Archive Manager 4.4. Retention Policy Guide

Size: px
Start display at page:

Download "Archive Manager 4.4. Retention Policy Guide"

Transcription

1 Archive Manager 4.4 Retention Policy Guide

2 Quest Archive Manager Archive Manager Retention Policy Guide Updated - October 2010 (Doc ID 271) Software Version Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Quest Software, Inc. If you have any questions regarding your potential use of this material, contact: Quest Software World Headquarters LEGAL Dept 5 Polaris Way Aliso Viejo, CA USA legal@quest.com Refer to our Web site for regional and international office information. TRADEMARKS Quest, Quest Software, and the Quest Software logo are trademarks and registered trademarks of Quest Software, Inc. in the United States of America and other countries. For a complete list of Quest Software s trademarks, please see Other trademarks and registered trademarks are property of their respective owners. DISCLAIMER The information in this document is provided in connection with Quest products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest does not make any commitment to update the information contained in this document.

3 CONTENTS ABOUT THIS GUIDE V CHAPTER 1 OVERVIEW RETENTION POLICY OVERVIEW CHAPTER 2 INSTALLING AND STARTING THE RETENTION POLICY EDITOR BEFORE YOU INSTALL INSTALLATION AFTER YOU INSTALL CHAPTER 3 RETENTION POLICY EDITOR FUNCTIONS ARCHIVE MANAGER RETENTION POLICY EDITOR TABS USING THE RETENTION POLICY EDITOR ADDING A POLICY EDITING A POLICY REMOVING A POLICY KEEP POLICY DELETE POLICY EXECUTION LOG CHANGE LOG LEGAL HOLD Activating Legal Hold Deactivating Legal Hold SETTINGS REPAIRING THE ARCHIVE MANAGER RETENTION POLICY EDITOR...36 REMOVING THE ARCHIVE MANAGER RETENTION POLICY EDITOR...37 TIME RANGE APPENDIX A APPENDIX A: CASE STUDY CASE STUDY OVERVIEW Case One Case Two iii

4 Quest Archive Manager STEP 1. SETTING THE SAFE MODE FOR THE RETENTION ENGINE...42 STEP 2. CREATING POLICIES Case One Case Two STEP 3. VIEWING THE CHANGE LOG STEP 4. VIEWING THE EXECUTION LOG AND SWITCHING TO THE PRODUCTION MODE SUMMARY ABOUT QUEST SOFTWARE ABOUT QUEST SOFTWARE CONTACTING QUEST SOFTWARE CONTACTING QUEST SUPPORT VISITING OUR ARCHIVE MANAGER ONLINE COMMUNITY OTHER QUEST COMMUNITIES PRODUCT INFORMATION AND DOCUMENTATION iv

5 About This Guide This Retention Policy Guide has been prepared to assist you in becoming familiar with Quest Archive Manager. It is intended for network administrators, consultants, analysts, and any other IT professionals using the product.

6 Quest Archive Manager vi

7 1 Overview Retention Policy Overview

8 Quest Archive Manager Retention Policy Overview The Retention Policy Editor lets organizations concerned with compliance ensure that messages are stored for an appropriate period of time, as some legislation specifies that messages are to be kept for a finite number of years. Retention rules, or policies, determine how long messages should remain in the archive. Using a variety of criteria, organizations can define how long the messages in the archive are to be retained. The advanced retention capabilities of Archive Manager include: Flexible administration of retention rules - A hierarchical list of policies provides a powerful but simple way of designing your retention policy to determine the order in which policies are enforced when one or more policies reference the same message (conflict resolution). Schedule-based execution of retention policies - Policies are implemented at the times defined by the administrator. "Safe Mode" - This mode is used for testing retention policies before they are applied to the actual archive. Auditing of retention activities - All retention activity (policy change, add or delete) is logged to the Archive Manager UI and to the event log. Legal Hold - The organization can suspend the retention capabilities using the Legal Hold feature in the event of litigation or investigation. Administrators can "single lock" or "double lock" the retention engine, preventing it from running until granular keep policies are applied that protect required evidence. Messages removed by retention for one user cannot subsequently be loaded by the Exchange Store Manager for another user. For example, if a message is sent to User A and User B and a retention policy deletes the message for User A before it is loaded into Archive Manager for User B, then the message is gone and the ESM cannot load the message for User B. Backloading message data into Archive Manager should be completed for all users for a single Archive Manager instance before retention is configured and implemented to ensure that message data for all users is archived. For a case study to familiarize yourself with the Retention Policy Editor and its typical uses, see Appendix A: Case Study at the end of this Guide. 8

9 2 Installing and Starting the Retention Policy Editor Before You Install Installation After You Install

10 Quest Archive Manager Before You Install Before you install the Retention Policy Editor, you must install Quest Archive Manager. The default directory for the Archive Manager folder is C:\Program files\quest Software\Archive Manager. (The path may change when upgrading from an earlier version of Archive Manager). Make sure that Archive Manager Message Retention Policy Service is installed and started. This service is a component of Archive Manager and is installed during the Archive Manager Setup. To check whether the service is installed and started, go to Start Control Panel Administrative tools Services. Locate the Archive Manager Message Retention Policy Service in the list and make sure it is started. (You can stop or pause and later restart the service if necessary). 10

11 Installing and Starting the Retention Policy Editor Installation To install Quest Archive Manager Retention Policy Editor, perform the following: Go to C:\Program files\quest Software\Archive Manager\WebSite\Tools, locate the file RetentionPolicyEditor.msi and double click it. Alternatively, the Archive Manager Retention Policy Editor can be downloaded from your Archive Manager Website. Administrator rights are required for this. Sign in to your Archive Manager Website as admin. Open the Archive Manager Administration page. Click the Download Tools link. Locate the Archive Manager Retention Policy Editor in the list and click the RetentionPolicyEditor.msi filename. When the Download dialog box appears: Click Run to install Archive Manager Retention Policy Editor. The Archive Manager Retention Policy Editor Setup Wizard guides you through the steps required to install the Archive Manager Retention Policy Editor on your computer: 1. On the Setup Wizard Welcome screen: Click the Next button to begin. 2. Select the Folder where you want to install the Archive Manager Retention Policy Editor, and click Next. You can leave the Folder field set to its default value, or click the Browse button to locate and specify a different folder. 11

12 Quest Archive Manager To see the drives to which you can install the Retention Policy Editor, and each drive's available and required disk space, click the Disk Cost button, and then the OK button to clear the Disk Space display. 3. In the Confirm Installation screen: Click the Next button to begin the installation process. 4. In the Installation Complete screen: Click the Close button to exit the Archive Manager Retention Policy Editor Setup Wizard. The Archive Manager Retention Policy Editor is now installed on your computer. After You Install The Retention Engine will generate an "Invalid object name" error if the default schema for ArchiveMgr_Service and ArchiveMgr_ESM users is not reset to dbo in the AfterMail_TEMP database after installing the Retention Engine and before running it. If the Retention Engine has already run and the "Invalid object name" has already occurred, reset the schema to dbo and delete the RE.CachedSearchDelete and RE.CachedSearchKeep tables from the AfterMail_TEMP database. Then run the Retention Engine again. To run the application, in the list of programs, go to Start All Programs Quest Software Archive Manager Retention Policy Editor. The Retention Policy Editor version must match the version of your installed Archive Manager. If your Retention Policy Editor generates an error message and is an earlier version than Archive Manager, uninstall the Retention Policy Editor and install the current version. The sign-in window is displayed. Use your Archive Manager credentials in the DOMAIN\UserName format. 12

13 Installing and Starting the Retention Policy Editor Please note that NDS logons are supported for GroupWise users. (For example, NDS:\\Root\Organization\OrganizationalUnit\CommonName, which in GroupWise terms corresponds to Tree\Context\Group\User). Users must have one or both of the following permissions to sign in: Edit Retention Policies Edit Legal Hold The permissions are based on the user security roles. (To learn more about the security roles, please refer to Archive Manager Administration Guide.) Finally, enter the name of the server to connect to, and click Connect. Click the Connect button only once. After you click the Connect button, it changes to a Cancel button. The first time that you sign in to the Retention Policy Editor, you need to expand the window of the application to view it. 13

14 Quest Archive Manager 14

15 3 Retention Policy Editor Functions Archive Manager Retention Policy Editor Tabs Using The Retention Policy Editor Repairing the Archive Manager Retention Policy Editor Removing the Archive Manager Retention Policy Editor Time Range

16 Quest Archive Manager Archive Manager Retention Policy Editor Tabs The main operations of the Archive Manager Retention Policy Editor are laid out in the top-level tabs. These allow you to: Design your retention policy ("Policy Editor" tab). View the activity of the Retention-Engine ("Execution Log" tab). View an audit history of changes made to the retention policies ("Change Log" tab). Temporarily suspend all retention policies to prevent the destruction of any message ("Legal Hold" Tab). Define the Retention-Engine settings ("Settings" tab). View the information related to the Retention-Engine activity (whether it is running in Safe Mode or Production Mode, and whether Legal Hold is on). The number and order of the tabs displayed vary depending on your permissions. If a user has 'Edit Retention Policies' rights, the only tabs displayed are Policy Editor, Execution Log, Change Log and Settings (in that order). If a user has 'Edit Legal Hold' rights, the only tabs displayed are Legal Hold, Execution Log and Change Log (in that order). If a user has both 'Edit Retention Policies' and 'Edit Legal Hold' rights, the tabs displayed are Policy Editor, Execution Log, Change Log, Legal Hold and Settings (in that order). 16

17 Retention Policy Editor Functions Using The Retention Policy Editor The Retention Editor is the tool for designing your 'retention policy'. To design the retention policy a user has to have the 'Edit Retention Policies' permission. A 'retention policy' consists of a number of different Policy items that specify: The action: Keep/Delete, The time-frame for performing the action, Criteria specifying which messages the policy pertains to. Below is an example of a Policy item with a brief description of its parts. These Policy items are listed in a hierarchal order that indicate the order of execution (top-to-bottom). The order of execution allows you to specify which policies override other policies. Sometimes several Policy items might reference some of the same messages (for example, you may have one Policy that refers to all messages in mailbox "Bob Smith" and another Policy that refers to all messages in Mailstore "Store One" where the "Bob Smith" mailbox resides). 17

18 Quest Archive Manager The Retention-Engine only executes a single policy item for each message - which is the first Policy it encounters (Policy 1 displayed at the top of the list). If the same message appears in another Policy item being executed further down the list, it is simply ignored. The Retention Editor allows you to set up this execution order by dragging your Policy items around. Simply hold your cursor over the left corner of the Policy item ("Grip") and drag and drop to move the Policy. Adding a Policy 1. To add a policy, go to the Add a new field at the bottom of the screen and click Keep Policy. A new Policy item is inserted within the editor. 2. Specify the criteria for policies using the expanded view of the Policy item. When the next policy is added, the previous one/ones are in the collapsed view. For more information see the Keep Policy and Delete Policy sections of this guide. The policies are color-coded: the Keep action is represented as a green policy item, Delete - as a red one. 18

19 Retention Policy Editor Functions Editing a Policy 1. To edit a policy, expand the view of the policy item by clicking arrows next to the Policy Action and the Policy Acts Upon fields. The collapsed state of the item changes to the expanded state where you can edit the policy settings. 2. Modify the facet as required. 3. The Click here to Save link appears in the right bottom corner of the screen. Click the link to save your changes. 4. When the policy settings are defined, click the down arrow to use the collapsed state of the policy items with the descriptive overview of the settings. (The expanded view of the policy items also changes to the collapsed one when you move them using "drag-and-drop".) The policies are executed in the hierarchal order top-to-bottom. You can reorder the process hierarchy by using "drag-and-drop" to move the policy items (click and drag the "Grip" at the left corner of a policy item). Messages 19

20 Quest Archive Manager pertaining to policies higher in the list are executed first and then subsequently ignored by policies lower down in the list. This provides a conflict resolution strategy allowing items to be kept safe by capturing them within a Keep policy and placing it at or near the top of the list. Removing a Policy To remove a policy from the list: 1. Click the Close (X) button at the top right of the policy. 2. In the confirmation dialog box: Click Yes if you want to remove the policy. Keep Policy When you select the Keep policy, you can either keep the messages forever or specify the period of time you want to keep them, after which they are no longer protected by the Keep policy and remain in the Archive Manager database as potential candidates for any other policies to act upon. To set the Keep Policy: 1. Click Add a new: Keep Policy. 2. Click on the field next to the policy item number to enter the policy name. 3. By default the Keep Policy is set to Keep Forever. To specify the time to keep messages, click on the arrow pointing to the Policy Action and the edit controls will be revealed. Select the Keep For radio button to define the time range and enter the value in the box. (The button is automatically selected when you enter a value in this box). You can choose to specify the time-range in Days, Weeks, Months or Years by clicking on the underlined options. The box allows four digits. The mode selected is highlighted. Switching between modes converts your value to the equivalent value in the new mode. When jumping between the modes rounding might occur as the conversion is standardized: 1 Week = 7 days, etc. (For more information please see the Time Range section below). 20

21 Retention Policy Editor Functions For example, if you choose to keep the messages for 210 days and later decide to use months, the editor will turn the specified number of days into 7 months: 4. Message criteria settings are defined in the Policy Acts Upon fields. a) Selecting the Everything (All Messages in Archive) checkbox means that the policy will be applied to all the items in the archive. b) The field Only items within allows you to specify the container where the messages you want to apply the policy to are located. You can choose among Mailstore, Mailbox, Group and OU containers. Click on the container type to add it to the list. Regardless of the order of the containers in the list, the OR relationship exists between the containers of the same type, and the AND relationship between the containers of different types. For example, if you specify two different mailboxes, a Mailstore and a Group, the retention engine will keep the messages in either of these mailboxes located in the selected mail store of the users belonging to the group. If these users have mailboxes in other mail stores, or they are members of other groups, the messages in those mailboxes remain untouched. Container is the category name for each explicit type of container. The list of the Mailstore and Group containers is populated from the entire set existing within the Archive Manager. 21

22 Quest Archive Manager Typing the name of a Mailbox or OU container that does not exist in the system generates an error, with this warning message: For an OU to show in the list, users must be included in it. Empty OUs are not displayed. (OU container is Exchange specific). c) The collection of messages to be retained can further/also be narrowed by the set of tags in the Items tagged with field. This field is visible only if the tags are defined within Archive Manager. Note that the flag tag is not listed in the Retention Editor. Note that the flag tag is not listed in the Retention Editor. String and Number tag policies with no value will function as a wildcard. Click Add: New Tag. Select the tag from the drop-down list populated from the entire set of tags defined within Archive Manager. Specify the tag value in the next field. Specifying an invalid value generates an error and this warning: Multiple items can be added to the set using the Add: New tag button. To remove a tag from the set, use the "-" button. d) Specify the key words that the messages to be retained should contain in the field Items that contain the words. You can choose the message parts containing the words specified. By default the Editor sets the components containing the keywords to Subject and Body. If you wish to specify the component, i.e. the Subject, Body or Attachment, use the buttons below the box. The selected components are highlighted: To keep one or more attachments with a specific word in the file name, add an asterisk after the word in the Items that contain the words field (for example, invoice*). 22

23 Retention Policy Editor Functions 5. Click the link Click here to Save, in the right bottom corner of the screen, to save the policy. 6. When the policy settings are saved, the Click here to Save link is no longer visible. You can click the down arrows next to Policy Action and Policy Acts Upon to use the collapsed state of the policy items with the overview of the settings. When the time specified for the Keep Policy is over, the messages remain in the Archive Manager database, as potential candidates for any other policies to act upon. Delete Policy The Delete policy specifies the criteria for the messages to be deleted. Note: When a single archived message is associated with multiple mailboxes (e.g., one message sent to six recipients), and a Delete policy applies to one or more but not all of the mailboxes, the message is simply unlinked from the mailboxes where it has been deleted, but is not deleted from the archive altogether. When a message is unlinked from a mailbox in this way, it is reported in the Retention Editor log file in this form: 12:47:21 PM (3) DeleteAfter3Years_Spam : 0 Items Unlinked Caution! Tags are set globally. When a delete policy is defined by a tag, the policy will delete all tagged messages in the database, in all mailbox locations not just in the mailbox where the tag was added. That is, if a message is tagged in a particular mailbox, and then the same tag is used in a delete policy applied to a higher-level container (e.g., OU), the message will be deleted from the archive at the higher container level, in all mailboxes. The steps to set the Delete Policy are almost identical to those for the Keep Policy described above. 23

24 Quest Archive Manager 1. To add a Delete Policy click Add a new: Delete Policy. 2. Click on the field next to the policy item number to enter the policy name. 3. By default the time-range for the Delete Policy is not defined. To specify the period of time after which you want to delete messages, click on the arrow pointing to the Policy Action. Enter the value in the Delete After box to define the time range. You can choose between the Days, Weeks, Months or Years modes to set the time range. The mode selected is highlighted. The box allows four digits. Switching between modes converts to the equivalent difference. When jumping between the modes rounding might occur as the conversion is standardized: 1 Week = 7 days, etc. For example, if you choose to delete the messages after 200 days and later decide to use months, the editor will turn the specified number of days into 7 months: (For more information see the Time Range section below). 4. The message criteria settings are defined in the Policy Acts Upon fields. a) Selecting the Everything (All Messages in Archive) checkbox means that the policy will be applied to all the items in the archive. b) The field Only items within allows you to specify the container where the messages you want to apply the policy to are located. You can choose among Mailstore, Mailbox, Group and OU containers. Click on the container type to add it to the list. Regardless of the order of the containers in the list, the OR relationship exists between the containers of the same type, and the AND relationship exists between containers of different types. 24

25 Retention Policy Editor Functions For example, if you specify two different mailboxes, a Mailstore and a Group, the retention engine will delete the messages in either of these mailboxes located in the selected mail store of the users belonging to the group. If these users have mailboxes in other mail stores, or they are members of other groups, the messages in those mailboxes remain untouched. Container is the category name for each explicit type of container. The list of the Mailstore and Group containers is populated from the entire set existing within the Archive Manager. Typing the name of a Mailbox or OU container that does not exist in the system generates an error, with this warning: For an OU to show in the list, users must be included in it. Empty OUs are not displayed. (OU container is Exchange specific). The format of GroupWise mailboxes/groups in the Retention Policy is "Tree\User" for Mailboxes and "Tree\DistributionList" for Groups. Specifying GroupWise post-offices is not supported. c) The collection of messages to be deleted can further/also be narrowed by the set of tags in the Items tagged with field. This field is visible only if the tags are defined within Archive Manager. Note that the flag tag is not listed in the Retention Editor. String and Number tag policies with no value will function as a wildcard. Click Add: New Tag. Select the tag from the drop-down list populated from the entire set of tags defined within Archive Manager. Specify the tag value in the next field. Specifying an invalid value generates an error and this warning: 25

26 Quest Archive Manager Multiple items can be added to the set using the Add: New tag button. To remove a tag from the set, use the "-" button. d) Specify the key words that the messages to be deleted should contain in the field Items that contain the words. You can choose the message parts containing the words specified. By default the Editor sets the components containing the keywords to Subject and Body. If you wish to specify the component, i.e. the Subject, Body or Attachment, use the buttons below the box. The selected components are highlighted: To delete one or more attachments with a specific word in the file name, add an asterisk after the word in the Items that contain the words field (for example: invoice*). 5. Click the link Click here to Save, in the right bottom corner of the screen to save the policy. When the policy settings are saved, the Click here to Save link is no longer visible. 6. You can click the down arrows next to Policy Action and Policy Acts Upon to use the collapsed state of the policy-items with the overview of the settings. 26

27 Retention Policy Editor Functions When the time specified for the Delete Policy is over, the messages are deleted from the indicated containers, and are completely removed from the Archive Manager database if they are no longer in any mailboxes. Execution Log All retention activity is logged so that the administrator can review the process history of the Retention Policy engine, i.e. the events and the summaries of what the retention engine did each time it ran. The Execution Log provides the following information: Started - the date and time when the retention engine began executing the policy set. Finished - the date and time when the retention engine completed executing the policy set. Execution Time - the amount of time it took the retention engine to execute the policy set. Ran in - the mode of retention policy execution (either Safe - used for testing purposes, or Production). Details: (for each Policy executed by the Retention-Engine) Time executed, Name of Policy, Number of message items processed by the policy. 27

28 Quest Archive Manager Change Log The administrator or auditor can review the changes made to the retention policy. The Change Log provides the following information: The name of the user who introduced the changes to the retention policy set and the User ID in parenthesis. The date and time the changes were introduced. The actual changes that were applied to the policy set. These can be either of the following: changing the Retention-Engine settings; the Running Mode of the Retention-Engine; saving a new version of the policy set; enabling Legal hold set: Single-lock; enabling Legal hold set: Double-lock 28

29 Retention Policy Editor Functions Legal Hold Legal Hold suspends all retention policies to prevent the destruction of any messages that are the subject of pending, or potential, litigation or investigation. A single user with the 'Edit Legal Hold' permissions can invoke Legal Hold. Optionally a second user having the 'Edit Legal Hold' permissions can 'double-lock' the system, requiring both users to remove their locks before the retention engine resumes operation again. There can be various reasons for applying a Legal Hold, such as the nature of the customers business requiring accurate record keeping, litigation, etc. In the event of litigation, we recommend that the customer apply a Legal Hold unless/until it is determined that their legal obligations can be met with their retention policies. Activating Legal Hold To activate Legal Hold, select Legal Hold tab, enter a reason for placing the lock, click the Lock button. 29

30 Quest Archive Manager The Legal Hold is activated, meaning the Retention-Engine will not process. This is known as a "single lock" because only one person locked it. When Legal Hold is activated, the information visible is the name of the user who locked it, the date and time when Legal Hold was enabled and the reason for it. (The Unlock button is visible only to the user(s) who invoked the Legal Hold.) As additional security the company may want to enforce a "double-lock." This is performed by another user with appropriate permissions signing in, and going through the same process of locking, however they will see that another person (in this case "Administrator") has already locked it. 30

31 Retention Policy Editor Functions After the second user enters a reason and presses Lock, the "double lock" Legal Hold is enforced, requiring both users to remove the Legal Hold before the retention engine will run again. 31

32 Quest Archive Manager The Unlock button is visible only to the user(s) who invoked the Legal Hold. If other users with appropriate rights sign on, they can see by whom, when and why the Legal Hold was invoked but they cannot deactivate it. The Retention-Engine activity related to Legal Hold is as follows: If the Retention-Engine is running at the moment when the Legal Hold is activated, the engine finishes processing the current policy item and the execution of the policy set is terminated. If the Legal Hold is enabled before the Retention-Engine is scheduled to start, the engine will ignore the schedule. 32

33 Retention Policy Editor Functions Deactivating Legal Hold Only the user(s) who invoked the Legal Hold can deactivate it. To restore normal retention activity, press the Unlock button. (If "double lock" was enabled, it requires both administrators to remove their lock to restore normal retention activity.) 33

34 Quest Archive Manager When Legal Hold is deactivated, the Retention engine will start executing the policy set in accordance with the schedule. The policy set will be processed starting from the first item in the list (not where the execution was terminated). 34

35 Retention Policy Editor Functions Settings The Settings tab allows the administrator to define Retention-Engine activity. The Operation Mode box allows you to change the mode of Retention-Engine activity. By default, the Safe mode radio button is selected. Safe Mode is used for testing retention policies before they are applied to the actual archive. Safe Mode allows a set of retention policies to be designed without any changes being made to the system. The engine will run based on your policy-set design, and the results of what would have happened to the archive can be viewed in the output log. Production Mode executes the retention policies against the live production system. Retention policies are designed to keep and delete messages after specified period of time. The incorrect use of these policies may result in data loss. Please ensure you have tested your policies in Safe mode before turning on Production Mode. The Schedule controls allow you to set the time for the Retention-Engine to start. The default value (upon installation) is midnight (12am) everyday. Click the boxes to set the day and time for the retention policies to be executed. 35

36 Quest Archive Manager Repairing the Archive Manager Retention Policy Editor To repair the Archive Manager Retention Policy Editor, run the ArchiveManagerRetentionPolicyEditor.msi file. You can run it either from C:\Program Files\Quest Software\Archive Manager\RetentionPolicyEditor.msi (or the folder in which you chose to install the Archive Manager) OR the Archive Manager Web client: Administration page Download Tools RetentionPolicyEditor.msi Click Run to start Archive Manager Retention Policy Editor. The Archive Manager Retention Policy Editor Setup Wizard is displayed. It guides you through the steps required to repair the Retention Policy Editor on your computer. 36

37 Retention Policy Editor Functions Removing the Archive Manager Retention Policy Editor To remove the Archive Manager Retention Policy Editor, run the RetentionPolicyEditor.msi file. You can run it either from C:\Program files\quest Software\Archive Manager\RetentionPolicyEditor.msi (or the folder in which you chose to install the Archive Manager) OR the Archive Manager Web client: Administration page Download Tools RetentionPolicyEditor.msi Click Run to start Archive Manager Retention Policy Editor. The Archive Manager Retention Policy Editor Setup Wizard is displayed. It guides you through the steps required to remove the Retention Policy Editor from your computer. 37

38 Quest Archive Manager Time Range You can choose between the Days, Weeks, Months or Years modes to set the time range to specify the time you want the policy to be active. The mode selected is highlighted. The box allows four digits. Switching between modes converts to the equivalent difference. When jumping between the modes rounding might occur as the conversion is standardized as follows: Week to Days: 1 Week = 7 days Months to Days:1 Month = 31 days Months to Weeks: 1 Month = 4 weeks Years to Months: 1 Year = 12 months Years to Weeks: 1 Year = 52 Weeks. To protect the user when jumping between modes, even when rounding occurs, the precise value for each mode is retained in memory. When the textbox value is explicitly changed by the user, the in-memory table is reset. For example, if you enter a value of 100 days in the Days mode and then switch to the Weeks mode, the weeks will be rounded to a value of 15 weeks. 38

39 Retention Policy Editor Functions When switching to the Months mode, the value is rounded to 4 months, with Years mode - to one year. Even though the value has been rounded, if you look at the Days mode again, your value remains set to 100 days. However, if you then change the value to 4 months in the Months mode and then switch back to the Days mode, the value in the Days mode will automatically be changed to 124 days. 39

40 Quest Archive Manager 40

41 A Appendix A: Case Study Case Study Overview Step 1. Setting the Safe Mode for the Retention Engine Step 2. Creating Policies Step 3. Viewing the Change Log Step 4. Viewing the Execution Log and Switching to the Production Mode Summary

42 Quest Archive Manager Case Study Overview Case One This case is an example of setting up a single policy. The administrator creates a policy to delete automated messages after 1 month. These s have the words "Welcome to Quest Software" in the Subject. The administrator has 'Edit Retention Policies' permissions. Case Two This case is an example of setting up a policy-set consisting of several policy items. The administrator creates a policy-set for the Retention-Engine to perform the following: 1. Keep CEO's s Forever (Michael Black is the name of the company CEO). 2. Keep the records tagged "Financial" for 7 years (The tags are defined within Archive Manager). 3. Delete Records tagged "Sensitive" from the VPs' mailboxes after 6 months (The tags and three groups of VPs are defined within Archive Manager: VPs of Marketing, VPs of Engineering and VPs of TechComm). 4. Keep the rest of VP records forever. 5. Delete web-transaction records after 3 years (the records are contained in the "SiteOrders" mailbox). 6. Delete all messages from the archive after 7 years. The administrator has 'Edit Retention Policies' permissions. Step 1. Setting the Safe Mode for the Retention Engine It is recommended that you set the Retention Engine to run in Safe Mode first for testing retention policies before they are applied to the actual archive. To do it, perform the following: Sign in to the Archive Manager Retention Policy Editor. 2. Select the Settings Tab. 3. Select the Safe Mode radio button. 4. Click the link in the right bottom corner of the screen to save your changes.

43 Appendix A: Case Study Before saving you changes, you can also set the running time for the retention engine using this tab. To do it, select the square that corresponds to the day and time you want the Retention Engine to start. In the example below the engine is scheduled to run every day at 12 AM. Step 2. Creating Policies Use the Policy Editor tab to create policies. Case One 1. Click Add a new: Delete Policy button at the bottom of the screen. 2. Click on the field next to the policy item number to enter the policy name - Delete Welcome Messages. 3. Click on the arrow next to Policy Action to expand the view of the policy item and specify the time-range for the policy in the Delete After field. Click on the Months link and enter 1 in the box. 4. Check the Everything (All Messages in Archive) box in the Policy Acts Upon field. 43

44 Quest Archive Manager 5. Enter "Welcome to Quest Software" keywords in the Items that contain the words: field. 6. Click on the Look in: links to choose the component of the message. By default the Subject and Body are selected (highlighted). Click the Body link to deselect it. 7. Click the link in the right bottom corner of the screen to save your changes. Case Two To create the first policy of the set - Keep CEO's s - perform the following: 1. Click Add a new: Keep Policy button at the bottom of the screen. 2. Click on the field next to the policy item number to enter the policy name - Keep CEO's s. 3. Click on the arrow next to Policy Action to expand the view of the policy item and specify the time-range for the policy - Select the Keep Forever radio button. 4. In the Policy Acts Upon field click the Add: Mailbox link in the Only Items within: and specify the mailbox name - Michael Black. While you are typing, a warning message is displayed. When you finish typing, the message disappears and a green check appears next to the mailbox name to indicate that it exists within the Archive Manager. 44

45 Appendix A: Case Study The format of GroupWise mailboxes in the Retention Policy is "Tree\User". To create the second policy in the list - Keep Financial Records - repeat the steps 1-3 above with appropriate changes: enter Keep Financial Records policy name and specify 7 years time-range in the Keep For: box. 4. In the Policy Acts Upon field check the Everything (All Messages in Archive) box. 5. Click the Add: New Tag link in the Items tagged with: field and select the Financial tag from the drop-down list. Select the Either radio button to specify the tag value. Note that this field is visible only if the tags are defined within the Archive Manager system. For more information about tagging the items please refer to Archive Manager Administration Guide. 45

46 Quest Archive Manager To create the policy to delete records tagged "Sensitive" from the VPs' mailboxes after 6 months, perform the following: 1. Click Add a new: Delete Policy button at the bottom of the screen. 2. Click on the field next to the policy item number to enter the policy name - Delete VP - Sensitive Records. 3. Click on the arrow next to Policy Action to expand the view of the policy item and specify the time-range for the policy in the Delete After field. Click on the Months link and enter 6 in the box. 4. The message criteria settings are defined in the Policy Acts Upon fields. Click the Add: Group link in the Only Items within: and specify the group name - VP Marketing. While you type, a warning message is displayed. When you finish typing, the message disappears and a green check appears next to the group name to indicate that it exists within Archive Manager. 5. Repeat the above procedure for the VP Engineering and VP TechComm groups. 6. Click the Add: New Tag link in the Items Tagged with: field and select the Sensitive tag from the drop-down list. Select the True radio button to specify the tag value. Note that the groups are defined within the Archive Manager system. The Tag field is visible only if the tags are defined within the Archive Manager system. For more information about groups and tagging items please refer to Archive Manager Administration Guide. 46

47 Appendix A: Case Study To set a policy to keep the rest of VP records forever, perform the following: 1. Click Add a new: Keep Policy button at the bottom of the screen. 2. Click on the field next to the policy item number to enter the policy name - Keep VP Records Forever. 3. Click on the arrow next to Policy Action to expand the view of the policy item and specify the time-range for the policy - Select the Keep Forever radio button. 4. The message criteria settings are defined in the Policy Acts Upon fields. Click the Add: Group link in the Only Items within: and specify the group name - VP Marketing. While you type, a warning message is displayed. When you finish typing, the message disappears and a green check appears next to the group name to indicate that it exists within the Archive Manager. 5. Repeat the above procedure for the VP Engineering and VP TechComm groups. The groups are defined within the Archive Manager system. For more information about user groups please refer to the Archive Manager Administration Guide. The format of GroupWise mailboxes in the Retention Policy is "Tree\User". To delete web-transaction records (contained in the "SiteOrders" mailbox) after 3 years create the following policy: 1. Click Add a new: Delete Policy button at the bottom of the screen. 2. Click on the field next to the policy item number to enter the policy name - Delete Web transaction records. 47

48 Quest Archive Manager 3. Click on the arrow next to Policy Action to expand the view of the policy item and specify the time-range for the policy in the Delete After field. Click on the Years link and enter 3 in the box. 4. The message criteria settings are defined in the Policy Acts Upon fields. Click the Add: Mailbox link in the Only Items within: and specify the mailbox name - SiteOrders. While you type, a warning message is displayed. When you finish typing, the message disappears and a green check appears next to the mailbox name to indicate that it exists within the Archive Manager. The format of GroupWise mailboxes in the Retention Policy is "Tree\User". To Delete all messages from the archive after 7 years, create the policy repeating the steps 1-3 above with appropriate changes: enter Delete Everything After 7 years policy name and specify 7 years time-range in the Delete After: box. Check the Everything (All Messages in Archive) box in the Policy Acts Upon field. Now your policy set is created (see illustration on page following). After your policy set is created, click the link in the right bottom corner of the screen to save your changes. You can save each of the policy items by clicking this link, or define the policy-set first and then save it. 48

49 Appendix A: Case Study 49

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

2.0. Quick Start Guide

2.0. Quick Start Guide 2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

Quest ChangeAuditor 4.8

Quest ChangeAuditor 4.8 Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide

More information

7.5 7.5. Spotlight on Messaging. Evaluator s Guide

7.5 7.5. Spotlight on Messaging. Evaluator s Guide 7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Quick Connect Express for Active Directory

Quick Connect Express for Active Directory Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

8.7. Resource Kit User Guide

8.7. Resource Kit User Guide 8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under

More information

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Defender Delegated Administration. User Guide

Defender Delegated Administration. User Guide Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System

More information

Web Portal Installation Guide 5.0

Web Portal Installation Guide 5.0 Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Introduction to Version Control in

Introduction to Version Control in Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any

More information

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide Quest SQL Optimizer for SQL Server 6.5 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Foglight 1.0.0.0. Cartridge for Active Directory Installation Guide

Foglight 1.0.0.0. Cartridge for Active Directory Installation Guide Foglight 1.0.0.0 Cartridge for Active Directory Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

formerly Help Desk Authority 9.1.3 HDAccess User Manual

formerly Help Desk Authority 9.1.3 HDAccess User Manual formerly Help Desk Authority 9.1.3 HDAccess User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA

More information

Enterprise Single Sign-On 8.0.3

Enterprise Single Sign-On 8.0.3 For Internal Use Only Enterprise Single Sign-On 8.0.3 Additional Dedicated Server Instance Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary

More information

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Quest Collaboration Services 3.5. How it Works Guide

Quest Collaboration Services 3.5. How it Works Guide Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Foglight. Dashboard Support Guide

Foglight. Dashboard Support Guide Foglight Dashboard Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

ChangeAuditor 6.0. Web Client User Guide

ChangeAuditor 6.0. Web Client User Guide ChangeAuditor 6.0 Web Client User Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

Quick Connect for Cloud Services

Quick Connect for Cloud Services Quick Connect for Cloud Services Version 3.5 Administrator Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

New Features and Enhancements

New Features and Enhancements Dell Migration Manager for SharePoint 4.7 Build number: 4.7.20141207 December 9, 2014 These release notes provide information about the Dell Migration Manager for SharePoint release. New Features and Enhancements

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System

More information

Foglight. Managing Hyper-V Systems User and Reference Guide

Foglight. Managing Hyper-V Systems User and Reference Guide Foglight Managing Hyper-V Systems User and Reference Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Quest Collaboration Services 3.6.1. How it Works Guide

Quest Collaboration Services 3.6.1. How it Works Guide Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

8.7. Target Exchange 2010 Environment Preparation

8.7. Target Exchange 2010 Environment Preparation 8.7 Target Exchange 2010 Environment Preparation 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document

More information

DATA GOVERNANCE EDITION

DATA GOVERNANCE EDITION Quest One Identity Manager DATA GOVERNANCE EDITION 6.1 What s New 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

formerly Help Desk Authority 9.1.2 Quick Start Guide

formerly Help Desk Authority 9.1.2 Quick Start Guide formerly Help Desk Authority 9.1.2 Quick Start Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Dell One Identity Quick Connect for Cloud Services 3.6.0

Dell One Identity Quick Connect for Cloud Services 3.6.0 Dell One Identity Quick Connect for Cloud Services 3.6.0 August, 2014 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

6.7. Quick Start Guide

6.7. Quick Start Guide 6.7 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Foglight 5.5.5. Managing Microsoft Active Directory Installation Guide

Foglight 5.5.5. Managing Microsoft Active Directory Installation Guide Foglight 5.5.5 Managing Microsoft Active Directory 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide Foglight Foglight for Virtualization, Enterprise Edition 7.2 Virtual Appliance Installation and Setup Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected

More information

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server Foglight for SQL Server 5.6.4 Managing SQL Server Database Systems Getting Started Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer What s New 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide Foglight for Oracle Managing Oracle Database Systems Getting Started Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

FOR SHAREPOINT. Quick Start Guide

FOR SHAREPOINT. Quick Start Guide Quick Apps v6.2 FOR SHAREPOINT Quick Start Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Foglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server Foglight for SQL Server 5.6.5.2 Managing SQL Server Database Systems Getting Started Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell InTrust 11.0 Best Practices Report Pack

Dell InTrust 11.0 Best Practices Report Pack Complete Product Name with Trademarks Version Dell InTrust 11.0 Best Practices Report Pack November 2014 Contents About this Document Auditing Domain Controllers Auditing Exchange Servers Auditing File

More information

Dell One Identity Quick Connect for Cloud Services 3.6.1

Dell One Identity Quick Connect for Cloud Services 3.6.1 Dell One Identity Quick Connect for Cloud Services 3.6.1 March 2015 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Dell Statistica. Statistica Document Management System (SDMS) Requirements Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott

More information

Dell InTrust 11.0. Real-Time Monitoring Guide

Dell InTrust 11.0. Real-Time Monitoring Guide Dell InTrust 11.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated MMES - What Can and Cannot Be Migrated First Release - April 2015 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

More information

Security Explorer 9.5. User Guide

Security Explorer 9.5. User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Dell Client Profile Updating Utility 5.5.6

Dell Client Profile Updating Utility 5.5.6 Complete Product Name with Trademarks Version Dell 5.5.6 April 21, 2015 These release notes provide information about the Dell release. Welcome to What's New Known issues Upgrade and Compatibility System

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

NetVault LiteSpeed for SQL Server version 7.5.0. Integration with TSM

NetVault LiteSpeed for SQL Server version 7.5.0. Integration with TSM NetVault LiteSpeed for SQL Server version 7.5.0 Integration with TSM 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide

Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide Dedicated Directory Replication Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains

More information

Built-in Plug-ins User s Guide

Built-in Plug-ins User s Guide Quest NetVault Backup version 9.1 Built-in Plug-ins User s Guide Version: Product Number: NVG-129-9.1-EN-01 NVG-129-9.1-EN-01 05/10/13 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains

More information

Defender 5.7. Remote Access User Guide

Defender 5.7. Remote Access User Guide Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide March 2015 The Spotlight Management Pack for SCOM is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

ActiveRoles 6.8. Web Interface User Guide

ActiveRoles 6.8. Web Interface User Guide ActiveRoles 6.8 Web Interface User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Quest vworkspace Virtual Desktop Extensions for Linux

Quest vworkspace Virtual Desktop Extensions for Linux Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.

More information

Enterprise Reporter Report Library

Enterprise Reporter Report Library Enterprise Reporter Overview v2.5.0 This document contains a list of the reports in the Enterprise Reporter. Active Directory Reports Change History Reports Computer Reports File Storage Analysis Reports

More information

Quest Privilege Manager Console 1.1.1. Installation and Configuration Guide

Quest Privilege Manager Console 1.1.1. Installation and Configuration Guide Quest Privilege Manager Console 1.1.1 Installation and Configuration Guide 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Troubleshooting Guide 5.1. Quest Workspace ChangeBASE

Troubleshooting Guide 5.1. Quest Workspace ChangeBASE Troubleshooting Guide 5.1 Quest Workspace ChangeBASE [Type text] 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide Foglight Managing Java EE Systems Supported Platforms and Servers Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

10.2. Auditing Cisco PIX Firewall with Quest InTrust

10.2. Auditing Cisco PIX Firewall with Quest InTrust 10.2 Auditing Cisco PIX Firewall with Quest InTrust 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

6.7. Replication: Best Practices and Troubleshooting

6.7. Replication: Best Practices and Troubleshooting 6.7 Replication: Best Practices and Troubleshooting 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide

Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide Dell NetVault Backup Plug-in for 1.3 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Dell One Identity Manager 7.0. Help Desk Module Administration Guide

Dell One Identity Manager 7.0. Help Desk Module Administration Guide Dell 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book is furnished under a

More information

Dell Recovery Manager for Active Directory 8.6.0

Dell Recovery Manager for Active Directory 8.6.0 Dell Recovery Manager for Active Directory 8.6.0 April, 2014 These release notes provide information about the Recovery Manager for Active Directory release. About Recovery Manager for Active Directory

More information

Dell Spotlight on Active Directory 6.8.4. Deployment Guide

Dell Spotlight on Active Directory 6.8.4. Deployment Guide Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

5.5. Change Management for PeopleSoft

5.5. Change Management for PeopleSoft 5.5 Change Management for PeopleSoft 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Big Brother Professional Edition Windows Client Getting Started Guide. Version 4.60

Big Brother Professional Edition Windows Client Getting Started Guide. Version 4.60 Big Brother Professional Edition Windows Client Getting Started Guide Version 4.60 Copyright Quest Software, Inc. 2002 2011. All rights reserved. This guide contains proprietary information, which is protected

More information

ActiveRoles 6.9. Replication: Best Practices and Troubleshooting

ActiveRoles 6.9. Replication: Best Practices and Troubleshooting ActiveRoles 6.9 Replication: Best Practices and Troubleshooting 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell NetVault Backup Plug-in for SQL Server 6.1

Dell NetVault Backup Plug-in for SQL Server 6.1 Dell NetVault Backup Plug-in for SQL Server 6.1 April 2014 These release notes provide information about the Dell NetVault Backup Plug-in for SQL Server release. About Enhancements Resolved issues Known

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Object Level Authentication

Object Level Authentication Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required

More information

System Requirements and Platform Support Guide

System Requirements and Platform Support Guide Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Top 10 Most Popular Reports in Enterprise Reporter

Top 10 Most Popular Reports in Enterprise Reporter Top 10 Most Popular Reports in Enterprise Reporter Users Rely Most on Reports for Active Directory Security and Operations and File Server Migration Assessment Written by Alexey Korotich, Dell Software

More information