page 39 Connect the MMC to a CIFS server on page 40 Using Windows Administrative Tools with Celerra
18 Managing the Windows Server Open Computer Management MMC Many Windows administrative tasks can be performed from the Computer Management Microsoft Management Console (MMC). This procedure opens the Computer Management MMC for a specific Data Mover Log in to Windows Server with administrator privileges for the Data Mover. From the Start menu, select Programs Administrative Tools Computer Management. 3. Double-click EMC Celerra, and then click Computers. Note: This is the default location. This might have changed after the CIFS server was joined to the domain. 18 Using Windows Administrative Tools with Celerra
19 Managing the Windows Server 4. In the Computer panel, right-click the Data Mover to manage, and then select Manage from the shortcut menu. As an alternative: From the Start menu, select Programs Administrative Tools Computer Management. The Computer Management window opens. To connect to a Data Mover, click Computer Management (local), and then select Connect to another computer. Type the name of the Data Mover, and then click OK. Open Computer Management MMC 19
20 Managing the Windows Server Create local groups on a Data Mover using MMC Use this procedure to create local groups on a Data Mover. Note: The task instructions shown are for Windows Depending on your Windows version the steps required to accomplish these tasks may vary Open the Computer Management MMC for the Data Mover on which you want to create a local group. Open Computer Management MMC on page 18 provides instructions. Under System Tools, double-click Local Users and Groups. Right-click Groups, and then select New Group from the shortcut menu. 4. In the New Group dialog box, type a group name and a description. 20 Using Windows Administrative Tools with Celerra
21 Managing the Windows Server 5. Click Add. The Select Users or Groups dialog box appears Select user or group names and then click Add to add users or groups to the new group. Click OK.You return to the New Group dialog box. Click Create. The group is added to the Groups list. Create local groups on a Data Mover using MMC 21
22 Managing the Windows Server Assign user rights using Celerra Management Console After the Celerra Management Console is installed, use this procedure to access the Security Management snap-in Log in to a Windows Server with administrator privileges for the Data Mover. Click Start, and then select Programs Administrative Tools EMC Celerra Management. 3. If a Data Mover name appears after Data Mover Management, go to step 4. Otherwise: 1. Right-click Data Mover Management, and then select Connect to Data Mover from the shortcut menu. 2. In theselect Data Mover dialog box, select a Data Mover by using one of the following methods: In the Look in list, select the domain in which the Data Mover you want to manage is located, and then select the Data Mover from the list. In the Name field, type the computer name, IP address, or the NetBIOS name of the Data Mover. 4. Double-click Data Mover Management, and then double-click Data Mover Security Settings. 22 Using Windows Administrative Tools with Celerra
23 Managing the Windows Server 5. Select User Rights Assignment. The assignable rights appear in the right panel. 6. Double-click a user right to assign it to a particular group or user. The Celerra Data Mover Security Management snap-in online help provides more information on setting rights. Assign user rights using Celerra Management Console 23
24 Managing the Windows Server Create shares and set ACLs using MMC Before you begin To create a share with MMC, you must: Have assigned UNIX UIDs and GIDs to CIFS users. Configuring and Managing CIFS on Celerra and Configuring Celerra User Mapping provides instructions for assigning UIDs. Have mounted the file system and created directories you want to share. Be a member of the local Administrators group on a Data Mover. Procedure Use the MMC to create shares and set ACLs on shares after you create a CIFS server on a Data Mover, join it to the domain, and start the CIFS service. Note: Shares created through Windows administrative tools are accessible only from the NetBIOS name used by the Windows client. If you want the share to be globally accessible by all NetBIOS names, create a share with the Celerra server_export command and omit the option netbios=<netbiosname>. This procedure creates a share on a Data Mover for Windows Server. 1. Open the Computer Management MMC for the Data Mover. Open Computer Management MMC on page 18 provides instructions. 24 Using Windows Administrative Tools with Celerra
25 Managing the Windows Server 2. In the console tree, click Shared Folders Shares. The current shares in use appear on the right Right-click Shares, and then select New File Share from the shortcut menu. TheCreate Shared Folder dialog box appears. Provide: The name of the folder to share. Type the path of the folder, or click Browse and locate the folder. The share name for the folder.you cannot create a NetBIOS share name with the same name as a global share. The Celerra Network Server supports only ASCII share names. Share name length is limited to 12 ASCII characters unless Unicode support is enabled, in which case the limit is 80 multibyte characters. Share names cannot include the following characters: /, \, %, ", NUL (Null character), STX (start of header), SOT (start of text), and LF (line feed). Share names can contain spaces and other nonalphanumeric characters, but must be enclosed by quotas if spaces are used. Share names cannot begin with a - (hyphen). Share names are case-sentitive. A share description Click Next. You are prompted for share permissions. For Windows Server, set permissions by selecting one of the options. With the Customize Share and Folder Permissions option, you can assign permissions to individual groups and users. Click Finish. Create shares and set ACLs using MMC 25
26 Managing the Windows Server Monitor Data Mover connections and resource usage using MMC You can use Windows administrative tools to: Monitor users on the Data Mover on page 27 Monitor access to shares on the Data Mover on page 28 Monitor use of files on the Data Mover on page Using Windows Administrative Tools with Celerra
27 Managing the Windows Server Monitor users on the Data Mover For Windows servers, use this procedure to monitor the number of users connected to a CIFS server Open the Computer Management MMC for the Data Mover you want to monitor. Open Computer Management MMC on page 18 provides instructions. In the console tree, click Shared Folders Sessions. The current users connected to the CIFS server appear on the right. 3. Optionally: To force disconnections from the CIFS server, right-click the username, and then select Close Session from the shortcut menu. To force all users to disconnect, right-click Sessions, and then select Disconnect All Sessions from the shortcut menu. Monitor Data Mover connections and resource usage using MMC 27
28 Managing the Windows Server Monitor access to shares on the Data Mover Use this procedure to monitor access to shares on the CIFS server. Note: The steps and instruction screens for this task are for Windows Depending on your Windows version, the steps required to accomplish this task may vary Open the Computer Management MMC for the Data Mover. Open Computer Management MMC on page 18 provides instructions. In the console tree, click Shared Folders Shares. The current shares in use appear on the right. 3 Optionally, to force disconnections from a share, right-click the share name, and then select Stop Sharing from the shortcut menu. 28 Using Windows Administrative Tools with Celerra
29 Managing the Windows Server Monitor use of files on the Data Mover For Windows servers, use this procedure to monitor open files on the CIFS server Open the Computer Management MMC for the Data Mover. Open Computer Management MMC on page 18 provides instructions. In the console tree, click Shared Folders Open Files. The files in use appear on the right. 3. Optionally, to close an open file, right-click the file, and then select Close Open File from the shortcut menu. To close all open files, right-click the Open Files folder, and then select Disconnect All Open Files from the shortcut menu. Monitor Data Mover connections and resource usage using MMC 29
30 Managing the Windows Server Audit CIFS users and objects using Celerra Management Console Complete the following steps to enable auditing on a Data Mover: Specify the audit policy on page 31 Set the audit log parameters on page 33 Change log file size on page 34 View the audit events on page 37 Note: Ensure that the CIFS service is running on the Data Mover. 30 Using Windows Administrative Tools with Celerra
31 Managing the Windows Server Specify the audit policy After the Celerra Management Console is installed, use this procedure to access the Security Management snap-in and specify audit policies Log in to a Microsoft Windows server by using an account that is a member of the local Administrators group on the Data Mover. Click Start, and then select Programs Administrative Tools EMC Celerra Management. 3. In the Celerra Management window: If a Data Mover is selected (name appears after Data Mover Management), go to step 4. If a Data Mover is not selected: 1. Right-click Data Mover Management, and then select Connect to Data Mover from the shortcut menu. 2. In the Select Data Mover box, to select a Data Mover: In the Look in list, select the domain in which the Data Mover you want to manage is located, and then select the Data Mover from the list. In the Name field, type the computer name, IP address, or the NetBIOS name of the Data Mover. 4. Double-click Data Mover Management, and then double-click Data Mover Security Settings. Audit CIFS users and objects using Celerra Management Console 31
32 Managing the Windows Server 5. Select Audit Policy. The audit policies appear in the right panel Right-click Audit Policy, and then select Enable Auditing from the shortcut menu. Double-click an audit object in the right panel to define the audit policy for that object.the Celerra Data Mover Security Management snap-in online help provides more information on audit policy. 32 Using Windows Administrative Tools with Celerra
33 Managing the Windows Server Set the audit log parameters Open the Computer Management MMC for the Data Mover. Open Computer Management MMC on page 18 provides more details. Double-click Event Viewer. The specific log files are displayed. Right-click a log file, and then select Properties from the shortcut menu. The property sheet for the log appears. 4. Normally, the Maximum log size field is locked.you cannot modify the log file size unless you complete the procedure described in Change log file size on page 34. After you have completed the procedure, return to the Application Properties dialog box for the log and click the arrows to increase or decrease the size of the logs. Audit CIFS users and objects using Celerra Management Console 33
34 Managing the Windows Server 5. In the Log size area of the dialog box, specify what happens when the maximum log size is reached: Overwrite events as needed: Specifies whether all new events are written to the log, even if the log is full. When the log is full, each new event replaces the oldest event. Overwrite events older than ( <n> ) days: Overwrites events older than the number of days specified. Use the arrows to specify the limit, or click the field to type a value. The file size specified in step 4 is not exceeded. New events will not be added if the maximum log size is reached and there are no events older than this period. Do not overwrite events: Fills the log up to the limit specified in step 4. When the log is full, no new events are written to it until you clear the log 6. Click OK to save the settings. Change log file size Auditing must be enabled on the Data Mover for the log file size changes to take effect. Note: The steps and instruction screens for this task are for Windows Depending on your Windows version, the steps required to accomplish these tasks may vary. 1. On the Windows Server system used to manage the Data Movers, start the Registry Editor as follows: 1. Select Start Run. 2. Type regedit.exe in the Open field. 3. Click OK. The Registry Editor opens. 2. From the Registry menu, select Connect Network Registry.The Connect Network Registry dialog box appears. Note: Depending on how the CIFS account is set up, you might receive an error message stating, Unable to connect to all roots in the computer s registry. Click OK to continue. 34 Using Windows Administrative Tools with Celerra
35 Managing the Windows Server 3. In the Computer name field, type the name of the CIFS server and click OK The Registry Editor is updated to display the Registry information for the CIFS server Navigate to the following Registry key on the CIFS server: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Eventlog\ Security The settings for the Registry key appear in the right panel. Right-click the File icon in the right panel, and then select Modify. The Edit String dialog box appears. 6. In the Value data field, edit the path for the log file. For example, C:\<mtpnt>\<directory_name>\security.evt Where: <mntpt>= mount point of the file system (not the root file system) <directory_name> = name of the directory that contains the log file Example: C:\CIFS_FS_1\Win2KLog\security.evt Do not change the name of the log file. Audit CIFS users and objects using Celerra Management Console 35
36 Managing the Windows Server Click OK. Close the Registry Editor. The changes take effect immediately. 36 Using Windows Administrative Tools with Celerra
37 Managing the Windows Server View the audit events Use this procedure to view the audit events. Note: The steps and instruction screens provided are for Windows Depending on your Windows version, the steps required to accomplish these tasks may vary. 1. Click Start, and then select Programs Administrative Tools Event Viewer. 2. Right-click the Event Viewer icon in the right panel, and then select Connect to Another Computer from the shortcut menu. The Select Computer dialog box appears Click Browse, select the name of the Data Mover to which you want to connect, and then click OK. Click OK again to close the Select Computer dialog box. Click the log. The log entries appear in the right panel. Audit CIFS users and objects using Celerra Management Console 37
38 Managing the Windows Server 5. Double-click the log entry to view the event detail. The Event Properties window opens. 38 Using Windows Administrative Tools with Celerra
39 Managing the Windows Server Disable auditing Log in to a Windows domain controller by using an account that is a member of the local Administrators group on the Data Mover. Click Start, and then select Programs Administrative Tools EMC Celerra Management. 3. Do one of the following: If a Data Mover is already selected (name appears after Data Mover Management), go to step 4. If a Data Mover is not selected: 1. Right-click Data Mover Management, and then select Connect to Data Mover from the shortcut menu. 2. In the Select Data Mover dialog box, select a Data Mover by using one of the following methods: In the Look in list, select the Domain in which the Data Mover you want to manage is located, and then select the Data Mover from the list. In the Name field, type the computer name, IP address, or the NetBIOS name of the Data Mover. 4. Double-click Data Mover Management, and then double-click Data Mover Security Settings. Disable auditing 39
40 Managing the Windows Server 5. Right-click Audit Policy, and then select Disable Auditing from the shortcut menu. Connect the MMC to a CIFS server 1. Right-click My Computer and select Manage from the menu to open the MMC. 40 Using Windows Administrative Tools with Celerra
41 Managing the Windows Server 2. In the MMC, right-click Computer Management (Local) and select Connect to another computer. The Select Computer appears. 3. Type the Celerra CIFS server hostname in the Another Computer box and click OK. Connect the MMC to a CIFS server 41
42 Managing the Windows Server 4. Once connected, use the Event Viewer, Shared Folders, and Local Users and Groups panels in the MMC to manage the CIFS server. 42 Using Windows Administrative Tools with Celerra
43 4 Managing Windows NT The administrative tasks to manage Windows NT on the CIFS server are: Note: You cannot use Windows NT administrative tools to manage server General Information and Password Relative Information for Data Movers. Access Windows NT management interfaces for a CIFS server on page 44 Create local groups on a Data Mover using User Manager on page 48 Assign user rights using User Manager on page 50 Create shares and set ACLs using Server Manager on page 52 Monitor Data Mover connections and resource usage using Server Manager on page 54 Audit CIFS users and objects using Windows NT management interfaces on page 59 Disable auditing using User Manager on page 65 Enable auditing on a folder or file on page 66 Using Windows Administrative Tools with Celerra
44 Managing Windows NT Access Windows NT management interfaces for a CIFS server To perform Windows NT administrative tasks, open one of the Windows NT management interfaces and select a CIFS server. To select a CIFS server: Access User Manager for Domains on page 44 Access Server Manager for Domains on page 46 Access Event Viewer on page 47 Access User Manager for Domains Use this procedure to open User Manager for Domains and select a CIFS server to manage Log in to a Windows NT server from an account that is a member of the local Administrators group on the Data Mover. Click Start, and then select Programs Administrative Tools User Manager for Domains. 44 Using Windows Administrative Tools with Celerra
45 Managing Windows NT 3. From the User menu, select Select Domain. 4. In the Domain field, type the UNC name of the Data Mover s CIFS server (for example, \\DM101) or the CIFS server s IP address, and then click OK. The User Manager window displays the default groups for the CIFS server. Note: User Manager for Domains works only if the CIFS server is a member of an NT 4.0 or Windows 2000 mixed mode domain. Access Windows NT management interfaces for a CIFS server 45
46 Managing Windows NT Access Server Manager for Domains Use this procedure to open Server Manager and select a CIFS server to manage. 1. Log in to a Windows NT server from an account that is a member of the local Administrators group on the Data Mover. Note: To access the Server Manager as someone else or from another domain, the username or group should be added to that Data Mover s Administrators local group by using User Manager for Domains. 2. Click Start, and then select Programs Administrative Tools Server Manager. The Server Manager window displays a list of servers in the domain. 46 Using Windows Administrative Tools with Celerra
47 Managing Windows NT Access Event Viewer Use this procedure to open Event Viewer and select a CIFS server to view. 1. Click Start, and then select Programs Administrative Tools Event Viewer. 2. From the Log menu, select Select Computer. 3. In the Computer field, type the UNC name of the Data Mover s CIFS server (for example, \\DM101) or the CIFS server s IP address, and then click OK. The User Manager window displays the default groups for this Data Mover. Access Windows NT management interfaces for a CIFS server 47
48 Managing Windows NT Create local groups on a Data Mover using User Manager For Windows NT, use the following procedure to add a local group to a Data Mover Open User Manager for the CIFS server. Access User Manager for Domains on page 44 provides instructions on opening User Manager. From the User menu, select New Local Group. In the New Local Group window, type the name of the local group in the Name field. Optionally, type a description in the Description field. Click Add. The Add Users and Groups window appears Click the down arrow in the List Names From list box to display the list of domains. Select a domain. The Names field displays the users and global groups in this domain. 48 Using Windows Administrative Tools with Celerra
49 Managing Windows NT 7. Select the users or global groups to add to the local group and click Add. Each selected name appears in the Add Names field. To add only selected users from a global group, do the following: 1. Select the global group. 2. Click Members. The Global Group Membership window lists all members of this group. 3. Select the users to add, and then click Add.The users are added to the local group, and their names appear in the Add Names field in the Add Users and Groups window When you have finished, click OK. The added users and groups appear in the Members field of the New Local Group window. Click OK to create the local group. Create local groups on a Data Mover using User Manager 49
50 Managing Windows NT Assign user rights using User Manager For Windows NT, use this procedure to set user rights on the Data Mover Open User Manager for the CIFS server. Access User Manager for Domains on page 44 provides instructions on opening User Manager. From the Policies menu, select User Rights. 3. Select the access right to assign to the local group by clicking the down arrow in the Right list box. For example, to assign the right to take ownership of files, click the down arrow, and then select Take ownership of files or other objects. Note: Click Show Advanced User Rights to display all possible user rights Click Add. The Add Users and Groups window appears. Click the down arrow in the List Names From list box, and then select the UNC name of the Data Mover s CIFS service (for example, \\DM101). The list of local groups with accounts on the Data Mover appears in the Names field. Select the local group name, and then click Add. The local group appears in the Add Names field. 50 Using Windows Administrative Tools with Celerra
51 Managing Windows NT Click OK. The local group appears in the Grant To field of the User Rights Policy window. Repeat steps 3 through 7 for each access right to grant to the local group. When you have finished assigning rights, click OK in the User Rights Policy window. Assign user rights using User Manager 51
52 Managing Windows NT Create shares and set ACLs using Server Manager After you create a CIFS service on a Data Mover and add the Data Mover to the domain, use the Windows NT Server Manager for Domains to create shares and set ACLs on shares. Before you begin To create shares with Server Manager, you must: Have assigned UNIX UIDs and GIDs to CIFS users and groups. Configuring and Managing CIFS on Celerra and Configuring Celerra User Mapping provides detailed information about how to assign UIDs and GIDs. Have mounted the file system and created directories you want to share. Be the Administrator or a user who is a member of the Administrators local group on a Data Mover for the domain to which the Data Mover belongs. To use the Windows NT Server Manager as someone else or from another domain, the username or group should be added to that Data Mover s Administrators local group by using User Manager for Domains. Procedure Note: Shares created through Windows administrative tools are accessible only from the NetBIOS name used by the Windows client. If you want the share to be globally accessible by all NetBIOS names, create a share with the Celerra server_export command and do not specify the netbios=<netbiosname> option. For Windows NT, use this procedure to create a share on a Data Mover. 1. Open Server Manager for the CIFS server. Access Server Manager for Domains on page 46 provides instructions on opening Server Manager. 52 Using Windows Administrative Tools with Celerra
53 Managing Windows NT 2. Select a CIFS server, and then from the Computer menu, select Shared Directories. The Shared Directories window displays the shares on the Data Mover. 3. Click New Share In the Share Name field, type the name of the share. The Celerra Network Server supports only ASCII share names.the name length is typically limited to 12 bytes, but if Unicode is enabled, the limit is 240 bytes. In the Path field, type the pathname of the share on the local machine. For example, to create the share \News under the \Events directory on the C: drive, type C:\Events\News. On a Data Mover, the local path name always starts with C:\. Note: Create and mount the directory on the Data Mover before executing this step. 6. Ensure that the Maximum Allowed button in User Limit is selected. Create shares and set ACLs using Server Manager 53
54 Managing Windows NT 7. To set ACLs on the share, click Permissions. The Access Through Share Permissions window displays the default permissions for this share. 8. Do one of the following: To modify the ACLs for a displayed group or user, select the group or user, select the access in the Type of Access field, and click OK. To add a group or user, click Add to display the Add Groups or Users window. Add the group or user you want to give access to the share, click Add, and click OK.You can then modify the permissions. To delete a group or user, select the group or user, and then click Remove. 9. When you have completed the assignment of ACLs, click OK to return to the New Share window. Note: For CIFS users, the ACLs you create override any base ACLs on the file system. 10. Click OK to complete the share creation. Monitor Data Mover connections and resource usage using Server Manager You can use Server Manager for Domains to: Monitor users on the Data Mover on page 55 Monitor access to shares on the Data Mover on page Using Windows Administrative Tools with Celerra
55 Managing Windows NT Monitor use of Data Mover resources on page 58 Monitor users on the Data Mover For Windows NT, use this procedure to monitor the number of users connected to a CIFS server Open Server Manager for the CIFS server you want to monitor. Access Server Manager for Domains on page 46 provides instructions on opening Server Manager. From the Computer menu, select Properties. The Properties for window appears, where the system name appears in the window name. Monitor Data Mover connections and resource usage using Server Manager 55
56 Managing Windows NT 3. Click Users. The Users Sessions window appears, listing the users who have sessions on the specified Data Mover and the available network resources (such as shares). 4. To force disconnections from the Data Mover, select the username and click Disconnect or Disconnect All. 56 Using Windows Administrative Tools with Celerra
57 Managing Windows NT Monitor access to shares on the Data Mover For Windows NT, use this procedure to monitor access to shares on the CIFS server Open Server Manager for the CIFS server. Access Server Manager for Domains on page 46 provides instructions on opening Server Manager. From the Computer menu, select Properties. 3. In the Properties window, click Shares. The Shared Resources window displays all active network resources (such as shares) available on the Data Mover, the number of users of the resource, and the path to the resource. 4. Click a resource to display the users connected to it. Monitor Data Mover connections and resource usage using Server Manager 57
58 Managing Windows NT 5. To force disconnections from the resource, select the username, and then click Disconnect or Disconnect All. Monitor use of Data Mover resources For Windows NT, use this procedure to monitor the use of Data Mover resources Open Server Manager for the CIFS server. Access Server Manager for Domains on page 46 provides instructions on opening Server Manager. From the Computer menu, select Properties. 58 Using Windows Administrative Tools with Celerra
59 Managing Windows NT 3. In the Properties window, click In Use. The Open Resources on BDC window lists the users who are accessing resources (such as shares) on the Data Mover. 4. To force disconnections from the resource, select the username, and then click Close Resource or Close All Resources. Audit CIFS users and objects using Windows NT management interfaces To audit CIFS users and objects: Specify the auditing policy on page 59 Set the audit log parameters on page 61 Change log file size on page 62 View the audit events on page 64 Specify the auditing policy To enable auditing on the Celerra Network Server, you must be an Administrator or a member of the Administrators local group on the Data Mover. 1. Open User Manager for the CIFS server you want to audit. Access User Manager for Domains on page 44 provides instructions on opening User Manager. Audit CIFS users and objects using Windows NT management interfaces 59
60 Managing Windows NT 2. In the User Manager for Domains window, select Audit from the Policies menu. 3. By default, Do Not Audit is selected. To enable auditing, select Audit These Events For each supported object class you want to audit, select Success or Failure. Auditing on page 13 lists the supported object classes Click OK. Repeat steps 1 through 5 for each CIFS server you want to audit. 60 Using Windows Administrative Tools with Celerra
61 Managing Windows NT Set the audit log parameters Open Event Viewer for the CIFS server. Access Event Viewer on page 47 provides instructions on opening Event Viewer. From the Log menu, select Log Settings. In the Event Log Settings dialog box, you can modify the Security, System, or Application log settings. Auditing on page 13 lists the default log settings From the Change Settings for list box, select a log. The Maximum Log Size field is typically locked.you cannot modify this value until you complete the procedure Change log file size on page 62. In the Event Log Wrapping area, specify the log wrapping setting: Overwrite Events as Needed: Overwrites the earliest events in the event log after the file size specified in step 4 is reached. Overwrite Events Older than (<n>) Days: Overwrites events older than the specified number of days. Use the arrows to set the limit or click the field and type a value. The file size specified in step 4 is not exceeded. New events will not be added if the maximum log size is reached and there are no events older than this period. Do Not Overwrite Events: If the limit specified in step 4 is reached, no new events are written until the log is cleared Click OK. Repeat steps 2 through 6 to modify each log file. Audit CIFS users and objects using Windows NT management interfaces 61
62 Managing Windows NT Change log file size 1. On the Windows NT system used to manage the Data Movers, select Run from the Start menu. 2. Type regedt32.exe, and then click OK. The Registry Editor appears: From the Registry menu, select Select Computer. The Select Computer dialog box appears. If you receive an autorefresh warning message, click OK to continue. In the Computer Name field, type the NetBIOS name of the Data Mover, and then click OK. The Registry Editor displays the updated information for the Data Mover. Navigate to the following key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Eventlog\security\File Right-click the File icon. The Edit File Value window displays the absolute path for the security log file (C:\security.evt by default) in the File field. 62 Using Windows Administrative Tools with Celerra
63 Managing Windows NT 7. In the File field, edit the path where you want to store the log file. For example, C:\<mntpt>\<directory_name>\security.evt Where: <mntpt> = mount point of the file system (not the root file system) <directory_name> = name of the directory that contains the log file Example C:\CIFS_FS_1\WinNTlogs\security.evt Do not change the name of the log file Click OK. Select Exit from the Registry menu. Changes take effect immediately. Audit CIFS users and objects using Windows NT management interfaces 63
64 Managing Windows NT View the audit events Open Event Viewer for the CIFS server. Access User Manager for Domains on page 44 provides instructions on opening Event Viewer. Double-click an event to view the event detail Click Close to close the Event Detail window. Repeat steps 2 and 3 for each event of interest. 64 Using Windows Administrative Tools with Celerra
65 Managing Windows NT Disable auditing using User Manager To disable auditing modify the audit policies in User Manager for Domains Open User Manager for the CIFS server. Access User Manager for Domains on page 44 provides instructions on opening User Manager. In the User Manager for Domains window, select Audit from the Policies menu. 3. Do one of the following: To suspend auditing on all object classes, select Do Not Audit, and then click OK. To suspend auditing on individual object classes, clear Success or Failure for each object class, and then click OK. 4. Repeat steps 1 through 3 for each CIFS server to audit. Disable auditing using User Manager 65
66 Managing Windows NT Enable auditing on a folder or file Use this procedure to enable auditing on a folder or file stored on the Celerra Network Server (or, you can use the My Computer interface on the desktop) Ensure that auditing is enabled on the share in which the file or folder you want to audit resides. Specify the auditing policy on page 59 provides details on how to enable auditing on a Celerra-resident share. Click Start, and then select Programs Windows NT Explorer. 3. In the All Folders panel, navigate to the folder or file you want to audit. 66 Using Windows Administrative Tools with Celerra
67 Managing Windows NT 4. Right-click the folder or file, and then select Properties from the shortcut menu. Enable auditing on a folder or file 67
68 Managing Windows NT 5. Click the Security tab. 68 Using Windows Administrative Tools with Celerra
69 Managing Windows NT 6. Click Auditing. The File Auditing or Directory Auditing window appears. Enable auditing on a folder or file 69
70 Managing Windows NT 7. Click Add. The Add Users and Groups window appears. 70 Using Windows Administrative Tools with Celerra
71 Managing Windows NT 8. You can audit activity on this directory or file by local group or by individual user, as follows: To audit activity by local group: 1. Select the local group. 2. Click Add. The local group is added to the Add Names box. 3. Repeat steps 1 and 2 for each local group to audit. 4. When you have finished, click OK to return to the Directory Auditing window. To audit activity by user: 1. Select the local group that contains the user. 2. Click Show Users. The users in the selected local group appear at the bottom of the Names field.you might need to scroll down to view them. 3. Select the user. 4. Click Add. The user is added to the Add Names box. 5. Repeat steps 1 through 5 for each user to audit. 6. When you have finished, click OK to return to the File Auditing window. Note: You can audit local groups and domain users. 9. After you add the local groups and users, select the events to audit, as follows: 1. In the File Auditing window, select the events for the folder or file.you can select Read, Write, Execute, Delete, Change Permissions, or Take Ownership, and you can choose to audit Success or Failure for each. 2. Click OK. The File Auditing window closes. 3. Click OK in the Properties window to apply the changes and close the window. Enable auditing on a folder or file 71
72 Managing Windows NT 72 Using Windows Administrative Tools with Celerra
73 5 Troubleshooting As part of an effort to continuously improve and enhance the performance and capabilities of its product lines, EMC periodically releases new versions of its hardware and software. Therefore, some functions described in this document may not be supported by all versions of the software or hardware currently in use. For the most up-to-date information on product features, refer to your product release notes. If a product does not function properly or does not function as described in this document, please contact your EMC Customer Support Representative. Where to get help on page 74 EMC E-Lab Interoperability Navigator on page 74 EMC Training and Professional Services on page 74 Using Windows Administrative Tools with Celerra
74 Troubleshooting Where to get help To obtain EMC support, product, and licensing information: Product information For documentation, release notes, software updates, or for information about EMC products, licensing, and service, go to the EMC Powerlink website (registration required) at: Troubleshooting For troubleshooting information, go to Powerlink, search for Celerra Tools, and select Celerra Troubleshooting from the navigation panel on the left. Technical support For technical support, go to EMC Customer Service on Powerlink. After logging in to the Powerlink website, go to Support Request Support. To open a service request through Powerlink, you must have a valid support agreement. Contact your EMC Customer Support Representative for details about obtaining a valid support agreement or to answer any questions about your account. Note: Do not request a specific support representative unless one has already been assigned to your particular system problem. Problem Resolution Roadmap for EMC Celerra contains additional information about using Powerlink and resolving problems. EMC E-Lab Interoperability Navigator The EMC E-Lab Interoperability Navigator is a searchable, web-based application that provides access to EMC interoperability support matrices. It is available at After logging in to Powerlink, go to Support Interoperability and Product LifeCycle Information E-Lab Interoperability Navigator. EMC Training and Professional Services EMC Customer Education courses help you learn how EMC storage products work together within your environment in order to maximize your entire infrastructure investment. EMC Customer Education features online and hands-on training in state-of-the-art labs conveniently located throughout the world. EMC customer training courses are developed 74 Using Windows Administrative Tools with Celerra
75 Troubleshooting and delivered by EMC experts. Go to EMC Powerlink at for course and registration information. EMC Professional Services can help you implement your Celerra Network Server efficiently. Consultants evaluate your business, IT processes, and technology and recommend ways you can leverage your information for the most benefit. From business plan to implementation, you get the experience and expertise you need, without straining your IT staff or hiring and training new personnel. Contact your EMC representative for more information. EMC Training and Professional Services 75
76 Troubleshooting 76 Using Windows Administrative Tools with Celerra
77 Terminology C CIFS server Logical server using the CIFS protocol to transfer files. A Data Mover can host many instances of a CIFS server. Each instance is referred to as a CIFS server. CIFS service CIFS server process running on the Data Mover that presents shares on a network as well as on Microsoft Windows-based computers. Common Internet File System (CIFS) File-sharing protocol based on the Microsoft Server Message Block (SMB). It allows users to share file systems over the Internet and intranets. D Data Mover In a Celerra Network Server, a cabinet component running its own operating system that retrieves data from a storage device and makes it available to a network client. This is also referred to as a blade. A Data Mover is sometimes internally referred to as DART since DART is the software running on the platform. F file system Method of cataloging and managing the files and directories on a storage system. N network file system (NFS) Network file system (NFS) is a network file system protocol allowing a user on a client computer to access files over a network as easily as if the network devices were attached to its local disks. Using Windows Administrative Tools with Celerra
78 Terminology Network Information Service (NIS) Distributed data lookup service that shares user and system information across a network, including usernames, passwords, home directories, groups, hostnames, IP addresses, and netgroup definitions. 78 Using Windows Administrative Tools with Celerra
79 Index A access rights Windows Windows NT 44 ACLs setting for Windows 2000 groups 24 for Windows NT groups 52 Windows 2000 auditing 30 changing log file size 34 CIFS users on Data Mover 38 setting log parameters 33 specifying policy 31 viewing audit events 37 Windows NT CIFS users on Data Mover 52 disabling 65 enabling for folder or file 66 setting log parameters 61 specifying policy 59 viewing events 64 D creating local groups for Windows NT 48 editing Registry for Windows for Windows NT 62 Windows 2000 monitoring shares 28 monitoring user 27 Windows NT monitoring user 55 disabling user auditing for Windows disabling (continued) user auditing for Windows NT 65 E EMC E-Lab Navigator 74 enabling auditing for folder or file for Windows NT 66 Event Viewer Windows Windows NT 64 F files, monitoring on Data Mover for Windows L Windows 2000 setting user rights 20, 22 Windows NT creating local groups on Data Mover 48 setting user rights 50 log file, changing size for Windows for Windows NT 62 M MMC, opening 18 Windows 2000 files on Data Mover 29 shares on Data Mover 28 users on Data Mover 27 Windows NT shares on Data Mover 57 Using Windows Administrative Tools with Celerra
80 Index monitoring (continued) Windows NT (continued) users on Data Mover 55 R Registry, editing Windows Windows NT 62 S security log file, changing size for Windows for Windows NT 62 Server Manager for Domains 46 Windows 2000 creating 24 monitoring on Data Mover 28 setting ACLs 24 Windows NT creating 52 monitoring on Data Mover 57 setting ACLs 52 T tools Event Viewer Windows Windows NT 64 MMC 13 Server Manager for Domains 46 User Manager for Domains 44 U Windows 2000 disabling 39 viewing events 37 Windows NT disabling 65 user auditing (continued) Windows NT (continued) viewing events 64 User Manager for Domains 44 auditing from Windows from Windows NT 59 W Windows 2000 changing log file size 34 creating shares 24 disabling user auditing 39 MMC 18 monitoring files on Data Mover 29 shares on the Data Mover 28 users on the Data Mover 27 setting ACLs on shares 24 log parameters 33 user rights 22 specifying audit policy 31 Windows NT ACLs setting 50, 52, 61 auditing a file or folder 66 changing log file size 62 creating local groups on the Data Mover 48 shares 57 disabling user auditing 65 Event Viewer 47 monitoring shares on the Data Mover 57 users on the Data Mover 55 Server Manager for Domains 46 setting 50, 52, 61 audit log parameters 61 user rights 50 specifying audit policy 59 User Manager for Domains 44 viewing audit events Using Windows Administrative Tools with Celerra
Using Windows Administrative Tools on VNX
EMC VNX Series Release 7.0 Using Windows Administrative Tools on VNX P/N 300-011-833 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2011 -
Installing Management Applications on VNX for File
EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
EMC VNXe Series. Configuring Hosts to Access CIFS File Systems. Version 3.1 P/N 302-000-191 REV. 03
EMC VNXe Series Version 3.1 Configuring Hosts to Access CIFS File Systems P/N 302-000-191 REV. 03 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes
How To Configure Vnx 7.1.1 (Vnx) On A Windows-Only Computer (Windows) With A Windows 2.5 (Windows 2.2) (Windows 3.5) (Vnet) (Win
EMC é VNX dm Series Release 7.1 Configuring VNX dm User Mapping P/N 300-013-811 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright â 2009-2012
Using Group Policy to Manage and Enforce ACL on VNX for File P/N 300-011-877 REV A01 February 2011
EMC VNX Series Release 7.0 Using Group Policy to Manage and Enforce ACL on VNX for File P/N 300-011-877 REV A01 February 2011 This technical note contains information on these topics: Business problem...
EMC Celerra Network Server
EMC Celerra Network Server Release 5.6.48 Configuring and Managing CIFS on Celerra P/N 300-007-526 REV A04 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
NTP Software File Auditor for NAS, EMC Edition
NTP Software File Auditor for NAS, EMC Edition Installation Guide June 2012 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for NAS,
EMC Celerra Network Server
EMC Celerra Network Server Release 5.6.46 Configuring and Managing CIFS on EMC Celerra P/N 300-007-526 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
Configuring and Managing CIFS on VNX
EMC VNX Series Release 7.0 Configuring and Managing CIFS on VNX P/N 300-011-826 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 1998-2011 EMC
EMC NetWorker Module for Microsoft Exchange Server Release 5.1
EMC NetWorker Module for Microsoft Exchange Server Release 5.1 Installation Guide P/N 300-004-750 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
VERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
Dell Recovery Manager for Active Directory 8.6. Quick Start Guide
Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
Troubleshooting File and Printer Sharing in Microsoft Windows XP
Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install
PLANNING AND DESIGNING GROUP POLICY, PART 1
84-02-06 DATA SECURITY MANAGEMENT PLANNING AND DESIGNING GROUP POLICY, PART 1 Melissa Yon INSIDE What Is Group Policy?; Software Settings; Windows Settings; Administrative Templates; Requirements for Group
EMC VNXe Series Using a VNXe System with CIFS Shared Folders
EMC VNXe Series Using a VNXe System with CIFS Shared Folders VNXe Operating Environment Version 2.4 P/N 300-010-548 REV 04 Connect to Storage Copyright 2013 EMC Corporation. All rights reserved. Published
EMC Unity Family EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA
EMC Unity Family EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA Version 4.0 Configuring Hosts to Access SMB File Systems P/N 302-002-566 REV 01 Copyright 2016 EMC Corporation. All rights reserved.
EMC VNX Series. Configuring and Managing CIFS on VNX. Version VNX1, VNX2 P/N 300-014-332 REV. 03
EMC VNX Series Version VNX1, VNX2 Configuring and Managing CIFS on VNX P/N 300-014-332 REV. 03 Copyright 1998-2015 EMC Corporation. All rights reserved. Published in USA. Published March, 2015 EMC believes
LepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
EMC VNX Series. Using FTP, TFTP, and SFTP on VNX. Release 7.0 P/N 300-011-814 REV A01
EMC VNX Series Release 7.0 Using FTP, TFTP, and SFTP on VNX P/N 300-011-814 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 1998-2011 EMC Corporation.
WINDOWS SERVER 2008 OFFLINE SYSTEM RECOVERY USING WINDOWS SERVER BACKUP WITH NETWORKER
TECHNICAL NOTES WINDOWS SERVER 2008 OFFLINE SYSTEM RECOVERY USING WINDOWS SERVER BACKUP WITH NETWORKER NETWORKER RELEASE 7.4 SERVICE PACK 2 AND LATER TECHNICAL NOTE P/N 300-010-339 REV A02 Table of Contents
Changing Your Cameleon Server IP
1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may
EMC SourceOne for Microsoft SharePoint Storage Management Version 7.1
EMC SourceOne for Microsoft SharePoint Storage Management Version 7.1 Installation Guide 302-000-227 REV 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
Managing Celerra for the Windows Environment
Managing Celerra for the Windows Environment P/N 300-002-679 Rev A01 March 2006 Contents Introduction..................................................3 Windows and multiprotocol documentation....................3
EMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager
EMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager Version 2.3 Installation and Configuration Guide 302-002-080 01 Copyright 2013-2015 EMC Corporation. All rights reserved.
User Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
Create, Link, or Edit a GPO with Active Directory Users and Computers
How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the
Sophos Anti-Virus for NetApp Storage Systems startup guide
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp
EMC Documentum Webtop
EMC Documentum Webtop Version 6.5 User Guide P/N 300 007 239 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2008 EMC Corporation. All rights
EMC ApplicationXtender Server
EMC ApplicationXtender Server 6.5 Monitoring Guide P/N 300-010-560 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 1994-2010 EMC Corporation. All
Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
EMC Celerra Version 5.6 Technical Primer: Control Station Password Complexity Policy Technology Concepts and Business Considerations
EMC Celerra Version 5.6 Technical Primer: Control Station Password Complexity Policy Technology Concepts and Business Considerations Abstract This white paper presents a high-level overview of the EMC
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
NETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
Using Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
DC Agent Troubleshooting
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
Quick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01
Sharpdesk V3.5 Push Installation Guide for system administrator Version 3.5.01 Copyright 2000-2015 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written
Acronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
CTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
EMC NetWorker VSS Client for Microsoft Windows Server 2003 First Edition
EMC NetWorker VSS Client for Microsoft Windows Server 2003 First Edition Installation Guide P/N 300-003-994 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com
File and Printer Sharing with Microsoft Windows
Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of
LANDESK Service Desk. Desktop Manager
LANDESK Service Desk Desktop Manager LANDESK SERVICE DESK DESKTOP MANAGER GUIDE This document contains information, which is the confidential information and/or proprietary property of LANDESK Software,
Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0
Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5
For Active Directory Installation Guide
For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
Technical Notes P/N 302-000-337 Rev 01
SNMP Trap Monitoring Solution EMC SourceOne Version 7.0 and later Technical Notes P/N 302-000-337 Rev 01 September 27, 2013 These technical notes contain supplemental information about EMC SourceOne, version
SolarWinds Migrating SolarWinds NPM Technical Reference
SolarWinds Migrating SolarWinds NPM Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,
DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide
DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide 1 of 7 DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide Process Overview Step Description
NETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and
LDAP Server Configuration Example
ATEN Help File LDAP Server Configuration Example Introduction The KVM Over the NET switch allows log in authentication and authorization through external programs. This chapter provides an example of how
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
Alpha High Level Description
Alpha High Level Description Alpha is a Windows Domain Controller (DC) and Domain Name System (DNS) Server. Because Alpha was the first DC in the aia.class domain, it is also (by default) the Windows global
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,
Active Directory integration with CloudByte ElastiStor
Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level
User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory
Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property
EMC AVAMAR 6.0 GUIDE FOR IBM DB2 P/N 300-011-636 REV A01 EMC CORPORATION CORPORATE HEADQUARTERS: HOPKINTON, MA 01748-9103 1-508-435-1000 WWW.EMC.
EMC AVAMAR 6.0 FOR IBM DB2 GUIDE P/N 300-011-636 REV A01 EMC CORPORATION CORPORATE HEADQUARTERS: HOPKINTON, MA 01748-9103 1-508-435-1000 WWW.EMC.COM Copyright and Trademark Notices Copyright 2002-2011
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 3.0 User Guide P/N 300-999-671 REV 02 Copyright 2007-2013 EMC Corporation. All rights reserved. Published in the USA.
EMC DiskXtender File System Manager for UNIX/Linux Release 3.5
EMC DiskXtender File System Manager for UNIX/Linux Release 3.5 Administrator s Guide P/N 300-009-573 REV. A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com
STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
DeviceLock Management via Group Policy
User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 2. DeviceLock Service Deployment...6
EMC SourceOne SEARCH USER GUIDE. Version 6.8 P/N 300-013-681 A01. EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103. www.emc.
EMC SourceOne Version 6.8 SEARCH USER GUIDE P/N 300-013-681 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2005-2012 EMC Corporation. All rights
How To Manage Storage With Novell Storage Manager 3.X For Active Directory
www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect
WhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
Outpost Network Security
Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It
Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide
Novell Storage Manager 3.1.1 for Active Directory Installation Guide www.novell.com/documentation Installation Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices Condrey
VMware/Hyper-V Backup Plug-in User Guide
VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,
Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide
Direct Storage Access Using NetApp SnapDrive Installation & Administration Guide SnapDrive overview... 3 What SnapDrive does... 3 What SnapDrive does not do... 3 Recommendations for using SnapDrive...
DeviceLock Management via Group Policy
User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance
Enterprise Vault Installing and Configuring
Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise
Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide
Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations
StarWind iscsi SAN Configuring HA File Server for SMB NAS
Hardware-less VM Storage StarWind iscsi SAN Configuring HA File Server for SMB NAS DATE: FEBRUARY 2012 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the StarWind and the StarWind Software
Insight Video Net. LLC. CMS 2.0. Quick Installation Guide
Insight Video Net. LLC. CMS 2.0 Quick Installation Guide Table of Contents 1. CMS 2.0 Installation 1.1. Software Required 1.2. Create Default Directories 1.3. Create Upload User Account 1.4. Installing
StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012
StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software logos are trademarks of StarWind Software which
Server Installation Guide ZENworks Patch Management 6.4 SP2
Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch
EMC NetWorker Module for Microsoft Applications Release 2.3. Application Guide P/N 300-011-105 REV A02
EMC NetWorker Module for Microsoft Applications Release 2.3 Application Guide P/N 300-011-105 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
HP D2D NAS Integration with HP Data Protector 6.11
HP D2D NAS Integration with HP Data Protector 6.11 Abstract This guide provides step by step instructions on how to configure and optimize HP Data Protector 6.11 in order to back up to HP D2D Backup Systems
Upgrade Guide BES12. Version 12.1
Upgrade Guide BES12 Version 12.1 Published: 2015-02-25 SWD-20150413111718083 Contents Supported upgrade environments...4 Upgrading from BES12 version 12.0 to BES12 version 12.1...5 Preupgrade tasks...5
PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE
PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are
Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network
How To Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network Introduction This document describes how to create a secure LAN, using two servers and an 802.1xcompatible
Remote Management System
RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED
Automating client deployment
Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark
EMC ApplicationXtender Server
EMC ApplicationXtender Server 6.0 Monitoring Guide P/N 300 008 232 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2009 EMC Corporation. All
Installing the Microsoft Network Driver Interface
Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's
File Auditor for NAS, Net App Edition
File Auditor for NAS, Net App Edition Installation Guide Revision 1.2 - July 2015 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for
5.6.3 Lab: Registry Backup and Recovery in Windows XP
5.6.3 Lab: Registry Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up a computer registry. You will also perform a recovery of a computer registry.
Diamond II v2.3 Service Pack 4 Installation Manual
Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance
EMC Documentum Repository Services for Microsoft SharePoint
EMC Documentum Repository Services for Microsoft SharePoint Version 6.5 SP2 Installation Guide P/N 300 009 829 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com
Virtual CD v10. Network Management Server Manual. H+H Software GmbH
Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual
Tool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
Moving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
Security Explorer 9.5. User Guide
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
WhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
