A CIFS/SMB/SMBV2 File Server Tool for Capacity Planning and Performance Troubleshooting
|
|
|
- Todd Booker
- 10 years ago
- Views:
Transcription
1 A CIFS/SMB/SMBV2 File Server Tool for Capacity Planning and Performance Troubleshooting Jose Barreto Senior Technology Evangelist Storage Solutions Division Microsoft Corporation microsoft.com Bartosz Nyczkowski Software Dev. Engineer Server Performance Team Microsoft Corporation microsoft.com
2 Legal Disclaimer Products mentioned in this presentation are in early development stages. All information is subject to change. Some features might not make into the final product. All dates mentioned here on unreleased products are estimates and subject to change. Names in quotes are codenames used during development, not final product names. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary
3 Agenda What is? Sample Topology and Configurations Firewall Configuration Workloads and Scenarios HomeFolders Workload and Scenarios Custom Workloads Prepare, Run and Clean up Sample Results and Charts Reporting Results with Active Directory with non-windows Servers Planned Releases White Paper
4 What is? A tool for CIFS/SMB/SMB2 File Servers focused on Capacity planning Identifying bottlenecks Targeted at IT Professionals Storage Solution Providers Results include Maximum number of users for a server configuration Throughput (in scenarios per second) for a server configuration Scenario response time Performance counters for servers and clients Why? Customer requests for a capacity planning tool
5 History Origins Internal tool developed by the Windows Server Performance Team Useful for capacity planning and identifying bottlenecks Used internally every day in Windows Server Labs Focused on server quality gates and regression testing Highlights Simulates multiple TCP connections and sessions Each client test machine simulates multiple users Exercises certain sequences of file operations to simulate applications Improvements in the public release Simplified command line interface Workload updated Documentation
6 Sample Topology Volumes User Accounts SRV CTL Network 1 = Control Network 2 Data Network 3 - Data CLI1 CLI2 CLI3 CLI4 User Accounts User Accounts User Accounts User Accounts SRV = Server under test CTL = Controller CLIn = Clients
7 Configurations Minimum Configuration 1 Server (test subject, any OS supporting CIFS, SMB or SMB2) 1 Client (computer running supported Windows OS) 1 Controller (computer running supported Windows OS) Sample Configuration 1 Server 2 Cores 6 volumes on 12 spindles 4 NICs (GbE) for Client traffic + 1 NIC for controller traffic 8 Clients 1 Core Multiple, server-class clients to stress a more capable server 1 NIC for Controller traffic + 1 NIC for Server traffic 1 Controller 1 Network dedicated for controller traffic to clients and server Maximum Tested Configuration (No hard limits) 1 Server 16 Cores, 32GB RAM 100+ spindles on a disk array 4 NICs for Client traffic + 1 NIC for controller traffic 120 Clients 1 Controller As a rule of thumb, consider starting with a client cores to server cores ratio of 4:1
8 Firewall Configuration Server and Controller ports Need ports 139 and 445 open for SMB requests from Clients Clients ports Need ports 5000 and 5001 for job requests from Controller (only for the Client network interface connected to the Controller) Performance counters Additional configuration needed for performance queries on both Server (only if running Windows) and Clients Enable remote registry service Enable file and printer sharing in the firewall You can skip this, but the controller won t report performance counters in the results Verify the configuration by running PERFMON on the Controller to remotely monitor the Server and Client
9 Workloads and Scenarios A scenario is a basic user action being simulated, like deleting a file from the command line, copying a file with Windows Explorer or opening a file in Microsoft Word. A file set is required by each scenario. A workload is a set of well-defined scenarios and file sets. The workload definition is provided in the form of XML files, including the parameters required for each scenario, like the frequency in which they should occur and the file set used. The actual code simulating a scenario is provided in the form of DLL files Only one workload is provided with version 0.2 Beta, called HomeFolders.
10 How HomeFolders was created Captured data Event Tracing for Windows (ETW) on servers, client API traces, network traces From real, heavily accessed file servers and their clients Worked with IT Admins to enable tracing for a few minutes each hour over many months Analyzed data Request types distribution Parameters distribution File set characteristics Connection characteristics Created and tested the workload Create scenarios, create file sets and define runs per user per hour Traced and verified to approximate the key findings from the traces
11 HomeFolders Scenarios Scenario Runs per user File set per hour CmdLineNavigate.dll 30 static_dirs.xml CmdLineFileDownload.dll 75 static.xml CmdLineFileUpload.dll 75 new.xml CmdLineFileDelete.dll 15 volatile.xml ExplorerNavigate.dll 30 static_dirs.xml ExplorerDragDropFileDownload.dll 45 static.xml ExplorerDragDropFileUpload.dll 45 new.xml ExplorerFileDelete.dll 12 volatile.xml ExplorerSelect.dll 30 static.xml WordFileOpen.dll 15 static.xml WordFileClose.dll 15 static.xml WordEditAndSave.dll 12 volatile.xml
12 HomeFolders Workload <?xml version="1.0" encoding="utf-8"?> <Workload> <Scenarios> <Scenario name="cmdlinenavigate.dll"> <RunsPerUserPerHour>30</RunsPerUserPerHour> <FilesetParameters> <Parameter name="filelist">static_dirs.xml</parameter> </FilesetParameters> </Scenario> <Scenario name="cmdlinefiledownload.dll"> <RunsPerUserPerHour>75</RunsPerUserPerHour> <FilesetParameters> <Parameter name="filelist">static.xml</parameter> </FilesetParameters> </Scenario> <Scenario name="wordeditandsave.dll"> <RunsPerUserPerHour>12</RunsPerUserPerHour> <FilesetParameters> <Parameter name="filelist">volatile.xml</parameter> </FilesetParameters> </Scenario> </Scenarios> <WarmupTime>30</WarmupTime> </Workload> Lots of additional scenarios defined here
13 Custom Workloads As of version 0.2 beta, we only provide the HomeFolders workload, which only includes scenarios related to Microsoft applications The tool and the HomeFolders workload were developed independently The architecture allows for the creation of custom workloads and scenarios, as well as tweaking the existing workloads.
14 Prepare prepare server /clients CLI1,CLI2 /password PASS /users 1000 /volumes E:,F: /workload HomeFolders SRV Initialize Volumes CTL Create Users CLI1 CLI2
15 Prepare prepare server /clients CLI1,CLI2 /password PASS /users 1000 /volumes E:,F: /workload HomeFolders SRV Initialize Volumes CTL prepare controller /clients CLI1,CLI2 /volumes E:,F: Create Users CLI1 CLI2
16 Prepare prepare server /clients CLI1,CLI2 /password PASS /users 1000 /volumes E:,F: /workload HomeFolders SRV Initialize Volumes CTL prepare controller /clients CLI1,CLI2 /volumes E:,F: Create Users CLI1 Create Users CLI2 Add entries to hosts file prepare client /server SRV /password PASS /users 1000 /server_ip
17 Run SRV CTL CLI1 CLI2 Client ready to receive jobs run client /controller CTL /server SRV /password PASS
18 Run SRV 1 - Sends Jobs to Clients CTL run controller /server SRV /password PASS /volumes E:,F: /clients CLI1,CLI2 /min_users 100 /max_users 400 /step 100 /duration 300 /workload HomeFolders CLI1 CLI2 run client /controller CTL /server SRV /password PASS
19 Run 3 - Responds to Requests SRV 1 - Sends Jobs to Clients CTL run controller /server SRV /password PASS /volumes E:,F: /clients CLI1,CLI2 /min_users 100 /max_users 400 /step 100 /duration 300 /workload HomeFolders CLI1 CLI2 2 - Receives, Executes Jobs run client /controller CTL /server SRV /password PASS
20 Run 3 - Responds to Requests SRV 1 - Sends Jobs to Clients CTL run controller /server SRV /password PASS /volumes E:,F: /clients CLI1,CLI2 /min_users 100 /max_users 400 /step 100 /duration 300 /workload HomeFolders CLI1 CLI2 2 - Receives, Executes Jobs 4 - Sends Results Back run client /controller CTL /server SRV /password PASS
21 Run 3 - Responds to Requests SRV 1 - Sends Jobs to Clients CTL 5 Compiles Results run controller /server SRV /password PASS /volumes E:,F: /clients CLI1,CLI2 /min_users 100 /max_users 400 /step 100 /duration 300 /workload HomeFolders CLI1 CLI2 2 - Receives, Executes Jobs 4 - Sends Results Back run client /controller CTL /server SRV /password PASS
22 Cleanup cleanup server /clients CLI1,CLI2 /users 1000 /volumes E:,F: SRV Erase Volumes CTL cleanup controller /backup C:\backup Remove Users CLI1 cleanup client /users 1000 CLI2 Remove Users Remove entries from hosts file Cleanup required if - All tests are done - Changes in configuration (server, controller, clients, volumes or users) - Test failed or aborted in the middle of a test run (leads to inconsistent file sets)
23 Results (100 to 400 users, step 100) Number of Users Throughput (scenarios per second) Overload at 400 users. Maximum is between 300 and 400. Maximum throughput around 33 scenarios per second
24 Results (chart, 100 to 400 users)
25 Results (performance data) Performance Data Number of Users Throughput (scenarios per second)
26 Results (300 to 400 users, step 20) Performance Data Number of Users Throughput (scenarios per second) Overload and errors at 380 users Maximum is between 360 and 380 Maximum throughput should be around 40 scenarios per second
27 Results (Chart, 300 to 400 users)
28 Results (360 to 380 users, step 2) Overload and errors at 364 users Maximum is 362 users Maximum throughput is 40 scenarios per second Number of Users Throughput (scenarios per second) You can add your own performance counters
29 Results (details) Details in XML format Includes details about each individual scenario executed
30 Reporting results provides a summary of the results, but it may not be in the format you want and it does not include all the information about your specific configuration. If you choose to compile a report with your results, include enough information about your configuration to reproduce your testing and achieve similar results with. Always include the full configuration of the server, clients and controller: System: Model, CPU architecture/type, clock, number of CPUs/cores, memory, bus speed, BIOS version Network: Number of NICs, switches, NIC model/type, bus type, speed, firmware and driver version Disk Subsystem: Type, model, fabric, spindles, drive speeds, HBA, firmware and driver version OS: Version, edition, architecture, service pack OS version is important! command lines used for both prepare and run If a client is running Estimated cost of the system as configured Windows XP, for instance, you get SMBv1, not SMBv2. Common results should also include Maximum throughput for HomeFolders workload (in scenarios per second) Maximum number of users for HomeFolders workload Cost/throughput for HomeFolders workload (in dollars per scenarios per second) Cost/maximum number of users for HomeFolders workload (in dollars per users without overload) IMPORTANT: The Beta End-User License Agreement and vendor agreements might limit your ability to disclose the results of your testing outside your company.
31 with Active Directory Volumes DC SRV CTL Users Network 1 - Control Network 2 - Data Network 3 - Data CLI1 CLI2 CLI3 CLI4 DC = Domain Controller SRV = Server under test CTL = Controller CLIn = Clients
32 Prepare with AD DC SRV CTL prepare dc /users 1000 /clients CLI1, CLI2 CLI1 CLI2
33 Prepare with AD prepare server /clients CLI1,CLI2 /password PASS /users 1000 /domain contoso.msft /volumes E:,F: /workload HomeFolders DC SRV CTL prepare dc /users 1000 /clients CLI1, CLI2 CLI1 CLI2
34 Prepare with AD prepare server /clients CLI1,CLI2 /password PASS /users 1000 /domain contoso.msft /volumes E:,F: /workload HomeFolders prepare controller /clients CLI1,CLI2 /volumes E:,F: DC SRV CTL prepare dc /users 1000 /clients CLI1, CLI2 CLI1 CLI2
35 Prepare with AD prepare server /clients CLI1,CLI2 /password PASS /users 1000 /domain contoso.msft /volumes E:,F: /workload HomeFolders prepare controller /clients CLI1,CLI2 /volumes E:,F: DC SRV CTL prepare dc /users 1000 /clients CLI1, CLI2 CLI1 CLI2 prepare client /server SRV /password PASS /users 1000 /domain contoso.msft /server_ip
36 Run with AD DC SRV CTL run controller /server SRV /password PASS /volumes E:,F: /clients CLI1,CLI2 /min_users 100 /max_users 400 /step 100 /duration 300 /workload HomeFolders CLI1 CLI2 run client /controller CTL /server SRV /password PASS /domain contoso.msft
37 with non-windows Server DC SRV CTL prepare dc /users 1000 /clients CLI1, CLI2 CLI1 CLI2
38 with non-windows Server prepare controller /clients CLI1,CLI2 /volumes \\SRV\share DC SRV CTL prepare dc /users 1000 /clients CLI1, CLI2 CLI1 CLI2
39 with non-windows Server prepare controller /clients CLI1,CLI2 /volumes \\SRV\share DC SRV CTL prepare dc /users 1000 /clients CLI1, CLI2 CLI1 CLI2 prepare server /clients CLI1,CLI2 /password PASS /users 1000 /domain contoso.msft /volumes \\SRV\share /workload HomeFolders /create_only_fileset
40 with non-windows Server prepare controller /clients CLI1,CLI2 /volumes \\SRV\share DC SRV CTL prepare dc /users 1000 /clients CLI1, CLI2 CLI1 CLI2 prepare server /clients CLI1,CLI2 /password PASS /users 1000 /domain contoso.msft /volumes \\SRV\share /workload HomeFolders /create_only_fileset prepare client /server SRV /password PASS /users 1000 /domain contoso.msft /server_ip
41 White Paper White Paper Content Overview of CIFS/SMB/SMB2 Overview of Step-by-step instructions on how to prepare, run and clean up Step-by-step instructions to configure a non-windows server Command-line reference Annotated results file Description of the HomeFolders workload White Paper Releases Draft included with v 0.2 Beta and v 0.5 Beta Final version with v 1.0 public download
42 Planned Releases v 0.2 Beta Limited Release via EULA restricting publication of results Available now v 0.5 Beta Wide Release via Target date: Q4 CY 2008 v 1.0 Released via Public download, along with white paper and press release Target date: CY 2009 Dates are estimates subject to change Send to request an invitation for the upcoming 0.5 beta
43 Help us improve Participate in the version 0.5 beta Provide feedback on the tool and the workload
Optimizing LTO Backup Performance
Optimizing LTO Backup Performance July 19, 2011 Written by: Ash McCarty Contributors: Cedrick Burton Bob Dawson Vang Nguyen Richard Snook Table of Contents 1.0 Introduction... 3 2.0 Host System Configuration...
DELL TM PowerEdge TM T610 500 Mailbox Resiliency Exchange 2010 Storage Solution
DELL TM PowerEdge TM T610 500 Mailbox Resiliency Exchange 2010 Storage Solution Tested with: ESRP Storage Version 3.0 Tested Date: Content DELL TM PowerEdge TM T610... 1 500 Mailbox Resiliency
Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software
Best Practices for Monitoring Databases on VMware Dean Richards Senior DBA, Confio Software 1 Who Am I? 20+ Years in Oracle & SQL Server DBA and Developer Worked for Oracle Consulting Specialize in Performance
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
Windows Server Performance Monitoring
Spot server problems before they are noticed The system s really slow today! How often have you heard that? Finding the solution isn t so easy. The obvious questions to ask are why is it running slowly
CXS-203-1 Citrix XenServer 6.0 Administration
Page1 CXS-203-1 Citrix XenServer 6.0 Administration In the Citrix XenServer 6.0 classroom training course, students are provided with the foundation necessary to effectively install, configure, administer,
HBA Virtualization Technologies for Windows OS Environments
HBA Virtualization Technologies for Windows OS Environments FC HBA Virtualization Keeping Pace with Virtualized Data Centers Executive Summary Today, Microsoft offers Virtual Server 2005 R2, a software
Wharf T&T Cloud Backup Service User & Installation Guide
Wharf T&T Cloud Backup Service User & Installation Guide Version 1.6 Feb 2013 Table of contents BEFORE YOU INSTALL 3 Page Section 1. Installation of Client Software 5 Section 2. Account Activation 8 Section
Citrix XenServer 6 Administration
Citrix XenServer 6 Administration CTX-XS06 DESCRIZIONE: In this Citrix XenServer 6.0 training course, you will gain the foundational knowledge necessary to effectively install, configure, administer, and
GigaSpaces XAP 10.0 Administration Training ADMINISTRATION, MONITORING AND TROUBLESHOOTING GIGASPACES XAP DISTRIBUTED SYSTEMS
GigaSpaces XAP 10.0 Administration Training ADMINISTRATION, MONITORING AND TROUBLESHOOTING GIGASPACES XAP DISTRIBUTED SYSTEMS Learn about GigaSpaces XAP internal protocols, its configuration, monitoring
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft
Microsoft Windows Compute Cluster Server 2003 Getting Started Guide
Microsoft Windows Compute Cluster Server 2003 Getting Started Guide Part Number 434709-003 March 2007 (Third Edition) Copyright 2006, 2007 Hewlett-Packard Development Company, L.P. The information contained
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft
White Paper Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft What You Will Learn Cisco is continuously innovating to help businesses reinvent the enterprise data
Goliath Performance Monitor Prerequisites v11.6
v11.6 Are You Ready to Install? Use our pre-installation checklist below to make sure all items are in place before beginning the installation process. For further explanation, please read the official
DameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in
Installation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
Symantec Backup Exec 2010 R2. Quick Installation Guide
Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
simplify monitoring Environment Prerequisites for Installation Simplify Monitoring 11.4 (v11.4) Document Date: January 2015 www.tricerat.
simplify monitoring Environment Prerequisites for Installation Simplify Monitoring 11.4 (v11.4) Document Date: January 2015 www.tricerat.com Legal Notices Simplify Monitoring s Configuration for Citrix
Default configuration for the Workstation service and the Server service
Article ID: 887429 - Last Review: November 30, 2007 - Revision: 2.4 Overview of Message Block signing INTRODUCTION This article describes Message Block (SMB) signing. SMB signing is a security mechanism
Module 2. Configuring and Troubleshooting DNS. Contents:
Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring
Jetico Central Manager. Administrator Guide
Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number
Step by Step Guide To vstorage Backup Server (Proxy) Sizing
Tivoli Storage Manager for Virtual Environments V6.3 Step by Step Guide To vstorage Backup Server (Proxy) Sizing 12 September 2012 1.1 Author: Dan Wolfe, Tivoli Software Advanced Technology Page 1 of 18
Microsoft Exchange Server 2003 Deployment Considerations
Microsoft Exchange Server 3 Deployment Considerations for Small and Medium Businesses A Dell PowerEdge server can provide an effective platform for Microsoft Exchange Server 3. A team of Dell engineers
Imaging Computing Server User Guide
Imaging Computing Server User Guide PerkinElmer, Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44 (0) 24 7669 0091 E [email protected]
WHITE PAPER 1 WWW.FUSIONIO.COM
1 WWW.FUSIONIO.COM WHITE PAPER WHITE PAPER Executive Summary Fusion iovdi is the first desktop- aware solution to virtual desktop infrastructure. Its software- defined approach uniquely combines the economics
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows
EXAM - 70-410. Installing and Configuring Windows Server 2012. Buy Full Product. http://www.examskey.com/70-410.html
Microsoft EXAM - 70-410 Installing and Configuring Windows Server 2012 Buy Full Product http://www.examskey.com/70-410.html Examskey Microsoft 70-410 exam demo product is here for you to test the quality
Dell PowerEdge Blades Outperform Cisco UCS in East-West Network Performance
Dell PowerEdge Blades Outperform Cisco UCS in East-West Network Performance This white paper compares the performance of blade-to-blade network traffic between two enterprise blade solutions: the Dell
Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
Paragon Protect & Restore
PARAGON Software GmbH Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Email [email protected] Product website : www.protect-restore.com
How to Test Out Backup & Replication 6.5 for Hyper-V
How to Test Out Backup & Replication 6.5 for Hyper-V Mike Resseler May, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes June 2011 Table of Contents Overview... 3 Installation Overview... 3 Hosting System Requirements... 4 Recommended
HP Data Replication Solution Service for 3PAR Virtual Copy
HP Data Replication Solution Service for 3PAR Virtual Copy HP Care Pack Services Technical data HP Data Replication Solution Service for 3PAR Virtual Copy provides implementation of the HP 3PAR Storage
XenClient Enterprise Synchronizer Installation Guide
XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V
Windows Server 2012 Server Manager
Windows Server 2012 Server Manager Introduction: Prior to release of Server Manager in Windows Server 2008, Enterprise solution was to use different third party vendors which includes CA, HP utilities
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation
Security Overview for Windows Vista Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Agenda User and group changes Encryption changes Audit changes User rights New and modified
2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies,
NetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
Active Directory 2008 Operations
The Essentials Series Active Directory 2008 Operations sponsored by by Greg Shields Understanding Active Directory Recovery in Windows Server 2008...1 Backing Up AD...1 Full Server Recovery of a Domain
Acronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
Exchange Migration Guide
IceWarp Unified Communications Exchange Migration Guide Version 11.3 Exchange Migration Guide 2 Exchange Migration Guide This document will guide you through a process of migration from Microsoft Exchange
VMware vsphere 5.1 Advanced Administration
Course ID VMW200 VMware vsphere 5.1 Advanced Administration Course Description This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter.
How To - Implement Clientless Single Sign On Authentication with Active Directory
How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:
Quick Start - Generic NAS File Archiver
Page 1 of 19 Quick Start - Generic NAS File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method 2:
NetWrix USB Blocker Version 3.6 Quick Start Guide
NetWrix USB Blocker Version 3.6 Quick Start Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Getting Started...5 3.1.
StarWind iscsi SAN: Configuring Global Deduplication May 2012
StarWind iscsi SAN: Configuring Global Deduplication May 2012 TRADEMARKS StarWind, StarWind Software, and the StarWind and StarWind Software logos are trademarks of StarWind Software that may be registered
vrealize Operations Manager Customization and Administration Guide
vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.0.1 This document supports the version of each product listed and supports all subsequent versions until
Best practices for operational excellence (SharePoint Server 2010)
Best practices for operational excellence (SharePoint Server 2010) Published: May 12, 2011 Microsoft SharePoint Server 2010 is used for a broad set of applications and solutions, either stand-alone or
KB303215 - Microsoft Network Security Hotfix Checker (Hfnetchk.exe) Tool Is Available
Page 1 of 8 Knowledge Base Microsoft Network Security Hotfix Checker (Hfnetchk.exe) Tool Is Available PSS ID Number: 303215 Article Last Modified on 3/2/2004 The information in this article applies to:
Symantec Event Collector 4.3 for Microsoft Windows Quick Reference
Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement
Hyper-V Replica Broker Configuration Lab By Yung Chou, Microsoft Platform Evangelist, http://aka.ms/yungchou, @yungchou
Page 1 of 23 Hyper-V Replica Broker Configuration Lab By Yung Chou, Microsoft Platform Evangelist, http://aka.ms/yungchou, @yungchou Windows Server 2012 Hyper-V Replica is a built-in mechanism for replicating
Synchronizer Installation
Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
IBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools.
IBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools. Page 1 of 13 The module developer assumes that you understand basic IBM Tivoli Monitoring
HP Virtualization Performance Viewer
HP Virtualization Performance Viewer Efficiently detect and troubleshoot performance issues in virtualized environments Jean-François Muller - Principal Technical Consultant - [email protected] HP Business
Microsoft Exchange Solutions on VMware
Design and Sizing Examples: Microsoft Exchange Solutions on VMware Page 1 of 19 Contents 1. Introduction... 3 1.1. Overview... 3 1.2. Benefits of Running Exchange Server 2007 on VMware Infrastructure 3...
Installation Guide for Citrix XenServer 5.5
white paper Installation Guide for Citrix XenServer 5.5 Title: Installation Guide for Citrix XenServer 5.5 Author(s): Xtravirt (Paul Buckle) Target Audience: Technical - Novice Current Revision: 1.0 (Jul
Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team
Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture Dell Compellent Product Specialist Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers
W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...
Polar Help Desk Installation Guide
Polar Help Desk Installation Guide Copyright (legal information) Copyright Polar 1995-2005. All rights reserved. The information contained in this document is proprietary to Polar and may not be used or
Course Syllabus. Deploying Microsoft Windows Server 2008. Key Data. Audience. At Course Completion
Key Data Product #: 6418B Course Syllabus Deploying Microsoft Windows Server 2008 This 3-day instructor-led course provides students with an understanding of migrating and deploying Windows Server 2008
CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson
CS 3530 Operating Systems L02 OS Intro Part 1 Dr. Ken Hoganson Chapter 1 Basic Concepts of Operating Systems Computer Systems A computer system consists of two basic types of components: Hardware components,
Preparing a SQL Server for EmpowerID installation
Preparing a SQL Server for EmpowerID installation By: Jamis Eichenauer Last Updated: October 7, 2014 Contents Hardware preparation... 3 Software preparation... 3 SQL Server preparation... 4 Full-Text Search
Maintaining a Microsoft Windows Server 2003 Environment
Maintaining a Microsoft Windows Server 2003 Environment Course number: 2275C Course lenght: 3 days Course Outline Module 1: Preparing to Administer a Server This module explains how to administer a server.
EMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER
White Paper EMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER Abstract The objective of this white paper is to describe the architecture of and procedure for configuring EMC Documentum xplore
Installing and Configuring Windows Server 2008. Module Overview 14/05/2013. Lesson 1: Planning Windows Server 2008 Installation.
Installing and Configuring Windows Server 2008 Tom Brett Module Overview Planning Windows Server 2008 Installations Performing a Windows Server 2008 Installation Configuring Windows Server 2008 Following
Virtual Desktop Infrastructure (VDI) made Easy
Virtual Desktop Infrastructure (VDI) made Easy HOW-TO Preface: Desktop virtualization can increase the effectiveness of information technology (IT) teams by simplifying how they configure and deploy endpoint
Virtualizing Microsoft SQL Server 2008 on the Hitachi Adaptable Modular Storage 2000 Family Using Microsoft Hyper-V
Virtualizing Microsoft SQL Server 2008 on the Hitachi Adaptable Modular Storage 2000 Family Using Microsoft Hyper-V Implementation Guide By Eduardo Freitas and Ryan Sokolowski February 2010 Summary Deploying
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0
EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0 Copyright 2011 ECDL Foundation All rights reserved. No part of this publication may be reproduced in any form except as permitted
Getting Started with HC Exchange Module
Getting Started with HC Exchange Module HOSTING CONTROLLER WWW.HOSTINGCONROLLER.COM HOSTING CONTROLLER Contents Introduction...1 Minimum System Requirements for Exchange 2013...1 Hardware Requirements...1
Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008
Best Practices Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Installation and Configuration Guide 2010 LSI Corporation August 13, 2010
Citrix EdgeSight for Load Testing Installation Guide. Citrix EdgeSight for Load Testing 3.8
Citrix EdgeSight for Load Testing Installation Guide Citrix EdgeSight for Load Testing 3.8 Copyright Use of the product documented in this guide is subject to your prior acceptance of the End User License
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting
Basic ShadowProtect Troubleshooting
Level 11, 53 Walker Street North Sydney NSW 2060 Australia t +61 2 9929 9770 f +61 2 9929 9771 w www.storagecraft.com.au Basic ShadowProtect Synopsis This article describes basic ShadowProtect troubleshooting
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Fibre Channel HBA and VM Migration
Fibre Channel HBA and VM Migration Guide for Hyper-V and System Center VMM2008 FC0054605-00 A Fibre Channel HBA and VM Migration Guide for Hyper-V and System Center VMM2008 S Information furnished in this
Citrix EdgeSight for Load Testing Installation Guide. Citrix EdgeSight for Load Testing 3.5
Citrix EdgeSight for Load Testing Installation Guide Citrix EdgeSight for Load Testing 3.5 Copyright Use of the product documented in this guide is subject to your prior acceptance of the End User License
Windows Host Utilities 6.0.2 Installation and Setup Guide
Windows Host Utilities 6.0.2 Installation and Setup Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.A. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277
JUNE 2009 File server performance comparison of three Dell PowerVault NX3000 configurations using Microsoft FSCT
TEST REPORT JUNE 2009 File server performance comparison of three Dell PowerVault NX3000 Executive summary Dell Inc. (Dell) commissioned Principled Technologies (PT) to compare the performance of three
Quick Start - NetApp File Archiver
Page 1 of 19 Quick Start - NetApp File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method 2: Install
New!! - Higher performance for Windows and UNIX environments
New!! - Higher performance for Windows and UNIX environments The IBM TotalStorage Network Attached Storage Gateway 300 (NAS Gateway 300) is designed to act as a gateway between a storage area network (SAN)
Certification: HP ATA Servers & Storage
HP ExpertONE Competency Model Certification: HP ATA Servers & Storage Overview Achieving an HP certification provides relevant skills that can lead to a fulfilling career in Information Technology. HP
Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide
Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide Microsoft Corporation Published: October 2010 Abstract This step-by-step guide walks you through the
Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools
Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the
RES ONE Automation 2015 Task Overview
RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying
GigaSpaces XAP 9.7 Administration Training ADMINISTRATION, MONITORING AND TROUBLESHOOTING GIGASPACES XAP DISTRIBUTED SYSTEMS
GigaSpaces XAP 9.7 Administration Training ADMINISTRATION, MONITORING AND TROUBLESHOOTING GIGASPACES XAP DISTRIBUTED SYSTEMS Learn about GigaSpaces XAP internal protocols, its configuration, monitoring
Evaluation of Enterprise Data Protection using SEP Software
Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &
Virtual Managment Appliance Setup Guide
Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy
User Guide - Exchange Public Folder idataagent
Page 1 of 191 User Guide - Exchange Public Folder idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE PUBLIC FOLDER IDATAAGENT DEPLOYMENT
Understanding and Configuring Password Manager for Maximum Benefits
Understanding and Configuring Password Manager for Maximum Benefits Written by Chris Radband, senior professional services consultant, Dell Software Introduction About Password Manager The pain of password
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
