Intel Setup and Configuration Software (Intel SCS) Scalability Guidelines. Version 10.0
|
|
|
- Pierce Robinson
- 9 years ago
- Views:
Transcription
1 Intel Setup and Configuration Software (Intel SCS) Scalability Guidelines Version 10.0 Document Release Date: December 25, 2014
2 License Intel Setup and Configuration Software (Intel SCS) is furnished under license and may only be used or copied in accordance with the terms of that license. For more information, refer to the Exhibit A section of the Intel(R) SCS License Agreement.rtf, located in the Licenses folder. Legal Information No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this document. The products described may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Intel technologies may require enabled hardware, specific software, or services activation. Check with your system manufacturer or retailer. No computer system can be absolutely secure. Intel does not assume any liability for lost or stolen data or systems or any damages resulting from such losses. Intel AMT should be used by a knowledgeable IT administrator and requires enabled systems, software, activation, and connection to a corporate network. Intel AMT functionality on mobile systems may be limited in some situations. Your results will depend on your specific implementation. Learn more by visiting Intel Active Management Technology. Intel vpro Technology requires setup and activation by a knowledgeable IT administrator. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environment. Learn more at: KVM Remote Control (Keyboard, Video, Mouse) is only available with Intel Core i5 vpro and Core i7 vpro processors with integrated graphics and Intel Active Management technology activated. Discrete graphics are not supported. Intel, Intel vpro, and the Intel logo, are trademarks of Intel Corporation in the U.S. and/or other countries. Microsoft, Windows, and the Windows logo are trademarks, or registered trademarks of Microsoft Corporation in the U.S. and/or other countries. * Other names and brands may be claimed as the property of others Intel Corporation Intel SCS - Scalability Guidelines ii
3 Table of Contents 1 Introduction 1 2 Environment Variables 2 3 Scalability Example Data and Full Definitions Environment Setup Configuration Data Results Reconfiguration Data Results Unconfiguration Data Results Maintenance Data Results Maintenance Using the CLI Maintenance Using Jobs 14 4 Scalability Factors Geographical Locations Multiple Instances of RCS Synchronizing RCS Instances Load Balancing or Scripts RCSBusyRetryCount Parameter RCS Registry Settings MaxParallelAMTOperations TCPTimeout Server Maintenance Operations Backing up the RCS Data Archiving/Deleting the RCS Log Files Managing Expired Certificates 20 5 References 21 Intel SCS - Scalability Guidelines iii
4 1 Introduction 1 Introduction This document contains guidelines to help you plan a large scale deployment of Intel Active Management Technology (Intel AMT) using Intel Setup and Configuration Software (Intel SCS). Although the document is intended mainly for organizations that want to deploy tens of thousands of systems, it contains information that can also be helpful for smaller deployments. Intel SCS has been successfully deployed and used by several organizations that have more than 100,000 Intel AMT systems. Much of the knowledge and experience gained during these large scale deployments has been gathered and included in this document. In addition, during development of Intel SCS 10 we also setup and ran a series of scalability tests. Intel SCS 10.0 includes fixes and improvements to several issues that we identified during the scalability tests. This remainder of this document is divided into four sections. Section Environment Variables Scalability Example Data Scalability Factors References Details This section contains a checklist of questions that you need to answer about your environment. The checklist also contains important information that you need to take into consideration. This section contains the data we collected from our scalability tests. You can refer to this data for an indication of what to expect when configuring large amounts of systems. This section contains additional information that will help you to understand issues that are important when dealing with a large scale deployment. This section contains short descriptions about the terms used in this document, and references to where you can find more information in the documentation of Intel SCS. Assumptions Intel SCS includes many different components and options. The information included in this document assumes that you will: Install and use at least one instance of the Remote Configuration Service (RCS) Only use configuration/maintenance commands that are performed by the RCS. Specifically: The ConfigViaRCSOnly command The MaintainViaRCSOnly command Jobs (available in the Console when the RCS is installed in database mode) These assumptions are based on the fact that most organizations want to configure Intel AMT in Admin Control Mode. Configuring Admin Control Mode can only be done by the RCS. The guidelines in this document are intended to prevent the RCS from becoming a central point of failure when dealing with requests from thousands of systems. If the restrictions of Client Control mode are not a problem for your current requirements, then you can use the host-based configuration option of Intel SCS instead. The host-based configuration option does not require or use an RCS (so most the guidelines in this document are not relevant). Intel SCS - Scalability Guidelines 1
5 2 Environment Variables 2 Environment Variables The environment and requirements of every organization are different. But when planning a large deployment, there are some basic questions that you need to answer before you start to implement anything. Use the information and the questions in this table and apply it to your organization. Environment Variables Checklist 1 How many Intel AMT systems does your organization have? This is the first and most basic question for which you need an answer. This is because the number of Intel AMT systems will directly impact many of the other items described in this table. For example, it takes more time to configure 100,000 systems than it does to configure 10,000 systems. 2 What is the window of availability for the configuration of Intel AMT? Configuration of a large number of Intel AMT systems can take some time and can use several different types of network resources. Tasks that require the use of network resources are usually allocated specific periods or windows of availability during which they can use these network resources. The number and duration of these windows of availability in your organization is the first constraint that you need to take into consideration. To help you answer this question, these are the two parameters that you need to determine: 1. How many hours per week can you allocate to configuration of Intel AMT? 2. In how many weeks do you want to complete the configuration cycle? Note: You can configure Intel AMT even when the system is being used by the user. But, if you prefer to configure when the system is not in use, take this into consideration when determining the number of hours available. For example, are you restricted to overnight, or only weekends? After initial configuration, you will only need to reconfigure the systems if you want to make changes to the settings in Intel AMT. 3 What is the window of availability for scheduled maintenance of Intel AMT? After a system is configured, it is necessary to maintain and periodically update the configuration settings in the Intel AMT device. If you do not, your management console might lose connection with the Intel AMT device. Intel SCS includes methods to perform these maintenance tasks on Intel AMT. For descriptions of these tasks, see Maintenance Data Results on page 12. Maintenance tasks usually take less time and less network resources than configuration. But because maintenance tasks must be done regularly, you need to plan for your maintenance schedule. To help you answer this question, these are the parameters that you need to determine: 1. How many hours per week can you allocate to maintenance tasks of Intel AMT? 2. Based on your IT policies, what is the required maintenance cycle time for each task? For example, how often do you renew AD passwords or reissue certificates? 3. In how many weeks do you want to complete a full maintenance cycle? Note: Just like configuration, you can run maintenance tasks even when the system is being used by the user. Intel SCS - Scalability Guidelines 2
6 2 Environment Variables Environment Variables Checklist 4 How do you deploy the configuration/maintenance commands? Most of the methods used to configure/maintain Intel AMT are initiated using the Configurator component running on the host platform. The method that you use to deploy the Configurator and run these commands on tens of thousands of systems needs to be taken into consideration. This is important because sending configuration/maintenance commands to tens of thousands of Intel AMT systems simultaneously will almost certainly cause multiple failures and network overload. For example, task sequences of Microsoft* System Center Configuration Manager are sent out almost simultaneously (within approximately 15 minutes) to all target systems. Therefore, it is recommended to spread out the deployment time by targeting the task sequences on smaller collections, or using batch files with randomized delays. Whichever deployment method or management console you use, the goal is to avoid sending out mass configuration/maintenance commands to all your systems at the same time. Use the data that you collected in items #1, #2, and #3 to help you determine the best allocation and distribution of configuration and maintenance commands. Note: The /RCSBusyRetryCount parameter can also help to automatically spread out the load on the RCS when it is busy (see RCSBusyRetryCount Parameter on page 18). If you install the RCS in database mode (see item #6), you can use the Console to run reconfiguration and maintenance commands via the RCS using jobs. A job is an operation that you can run from the Console on a selected group of Intel AMT systems, defined using a filter. When a job starts, the RCS starts the operation simultaneously on the first 50 systems defined in the job. After 30 seconds, the RCS starts the operation on another set of systems (up to the maximum of 50 systems in parallel). This cycle continues until the operation is run on all systems in the job. Because the RCS automatically controls the number of simultaneous operations, this means that the possibility of network overload and failures is reduced. 5 Will you need more than one certificate per Intel AMT system? This variable is relevant only if you intend to configure any of these settings in Intel AMT: Transport Layer Security (TLS) Remote Access (to enable connection via a Management Presence Server) 802.1x Setups (for wired and/or wireless profiles) End-Point Access Control (EAC) All of the settings listed above require a certificate to be configured in Intel AMT. If you intend to configure more than one of these settings, will you be using the same certificate for each setting? Or do you intend to use a different certificate for each setting? Configuring a certificate in Intel AMT takes time. And, logically, configuring multiple certificates in each system will increase the time it takes for configuration. Note: Although there are four settings, you can only configure a maximum of three different certificates in Intel AMT (but you can use the same certificate for different settings.) Intel SCS - Scalability Guidelines 3
7 2 Environment Variables Environment Variables Checklist 6 Do you intend to install the RCS in database mode or non-database mode? The RCS can operate in one of two different modes (defined during installation): Non-Database Mode In this mode, the RCS does not store any data about Intel AMT systems Database Mode In this mode, data about each Intel AMT system is stored in an SQL database. This includes data that can be used to connect to the system and the admin password that was configured in the Intel AMT device. These different modes do not have any impact on the time that it takes the RCS to configure or maintain Intel AMT. But there are differences between the two modes that you should take into consideration. In both modes, the RCS keeps a log file that records all actions done by the RCS. The main purpose of this log file is for debugging problems with the RCS. It is not easy to use this log file to investigate the success or failure of configuration/maintenance commands on the systems. In non-database mode, no other data is available to help you with debugging. Analysis or investigation of the return status codes from configuration/maintenance commands must be done on the host platforms. But in database mode, the RCS stores an operations log in the database for each system. You can use the Console component of Intel SCS to view these operations logs per system. In database mode, the admin password configured in Intel AMT is stored in the database for each system. This means that the password configured for each system is always accessible (you can use the Console to view the admin password of each system). Having access to this password is even more important if you are using the option to create a random admin password for each system. (If the passwords are not stored in the database, they will be unknown to you or any application.) Using database mode will increase the traffic to your SQL Server. But database mode also includes several other options that can help you to monitor and maintain your systems. For example, you can use the Console to define and run maintenance Jobs on multiple systems and view discovery data collected from your systems. 7 Do you intend to publish data to the Intel SCS database? This variable is relevant only if you intend to install the RCS in database mode. Intel SCS includes several methods for discovering data about your platforms: System Discovery The Discovery Utility (SCSDiscovery.exe) and the Configurator can get detailed data about Intel AMT Platform Discovery The Platform Discovery Utility (PlatformDiscovery.exe) gets toplevel data about the hardware and software of supported Intel products that exist on your platforms Solution Discovery Some of the Intel products that are supported by the Solutions Framework component of Intel SCS have a host plugin. You can use some of these host plugins to get detailed data about the product. For example, the Intel SSD Pro Series plugin supports this option. When the RCS is installed in database mode, you can store the data collected by these components in the Intel SCS database. Storing this data in the Intel SCS database will require more hard disk space on the computer running the SQL Server that hosts the database. Intel SCS - Scalability Guidelines 4
8 2 Environment Variables Environment Variables Checklist 8 Do you need to use more than one Active Directory Organizational Unit (ADOU)? This variable is relevant only if both of these are true: You intend to integrate Intel AMT with the security infrastructure of your network's Active Directory. You have systems with disjointed hostnames in your organization. (A disjointed hostname occurs when the hostname in the Domain Name System (DNS) is not the same as the hostname assigned in the Windows operating system.) When integrated with AD, during configuration Intel SCS sends a request to the AD to create a Computer object representing the Intel AMT device. The object is stored in the ADOU that you define in the configuration profile. Most organizations store all these objects in the same ADOU specifically created for Intel AMT objects. But if you have disjointed hostnames in your organization, storing all Intel AMT objects in the same ADOU is not recommended. If you have disjointed hostnames, this means that when configuring Intel AMT you must: Make sure that the FQDN configured in the Intel AMT device can be resolved by the DNS in your network. (This requirement is always true, even if you do not have disjointed hostnames). Because the hostname in the OS is not the same as the DNS record, this means that you must define (in the configuration profile) one of the options that will construct the FQDN correctly. You can do this using the DNS Lookup FQDN option or using a dedicated network settings file. Make sure that Intel SCS uses the hostname in the operating system to create the AD object. This means that you must select the Always use the OS Host Name for the new AD Object option in the configuration profile. This combination of requirements means that the Common Name of the AD object will not be the same as the DNS record. This means that finding the correct object in the ADOU is only possible by searching the value of the DNSHostName property of the AD object. Unlike the Common Name property, the DNSHostname property is NOT indexed. This means that the more objects exist in the ADOU, the longer it will take to find the correct object. This increased time used for searching will increase the time required to complete any operations on Intel AMT that involve Kerberos authentication. To prevent this it is recommended to distribute the Intel AMT objects over a number of different ADOUs, and preferably locate these ADOUs on different domains. Note: You can only define one ADOU in each Intel AMT configuration profile. This means that if you want to store objects in different ADOUs, you will need to create a different profile for each ADOU. Then you also need to make sure that the correct systems are configured using the profile containing the correct ADOU. Depending on the AD topology (and regardless of the number of ADOUs you define), creating new AD objects takes time to replicate to all relevant servers. This means that Kerberos authentication will only succeed after replication has completed. Before trying any use case that uses Kerberos authentication, make sure that replication has completed. Intel SCS - Scalability Guidelines 5
9 3 Scalability Example Data 3 Scalability Example Data Providing concrete answers for expected configuration times of Intel AMT in a large scale deployment has always been problematic. This is mainly because creating a test environment with tens of thousands of real physical systems is just not possible. And running scalability testing on a real production environment is also not possible (who would agree to put their production environment at risk?). The alternative that we used for our scalability testing was to create a real physical network environment, but use virtual machines to emulate the Intel AMT systems. Each scalability test was run against an increasing number of these emulator systems (10,000; 20,000; 50,000 and 100,000). Using emulators creates a different problem. Emulators do not have a physical Intel AMT device. This means that the time it takes to communicate with Intel AMT on a physical system is not accounted for when using emulators. To counter this problem, we ran additional tests on 50 physical systems to get the average time used to communicate with Intel AMT. We then added this average time as a programmed delay in the emulators. Although this cannot provide 100% accuracy, it means that the data produced by the scalability tests using emulators is much closer to the expected results from physical systems. Note: The scalability tests were run on one specific network environment setup. Network environments can vary in almost every one of many, many different parameters. The data returned by these tests can only be an indication of what you might expect in your own network environment. For background information about the setup used to run the scalability tests, see: and Full Definitions on the next page Environment Setup on page 8 To go straight to the results, see: Configuration Data Results on page 9 Reconfiguration Data Results on page 10 Unconfiguration Data Results on page 11 Maintenance Data Results on page 12 Intel SCS - Scalability Guidelines 6
10 3 Scalability Example Data 3.1 and Full Definitions Intel AMT supports a lot of different settings and options that you can define in the configuration profile. It would be impractical (and unnecessary) to run scalability tests on every single combination of these settings and options. Instead, we created two different profiles: This profile contained the basic settings that most organizations would probably be interested in configuring. Full This profile contained every possible setting and option, with most options containing the maximum permitted number of entries. Probably no organization would want or need to configure Intel AMT with all these settings. This profile was created to test the worst case scenario for configuration times and other parameters. This table compares the contents of the and the Full profiles used during the scalability testing. Setting Full Active Directory Integration Yes Yes Access Control List 1 Active Directory User 7 Digest Users 32 Active Directory Users Home Domains No 5 Home Domains Remote Access No 2 Management Presence Servers 2 Remote Access Policies Trusted Root Certificates No 1 trusted root certificate Transport Layer Security (TLS) Yes Yes Mutual TLS No Yes WiFi Setups No 15 WiFi setups 802.1x Setups No Yes End-Point Access Control (EAC) No Yes Certificates 1 certificate (for TLS) 3 different certificates Network Settings Both profiles contained the default settings: FQDN will be the same as the Primary DNS FQDN IP will be taken from DHCP System Settings Both profiles contained the default settings defined in the System Settings window of the profile. (Changing these settings in the profile has a negligible impact on configuration times.) Intel SCS - Scalability Guidelines 7
11 3 Scalability Example Data 3.2 Environment Setup Every organization has different hardware and software setups on the Servers that they use in their network. It would be impossible to run scalability tests for all these types of setups. The supported operating systems (for the RCS) and SQL Server versions (for database mode) are listed in the Intel(R)_SCS_User_Guide.pdf. Although Intel SCS does not specify any specific hardware requirements, you should carefully select the Server(s) that will run the RCS instance(s). The RCS will obviously benefit from having a strong CPU configuration and a large amount of RAM. This table describes the setups of the Servers that were used during the scalability testing. Component Setup of the Computer Running the Component RCS Operating system: Windows Server 2008 R2 CPU: 8 logical processors Intel Xeon 2.33GHz 2.33 GHz (2 processors) RAM Memory: 16 GB Hard Disk: 136 GB AD Domain Controller Operating system: Windows Server 2008 x64 CPU: 4 logical processors Intel Xeon 2.50GHz 2.74 GHz (4 processors) RAM Memory: 4 GB Hard Disk: 30 GB Active Directory Version: 2008 Certification Authority Operating system: Windows Server 2008 x64 CPU: 2 logical processors Intel Xeon 2.50GHz 2.52 GHz (2 processors) RAM Memory: 1 GB Hard Disk: 30 GB CA Type: Enterprise 2008 R2 SQL Server Operating system: Windows Server 2008 x64 CPU: 2 logical processors Intel Xeon 2.50GHz 2.64 GHz (2 processors) RAM Memory: 4 GB Hard Disk: 66 GB SQL Server Version: Microsoft SQL Server 2012 Enterprise Intel SCS - Scalability Guidelines 8
12 3 Scalability Example Data 3.3 Configuration Data Results 10,000 Systems 20,000 Systems 50,000 Systems 100,000 Systems Full Full Full Full Average configuration time per system (seconds) Total configuration time (hours) Maximum RAM memory usage on the computer running the RCS Maximum simultaneous RCS threads* Maximum parallel calls to AD* Maximum parallel calls to the CA* Total transactions to the database Disk usage of RCS log files Disk usage of Intel SCS database MB 236 MB 222 MB 236 MB 226 MB 248 MB 227 MB 245 MB MB 650 MB 845 MB 1.26 GB 2.1 GB 3.19 GB 4.13 GB 5.42 GB 11 MB 31 MB 23 MB 68 MB 143 MB 168 MB 283 MB 342 MB * These parameters are controlled by the value of a configurable RCS setting. In this example, the default setting of 200 was used. For more information, see MaxParallelAMTOperations on page 19. Intel SCS - Scalability Guidelines 9
13 3 Scalability Example Data 3.4 Reconfiguration Data Results 10,000 Systems 20,000 Systems 50,000 Systems 100,000 Systems Full Full Full Full Average reconfiguration time per system (seconds) Total reconfiguration time (hours) Maximum RAM memory usage on the computer running the RCS Maximum simultaneous RCS threads* Maximum parallel calls to AD* Maximum parallel calls to the CA* Total transactions to the database Disk usage of RCS log files Disk usage of Intel SCS database MB 207 MB 198 MB 207 MB 216 MB 217 MB 222 MB 212 MB MB 719 MB 863 MB 1.38 GB 2.1 GB 3.51 GB 4.31 GB 7.03 GB 11 MB 15 MB 23 MB 33 MB 51 MB 73 MB 115 MB 147 MB * These parameters are controlled by the value of a configurable RCS setting. In this example, the default setting of 200 was used. For more information, see MaxParallelAMTOperations on page 19. Intel SCS - Scalability Guidelines 10
14 3 Scalability Example Data 3.5 Unconfiguration Data Results 10,000 Systems 20,000 Systems 50,000 Systems 100,000 Systems Full Full Full Full Average unconfiguration time per system (seconds) Total unconfiguration time (hours) Maximum RAM memory usage on the computer running the RCS Maximum simultaneous RCS threads* Maximum parallel calls to AD* Maximum parallel calls to the CA* Total transactions to the database MB 197 MB 198 MB 195 MB 208 MB 238 MB 205 MB 206 MB Disk usage of RCS log files 80 MB 80 MB 161 MB 142 MB 400 MB 403 MB 790 MB 727 MB Disk usage of Intel SCS database 8 MB 8 MB 17 MB 17 MB 42 MB 41 MB 84 MB 86 MB * These parameters are controlled by the value of a configurable RCS setting. In this example, the default setting of 200 was used. For more information, see MaxParallelAMTOperations on page 19. Intel SCS - Scalability Guidelines 11
15 3 Scalability Example Data 3.6 Maintenance Data Results You can use Intel SCS to perform these maintenance tasks on Intel AMT: Synchronizing the Clock The Intel AMT device contains a clock that operates independently from the clock in the host operating system. For devices configured to use Kerberos authentication, it is important to synchronize the device clock with the clock of a computer in the network. When the clock is not synchronized, Kerberos authentication with the device might fail. For Kerberos enabled devices, Intel recommends to synchronize the clock at two week intervals. Synchronizing Network Settings After configuration, the Intel AMT device contains IP and FQDN settings that management consoles use to connect to the device. Changes in the network environment or the host operating system might make it necessary to change the settings in the device. Reissuing Certificates The certificates configured in Intel AMT (for TLS, EAC, Remote Access, or 802.1x) are only valid for a specified time. These certificates must be reissued before they expire. Intel recommends that you schedule this maintenance task to run a minimum of 30 days before the certificate expiration date. Replacing Active Directory Object Passwords If an Intel AMT device is configured to use Active Directory (AD) Integration, an object is created in the AD Organizational Unit specified in the profile. The object contains a password that is set automatically (not user defined). If the ADOU has a maximum password age password policy defined in AD, the password must be replaced before it expires. Intel recommends that you schedule this maintenance task to start a minimum of 10 days before the password is set to expire. Changing the Default Admin Password For increased security, it is recommended to change the password of the default Digest admin user (of Intel AMT) at regular intervals. Intel SCS includes two different methods for running maintenance tasks on Intel AMT: Using the CLI The maintenance request is sent by the Configurator from the system to the RCS. Using Jobs This option is available from the Console, but only when the RCS is installed in database mode. You can use either of these methods to run any of the maintenance tasks separately, or all of the maintenance tasks together. For more information about maintenance tasks, refer to the Maintenance Policies for Intel AMT section of the Intel(R)_SCS_User_Guide.pdf. For the scalability testing, we ran three separate tests for each of these maintenance methods. One test was to perform all maintenance tasks. And the other two tests were to renew the AD password (of the Intel AMT AD object) and renew the certificates configured in Intel AMT. Note: The results tables contain results for 1,000 systems. This is because when running maintenance tasks, most of the values remain more or less the same regardless of the number of systems. For example, running maintenance on 10,000 or 100, 000 systems does not significantly increase the maximum amount of RAM used by the RCS. The values that do increase according to the number of systems (total time, disk usage of RCS log files, and disk usage of the Intel SCS database) increase in almost linear increments. For these values, simply multiply the value in the table by the number of thousands of systems (for example, for 10,000 systems, multiply by 10). Intel SCS - Scalability Guidelines 12
16 3 Scalability Example Data Maintenance Using the CLI All Maintenance Tasks (1,000 Systems) Renew AD Password Only (1,000 Systems) Renew Certificates Only (1,000 Systems) Full Full Full Average time per system (seconds) Total time (seconds) Maximum RAM memory usage on the computer running the RCS Maximum simultaneous RCS threads* Maximum parallel calls to AD* Maximum parallel calls to the CA* Total transactions to the database 177 MB 193 MB 176 MB 188 MB 177 MB 211 MB Disk usage of RCS log files 42 MB 65 MB 42 MB 65 MB 41 MB 65 MB Disk usage of Intel SCS database 1.02 MB 1.34 MB 0.96 MB 1.34 MB 1.06 MB 1.34 MB * These parameters are controlled by the value of a configurable RCS setting. In this example, the default setting of 200 was used. For more information, see MaxParallelAMTOperations on page 19. Intel SCS - Scalability Guidelines 13
17 3 Scalability Example Data Maintenance Using Jobs All Maintenance Tasks (1,000 Systems) Renew AD Password Only (1,000 Systems) Renew Certificates Only (1,000 Systems) Full Full Full Average time per system (seconds) N/A N/A N/A N/A N/A N/A Total time (seconds) Maximum RAM memory usage on the computer running the RCS Maximum simultaneous RCS threads* Maximum parallel calls to AD* Maximum parallel calls to the CA* Total transactions to the database 58 MB 61 MB 62 MB 62 MB 56 MB 62 MB Disk usage of RCS log files 41 MB 65 MB 42 MB 65 MB 43 MB 66 MB Disk usage of Intel SCS database 0.90 MB 1.28 MB 1.02 MB 1.34 MB 0.96 MB 1.34 MB * These parameters are controlled by the value of a configurable RCS setting. In this example, the default setting of 200 was used. For more information, see MaxParallelAMTOperations on page 19. Note: As you can see from these results, running maintenance tasks using jobs takes more time than running maintenance tasks using the CLI. This is because the RCS automatically controls the number of simultaneous maintenance operations. Although using jobs take more time, it is one of the methods you can use to reduce the possibility of network overload and failures (see item #4 in the checklist of Environment Variables on page 2). Intel SCS - Scalability Guidelines 14
18 4 Scalability Factors 4 Scalability Factors This section describes additional information that will help you to plan your deployment. 4.1 Geographical Locations When selecting on which computer to install the RCS, make sure that you take into consideration the physical distances that exist between your network infrastructure components. Although average network speeds are much higher than they were in the past, the distances that network traffic needs to travel is still a scalability factor. In addition to communicating with each Intel AMT system, the RCS also needs to communicate with several other network components (for example DNS, AD, CA, etc.). Obviously, the closer that the RCS is located to the Intel AMT systems and these network components, the faster configuration/maintenance will complete. If your organization has multiple sites spread around the globe, the considerations that you used when defining your network infrastructure can also be applied when deciding where to install the RCS. For example, many organizations create sub networks for major geographic locations (USA, Europe, Asia, etc.) with each sub network having its own local network server infrastructure for DNS, AD, CA, etc. In a situation like this, it makes sense to install an instance of the RCS in each sub network. Each instance of the RCS would configure/maintain the systems that are managed using the network components in their sub network. 4.2 Multiple Instances of RCS As you can see from the tables in the Scalability Example Data section, a single instance of the RCS is capable of configuring and maintaining 100,000 Intel AMT systems. But when dealing with such large numbers of systems, it is usually recommended (or often necessary) to install multiple instances of the RCS. As described in the previous sections, these are the main parameters that you will use to decide how many instances of RCS you need to install: 1. The total number of Intel AMT systems in your organization. 2. The window of availability for configuration/maintenance of Intel AMT (see items #2 and #3 in Environment Variables on page 2). 3. The total estimated time it will take to configure/maintain Intel AMT (see the tables in Scalability Example Data on page 6). Note: The /RCSBusyRetryCount parameter can also help to automatically spread out the load on the RCS when it is busy (see RCSBusyRetryCount Parameter on page 18). These sections include information that is important to understand when using multiple RCS instances: Synchronizing RCS Instances on the next page Load Balancing or Scripts on page 17 Intel SCS - Scalability Guidelines 15
19 4 Scalability Factors Synchronizing RCS Instances Each instance of the RCS is a totally separate entity and does not know of the existence of other RCS instances. This also means that each RCS handles its own data storage and cannot access data stored by a different instance of the RCS. Where data is stored depends on the installation mode that you select: Non-database Mode Configuration profiles are stored in an XML file (.xml) on the computer running the RCS. Database Mode All data is stored in the specific SQL Server database that was created for Intel SCS during installation of the specific RCS instance. This means, of course, that in this mode you will need to create a separate SQL database for each instance of the RCS. Each database will only contain data about the Intel AMT systems that were configured by the instance of the RCS connected to that instance of the database. The Console component includes an option to connect to the different instances of the RCS. (It is not necessary to install multiple Consoles. You can use the same Console and switch between the different instances of the RCS/database.) Intel SCS does not currently include any built-in options or capabilities for synchronizing data between the different instances of the RCS. But there are only two types of data that you might want to synchronize: Configuration s You only need to synchronize the configuration profiles if you need to make sure that all profiles in all instances of the RCS contain the same settings. For example, if you are using a Load Balancer, you must synchronize the configuration profiles regularly (see Load Balancing or Scripts on the next page). But if you are using a script to channel requests to specific RCS instances, you probably do not need to synchronize profiles. You just need to make sure that each RCS instance contains the correct profiles for the systems from which configuration requests will be sent. Digest Master Password The configuration profile includes an option to define the Digest admin password of Intel AMT using a Digest Master Password (DMP). When using this option, the RCS calculates a different (unique) password for each device using a secret key (the DMP). The DMP is defined for each RCS via the Console in Tools > Settings > Security Settings. If you use this option, it is recommended to define the same DMP in each instance of the RCS and keep them synchronized. By using the same DMP in all instances of the RCS, you will enable all instances of the RCS to communicate with all your Intel AMT systems. (When using this option with a Load Balancer, you must keep the DMP synchronized.) Intel SCS - Scalability Guidelines 16
20 4 Scalability Factors Load Balancing or Scripts This table describes two methods that you can use to channel configuration and maintenance requests to the RCS instances. Using a Load Balancer Using a Script When using this method, the Load Balancer automatically decides which RCS will process the requests. This means that you have no control over which RCS will process configuration and maintenance requests sent from a system. Using this method means that you must make sure that each instance of the RCS has the exact same copies of profiles as all the other instances. Failure to maintain synchronization of the profiles will result in systems being configured with incorrect settings, or even failure of configuration and maintenance requests. For these reasons, this method is NOT recommended if either of these are true: Using this method gives you complete control over which RCS will process requests from a specific system. For example, you can create a script to check in which domain the system is located and then route the request to the closest RCS. In database mode, using this method also means that you can control in which instance of the Intel SCS database a specific system will be stored. You are using database mode You want to split control of systems according to separate geographical locations Intel SCS - Scalability Guidelines 17
21 4 Scalability Factors 4.3 RCSBusyRetryCount Parameter The ConfigureViaRCSOnly and MaintainViaRCSOnly commands include a parameter named /RCSBusyRetryCount. This parameter defines the number of times to resend the request to the RCS if the RCS returns a status of busy. You can define a maximum number of 100 retries. This retry mechanism creates random sleep periods of between 30 and 270 seconds before sending each new request. Using this parameter is highly recommended since the random sleep periods will also help to automatically spread out the load on the RCS when it is busy. 4.4 RCS Registry Settings When you install the RCS, several RCS settings are stored in the registry of the computer on which the RCS is installed. For Intel SCS 10, the registry settings are stored in this location: 32-bit operating systems: HKLM\SOFTWARE\Intel\ Intel(R) Setup and Configuration Software\10\RCS\GeneralSettings 64-bit operating systems: HKLM\SOFTWARE\Wow6432Node\Intel\ Intel(R) Setup and Configuration Software\10\RCS\GeneralSettings Two of these settings are parameters that you can change (if necessary) to make adjustments to how the RCS operates. For more information, see: MaxParallelAMTOperations on the next page TCPTimeout on the next page Note: It is not recommended to make any changes to the RCS settings directly in the registry. Instead, you can configure them via the Console in Tools > Settings (except for MaxParallelAMTOperations). You can also change the values of these settings using the WMI method SetRCSServiceSettings in the RCS API class RCS_Admin_RemoteConfigurationService. Documentation for the RCS API methods and classes is available in the download package of the Software Development Kit of Intel SCS (also available from the Intel SCS website). Intel SCS - Scalability Guidelines 18
22 4 Scalability Factors MaxParallelAMTOperations The MaxParallelAMTOperations setting determines the maximum number of operations that can be performed concurrently by the RCS. These operations include configuration, unconfiguration, and maintenance requests sent to the RCS by the Configurator. The default value is 200 parallel operations. (Minimum value: 10. Maximum value: 5000.) The value of this setting also defines The maximum parallel calls to AD The maximum parallel calls to the CA So, with the default setting of 200, the maximum number of parallel calls to the AD and the CA (when applicable) is also 200. It is only recommended to change this setting in these situations: Reduce the value if your CA or AD is a bottleneck and cannot handle 200 parallel calls from the RCS (or you just want to lower the limit). Increase the value if the computer on which you are running the RCS can handle a higher amount of parallel operations (and also the CA/AD). For the RCS, the factors that limit how much you can increase this value are the number of CPUs and the amount of RAM memory. Note: This parameter is not relevant when using jobs (because when using jobs, the RCS automatically controls the number of simultaneous operations). If you want to change this value directly in the registry, you must first stop the RCS windows service. (This is not necessary if you change the value using the WMI command.) TCPTimeout The RCS communicates with the Intel AMT device using the Transmission Control Protocol (TCP). During communication, if the device does not answer within a specified time the RCS cancels the communication. The default TCPTimeout setting is 10 seconds. This is usually enough time for the device to respond. But if traffic over your network is slow, or the RCS is located far away from the systems, you can increase this value. Valid values: 10 to 80 seconds. Note: You can change this setting via the Console (in Tools > Settings > Configuration Options). A large TCPTimeout value can cause configuration/maintenance tasks to take longer than usual. Intel SCS - Scalability Guidelines 19
23 4 Scalability Factors 4.5 Server Maintenance Operations This section describes some tasks that you need to manage on some of the computers running components used by Intel SCS Backing up the RCS Data The type of installation you selected causes the RCS to store data in files or in an SQL database. If one of the data files or database tables is damaged or missing, the RCS cannot operate correctly. Thus, it is important to make a regular backup. (If you need to restore data from a backup, make sure that you stop the RCS first. After the data is restored, restart the RCS.) If you installed RCS in: Database Mode Schedule a regular backup of the database in SQL Server. Non-Database Mode Make regular backups of the data files and store them in a secure location. You can use any backup method or application that will let you recover the data files when necessary. In this mode, the data files are located on the computer running the RCS. For more information about the files and their location, refer to the Backing up Data section in the Intel(R)_SCS_User_Guide.pdf. Note: You must also make sure that you keep backup copies of the storage keys (and their passwords) that are generated for each Intel SCS database that you create Archiving/Deleting the RCS Log Files The log files of the RCS are located in a folder named RCSConfServer in one of these hidden locations: ProgramData\Intel_Corporation Documents and Settings\All Users\Application Data\Intel_Corporation The log file is named RCSLog.log and records all operations and actions done by the RCS. Each time the log file becomes too large, or the RCS is restarted, the file content is moved to a new file with this format: RCSLog.logYYYY-MM-DD-HH-MI-SS.log. As you can see from the tables in the Scalability Example Data section, when configuring large numbers of systems, these log files can start to occupy a lot of space on the hard disk. Intel SCS does not currently include an option to automatically delete these log files. This means that you will need to decide how and when you want to archive or delete old log files. For example, you could run a script every month to delete or archive log files that are more than a month old Managing Expired Certificates Intel SCS does not revoke expired certificates. This means that you will need to manage the certificates in the certificate store of the computer running the Certification Authority. Intel SCS - Scalability Guidelines 20
24 5 References 5 References Detailed background information about Intel AMT and all Intel SCS options is described in the Intel(R)_SCS_User_Guide.pdf. In particular, it is recommended to refer to the Getting Started Checklist in the Prerequisites section. This table is a quick reference for some of the main terms used in this document, and where you can find more information about them. Term Configurator Console Control Modes Description A small executable (ACUConfig.exe) located in the Configurator folder of the Intel SCS download package. You run the Configurator locally on each Intel AMT system. You can use the Configurator to configure and maintain the system locally or send the configuration/maintenance request to the RCS. For more information, refer to the Using the Configurator" section of the user guide. The user interface to the RCS. You can use the Console to create and edit configuration profiles for supported Intel products and capabilities. In database mode, the Console also lets you view data about Intel products that was sent to the RCS. Additional options for Intel AMT are also available only in database mode. These options include monitoring Intel AMT systems and creating and running Jobs on multiple Intel AMT systems. After configuration, Intel AMT is placed into one of these modes: Admin Control Mode Client Control Mode Client Control mode has some built-in security related limitations. The main limitation of this mode is that the User Consent feature is mandatory. User Consent means that redirection operations and changes to the boot process are only allowed if the end user of the computer agrees (by supplying a code). In Admin Control mode you can turn the User Consent feature on or off. Host-based configuration can only configure Intel AMT into Client Control mode. Configuration into Admin Control mode can only be performed by the RCS. For more information, refer to the Control Modes and User Consent sections of the user guide. Intel SCS - Scalability Guidelines 21
25 5 References Term Host-based Configuration Description One of the configuration methods used to configure Intel AMT. When using this method, the Configurator performs the configuration locally on the system. When necessary, communications with the AD and CA are performed by the Configurator directly from the system. Note: Intel SCS supports several different configuration methods. For more information, refer to the Configuration Methods and Intel AMT Versions section of the user guide. The guidelines in this document are relevant when using the RCS and the Remote Configuration methods. For more information, refer to the Configuring Systems using the RCS section of the user guide. Jobs RCS An operation that you can run from the Console on a selected group of Intel AMT systems, defined using a filter. For more information, refer to the About Jobs and Operations section of the user guide. A Windows based service that runs on a computer in the network. The RCS processes configuration and maintenance requests sent from the systems by the Configurator. The installer for the RCS (and the Console) is located in the RCS folder of the Intel SCS download package. For more information, refer to the Setting up the RCS section of the user guide. Intel SCS - Scalability Guidelines 22
Intel Setup and Configuration Software (Intel SCS) User Guide. Version 9.0
Intel Setup and Configuration Software (Intel SCS) User Guide Version 9.0 Document Release Date: October 31, 2013 License Intel Setup and Configuration Software (Intel SCS) is furnished under license and
Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems
WHITE PAPER Intel vpro Technology Embedded Host-based Configuration in Intelligent Systems Easy activation of Intel vpro technology remote manageability without trade-offs in security, functionality, and
Intel AMT Configuration Utility. User Guide. Version 8.2
Intel AMT Configuration Utility User Guide Version 8.2 Document Release Date: March 7, 2013 License Intel Setup and Configuration Software (Intel SCS) is furnished under license and may only be used or
Intel Setup and Configuration Software (Intel SCS) Release Notes. Version 9.0
Intel Setup and Configuration Software (Intel SCS) Release Notes Version 9.0 Document Release Date: October 31, 2013 License Intel Setup and Configuration Software (Intel SCS) is furnished under license
Netwrix Auditor for Exchange
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
VMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Intel Active Management Technology with System Defense Feature Quick Start Guide
Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine
E2E Complete 4.0. Requirements
E2E Complete 4.0 Requirements January 2016 Table of Contents Section 1. Introduction... 3 Section 2. Prerequisites... 3 2.1 Hardware Prerequisites... 3 2.2 Software Prerequisites... 3 2.3 Account Requirements...
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
Remote Support Jumpoint Guide: Unattended Access to Computers in a Network 3. Requirements and Considerations to Install a Jumpoint 4.
Jumpoint Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective owners.
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
Planning Domain Controller Capacity
C H A P T E R 4 Planning Domain Controller Capacity Planning domain controller capacity helps you determine the appropriate number of domain controllers to place in each domain that is represented in a
NetWrix USB Blocker Version 3.6 Quick Start Guide
NetWrix USB Blocker Version 3.6 Quick Start Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Getting Started...5 3.1.
About Recovery Manager for Active
Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System
vcenter Chargeback User s Guide vcenter Chargeback 1.0 EN-000186-00
vcenter Chargeback 1.0 EN-000186-00 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Quick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
Tivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide
Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Note Before using this information and the product
Server Installation Manual 4.4.1
Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:
Netwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
NetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
Dell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration
Intel vpro Technology How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Document Release Date: September 14, 2012 Revision History Revision Revision History
QuickStart Guide vcenter Server Heartbeat 5.5 Update 2
vcenter Server Heartbeat 5.5 Update 2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2
DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...
Type Message Description Probable Cause Suggested Action. Fan in the system is not functioning or room temperature
Table of Content Error Messages List... 2 Troubleshooting the Storage System... 3 I can t access the Manager... 3 I forgot the password for logging in to the Manager... 3 The users can t access the shared
Network device management solution
iw Management Console Network device management solution iw MANAGEMENT CONSOLE Scalability. Reliability. Real-time communications. Productivity. Network efficiency. You demand it from your ERP systems
Comparing the Network Performance of Windows File Sharing Environments
Technical Report Comparing the Network Performance of Windows File Sharing Environments Dan Chilton, Srinivas Addanki, NetApp September 2010 TR-3869 EXECUTIVE SUMMARY This technical report presents the
Adaptive Log Exporter Users Guide
IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,
SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks
SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the
AdminToys Suite. Installation & Setup Guide
AdminToys Suite Installation & Setup Guide Copyright 2008-2009 Lovelysoft. All Rights Reserved. Information in this document is subject to change without prior notice. Certain names of program products
WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES
BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES WEBTITAN CLOUD User Identification Guide This guide explains how to install and configure the WebTitan Cloud Active Directory components required
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
Multi-Tenant Scalability Guidance for Exchange Server 2010 Service Pack 2
Multi-Tenant Scalability Guidance for Exchange Server 2010 Service Pack 2 Customer Advisory Team Exchange Product Group Microsoft Corporation December 2011 Contents Introduction... 3 Scalability Guidance...
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
NETWRIX CHANGE NOTIFIER
NETWRIX CHANGE NOTIFIER FOR SQL SERVER QUICK-START GUIDE Product Version: 2.6.194 February 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute
System Requirements and Prerequisites
System Requirements and Prerequisites for the Sage 200 Suite v2011 SP5 Copyright statement Sage (UK) Limited, 2012. All rights reserved. If this documentation includes advice or information relating to
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES
CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES TECHNICAL ARTICLE November/2011. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
Getting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)
MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking
FileMaker Server 7. Administrator s Guide. For Windows and Mac OS
FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
Revit products will use multiple cores for many tasks, using up to 16 cores for nearphotorealistic
Autodesk Revit 2013 Product Line System s and Recommendations Autodesk Revit Architecture 2013 Autodesk Revit MEP 2013 Autodesk Revit Structure 2013 Autodesk Revit 2013 Minimum: Entry-Level Configuration
MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
Netwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Administration Guide
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Administration Guide Published: 2010-06-16 SWDT487521-1041691-0616023638-001 Contents 1 Overview: BlackBerry Enterprise
What s New in Ghost Solution Suite 3.0
What s New in Ghost Solution Suite 3.0 This document highlights some of the most impactful new features of Ghost Solution Suite 3.0 For more comprehensive information, please view the Ghost Solution Suite
Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13
Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13 The information contained in this guide is not of a contractual nature and may be subject to change without prior notice. The software described in this
Symantec Virtual Machine Management 7.1 User Guide
Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide The software described in this book is furnished under a license agreement and may be used only in
VMware vsphere Data Protection 6.1
VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
About Parallels Desktop 10 for Mac
About Parallels Desktop 10 for Mac Parallels Desktop 10 for Mac is a major upgrade to Parallels award-winning software for running Windows on a Mac. About this Update This update for Parallels Desktop
insync Installation Guide
insync Installation Guide 5.2 Private Cloud Druva Software June 21, 13 Copyright 2007-2013 Druva Inc. All Rights Reserved. Table of Contents Deploying insync Private Cloud... 4 Installing insync Private
Autodesk Revit 2016 Product Line System Requirements and Recommendations
Autodesk Revit 2016 Product Line System Requirements and Recommendations Autodesk Revit 2016, Autodesk Revit Architecture 2016, Autodesk Revit MEP 2016, Autodesk Revit Structure 2016 Minimum: Entry-Level
NetIQ Directory and Resource Administrator NetIQ Exchange Administrator. Installation Guide
NetIQ Directory and Resource Administrator NetIQ Exchange Administrator Installation Guide August 2013 Legal Notice NetIQ Directory and Resource Administrator is protected by United States Patent No(s):
Citrix EdgeSight for Load Testing Installation Guide. Citrix EdgeSight for Load Testing 3.5
Citrix EdgeSight for Load Testing Installation Guide Citrix EdgeSight for Load Testing 3.5 Copyright Use of the product documented in this guide is subject to your prior acceptance of the End User License
Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools
Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10
LabTech Commands COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 Overview Commands in the LabTech Control Center send specific instructions
SQL Server 2008 - Express Edition 8-April-2014
SQL Server 2008 - Express Edition 8-April-2014 SQL Server 2008 - Express Edition Publication Information 2014 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers
Veeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
Objectives. At the end of this chapter students should be able to:
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
How to Test Out Backup & Replication 6.5 for Hyper-V
How to Test Out Backup & Replication 6.5 for Hyper-V Mike Resseler May, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication
How to Install MS SQL Server Express
How to Install MS SQL Server Express EventTracker v8.x Publication Date: Jun 8, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide helps users to install
NTP Software QFS for NAS, Hitachi Edition
NTP Software QFS for NAS, Hitachi Edition Installation Guide Revision 2.4 - July 2015 This guide details the method for the installation and initial configuration of NTP Software QFS for NAS, Hitachi Edition,
Installation & Configuration Guide
Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.
Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS
Deployment Guide AX Series with Active Directory Federation Services 2.0 and Office 365
Deployment Guide AX Series with Active Directory Federation Services 2.0 and Office 365 DG_ADFS20_120907.1 TABLE OF CONTENTS 1 Overview... 4 2 Deployment Guide Overview... 4 3 Deployment Guide Prerequisites...
Virtual Appliance Installation Guide
> In This Chapter Document: : Installing the OpenManage Network Manager Virtual Appliance 2 Virtual Appliance Quick Start 2 Start the Virtual Machine 6 Start the Application 7 The Application is Ready
How To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
Operating System Installation Guide
Operating System Installation Guide This guide provides instructions on the following: Installing the Windows Server 2008 operating systems on page 1 Installing the Windows Small Business Server 2011 operating
Deploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Propalms TSE Deployment Guide
Propalms TSE Deployment Guide Version 7.0 Propalms Ltd. Published October 2013 Overview This guide provides instructions for deploying Propalms TSE in a production environment running Windows Server 2003,
Mediasite EX server deployment guide
Mediasite EX server deployment guide 2008 Sonic Foundry, Inc. All rights reserved. No part of this document may be copied and/or redistributed without the consent of Sonic Foundry, Inc. Additional copies
Table of Contents. FleetSoft Installation Guide
FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating
AppSense Environment Manager. Enterprise Design Guide
Enterprise Design Guide Contents Introduction... 3 Document Purpose... 3 Basic Architecture... 3 Common Components and Terminology... 4 Best Practices... 5 Scalability Designs... 6 Management Server Scalability...
Oracle Virtual Desktop Infrastructure. VDI Demo (Microsoft Remote Desktop Services) for Version 3.2
Oracle Virtual Desktop Infrastructure VDI Demo (Microsoft Remote Desktop Services) for Version 2 April 2011 Copyright 2011, Oracle and/or its affiliates. All rights reserved. This software and related
SQL Server 2012 - Express Edition
SQL Server 2012 - Express Edition 20-August-2015 Revision: Release Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document
Performance Optimization Guide
Performance Optimization Guide Publication Date: July 06, 2016 Copyright Metalogix International GmbH, 2001-2016. All Rights Reserved. This software is protected by copyright law and international treaties.
AVG 8.5 Anti-Virus Network Edition
AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective
Install Pocket Inventory in a Windows Server 2003 R2 Standard Environment
One Blue Hill Plaza, 16th Floor, PO Box 1546 Pearl River, NY 10965 1-800-PC-AMERICA, 1-800-722-6374 (Voice) 845-920-0800 (Fax) 845-920-0880 Install Pocket Inventory in a Windows Server 2003 R2 Standard
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Number: 1Y0-A14 Passing Score: 800 Time Limit: 90 min File Version: 42.2 http://www.gratisexam.com/ CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Exam Name: Implementing
Autodesk Inventor on the Macintosh
Autodesk Inventor on the Macintosh FREQUENTLY ASKED QUESTIONS 1. Can I install Autodesk Inventor on a Mac? 2. What is Boot Camp? 3. What is Parallels? 4. How does Boot Camp differ from Virtualization?
Huawei OceanStor Backup Software Technical White Paper for NetBackup
Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei Page 1 of 14 Copyright Huawei. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form
VMware/Hyper-V Backup Plug-in User Guide
VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,
Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration
Intel vpro Technology How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration Revision 1.4 March 10, 2015 Revision History Revision Revision History Date 1.0 First
Preparing a Windows 7 Gold Image for Unidesk
Preparing a Windows 7 Gold Image for Unidesk What is a Unidesk gold image? In Unidesk, a gold image is, essentially, a virtual machine that contains the base operating system and usually, not much more
WHITE PAPER: TECHNICAL OVERVIEW. NetBackup Desktop Laptop Option Technical Product Overview
WHITE PAPER: TECHNICAL OVERVIEW NetBackup Desktop Laptop Option Technical Product Overview Mayur Dewaikar, Sr. Technical Product Manager NetBackup Platform Symantec Technical Network White Paper EXECUTIVE
Intel Setup and Configuration Software (Intel SCS)
Intel Setup and Configuration Software (Intel SCS) Deployment Guide Version 1.0 Document Release: August 2015 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS
