Security Correlation Server Backup and Recovery Guide

Size: px
Start display at page:

Download "Security Correlation Server Backup and Recovery Guide"

Transcription

1 orrelog Security Correlation Server Backup and Recovery Guide This guide provides information to assist administrators and operators with backing up the configuration and archive data of the CorreLog server, and restoring this data. The information presented here will be useful to administrators responsible for maintaining the CorreLog system, as well as backup operators, developers, and IT managers, with application in disaster recovery and other areas. CorrreLog Server provides various options to retain backup copies of files and configuration data in an online state. Additionally, CorreLog provides flexible elements that can be configured by a user to backup log data on the system to removable media, including the ability to execute periodic backup scripts, and log the success or failure of these operations for further analysis. These features are described here, to permit easy integration with existing backup software and enterprise operations. Backup and Recovery of Configuration Data CorreLog maintains its primary configuration data in the "CorreLog\config" directory of the system within a series of files that have a ".cnf" extension. The user can backup almost all of the configuration data of the system by simply backing up this single folder. In addition to the "config" directory above, several other locations and folders exist that contain configuration data requiring periodic backup. The following folders contain configuration data items that should be routinely backed up for data storage. Generally, these directories contain a small amount of data, and are easily backed up.

2 Note that files can be copied while CorreLog executes, and backup of these files does not require CorreLog to be stopped. CorreLog\actions Folder This folder contains the "Correlation > Actions" scripts of the system. This folder should be routinely backed up to capture any special files or modifications to existing scripts. The folder typically contains less than 100 Kbytes of data. CorreLog\c-alerts Folder This folder contains the "Alerts > Custom" scripts of the system. This folder should be routinely backed up to capture any special files or modifications to existing scripts. The folder typically contains less than 100 Kbytes of data. CorreLog\config Folder This folder (and all of its subfolders) contains the main configuration data of the system, including templates, installation defaults, and checkpoints. This folder contains virtually all the configuration data of the system (with a few notable exceptions, described here). The folder typically contains less than 1 Mbytes of data. CorreLog\dash Folder This folder (and all of its subfolders) contains the configuration items associated with the dashboard facility, which works with the data in the "CorreLog\config" folder listed above. This folder typically contains less than 100 Kbytes of data. CorreLog\graph Folder This folder contains graph configuration files for use with the CorreLog graph viewer. These files are normally edited via the Graph Screen. The folder typically contains less than 100 Kbytes of data. CorreLog\t-actions Folder This folder contains the "Correlation > Ticket Actions" scripts of the system. This folder should be routinely backed up to capture any special files or modifications to existing scripts. The folder typically contains less than 100 Kbytes of data. CorreLog\tickets Folder This folder contains the ticket data of the system scripts. This folder should be routinely backed up to capture ticket information on the system. The folder typically contains less than 10 Mbytes of data. Note that CorreLog does not need to be stopped in order to backup the above files. However, to restore any file within these directories, CorreLog should be first stopped, and then restarted. (This is because the above files are read by CorreLog processes on service startup, and then periodically overwritten with new data.) Backup and Recovery Guide, Page 2

3 Special Configuration Data Recovery Functions CorreLog provides two other functions to allow rapid restoration of configuration data (as an alternative to restoring a backup of data, as explained above.) These two functions allow the user to quickly restore a particular configuration file, useful if a configuration change needs to be eliminated or reverted to the previous day. These features are explained below in more detail. "Yesterday" Template File. As a standard function, CorreLog will automatically store configuration data items associated with the Correlation Engine each night at midnight. This data is stored in a special "Template" file called "Yesterday", which can be loaded by the operator via the "Correlation > Config > Templates" facility. This allows the operator to quickly revert the "Threads", "Alerts", "Macros", "Address Groups" and other items to their previous version, which existed at midnight. Checkpoint Files. CorreLog creates a checkpoint of all configuration data and status data each night, and stores this data in the "CorreLog\config\$chkpt" directory of the system. Each night, at midnight, all configuration files are copied to this directory, and appended the day of the week (where 0=Sunday and 6=Saturday.) To restore these files, the user must (1) locate the particular configuration file in the CorreLog\config\$chkpt" directory; (2) stop the CorreLog Server; (3) copy the file to the correct location in the "config" directory and; (4) restart the CorreLog server. Backup of Log Data And Archives The vast majority of CorreLog operational data resides in the "log" and "archive" folders of the system. This data can constitute an enormous amount of data (potentially Terabytes of log data) so the backup of this data is an important consideration. CorreLog provides several techniques to accomplish this, described here. Direct Backup Of Log Data The user can perform an incremental backup of the "archive" and "logs" directory to tape or other media, using a variety of commercial software. In this case, an important consideration is to realize that only newly logs should be backed up, to conserve storage. (Otherwise, a full backup may exceed the capacity of most backup systems.) Forwarding Syslog Messages to Other Receiver The administrator can forward log files to a second copy of the CorreLog server that exists strictly for this purpose. In this case, the user configures the master CorreLog server to forward all log messages using the "Messages > Config > Backup and Recovery Guide, Page 3

4 Forwarding" screen of the system. The backup copy of CorreLog can also serve as a "hot swappable" version of the system. Schedule Copy or FTP Push of Archives The administrator can create a simple script that pushes the archive data to another server (possibly a UNIX server, or other windows server) at nightly intervals. This script can be executed via the CorreLog "System > Scheduler" function to perform a daily backup, weekly backup, or monthly backup. Restoration of Log Data Restoration of log data (from an archive file, or system backup) is not particular difficult, but it may be required to re-index this data and regenerate catalogs of this data to fully restore the entire configuration of the CorreLog Server. Restoration of Log Data The user can restore log data to the system from an archive file by simply unzipping the archive into the CorreLog "logs" directory. (The location of the logs data directory is configured on the "Messages > Config > Parms" screen.) The Administrator can execute the "RestoreArc.exe" program (documented below) to simplify this operation. Restoration of Catalog Data Restoration of log data does not necessarily rebuild all the catalogs with this information. To restore the catalog data, the user may have to re-index and regenerate all the catalogs using the "RestoreArc.exe -index" option or the "CGenx.exe" program (in the "cli-bin" directory.) These commands are documented in more detail within the next several sections. Note that, when restoring an archive file, the operator can first search for the appropriate archive via the "Reports > Query" function, which allows the user to search compressed archive files on the system. Once the archive file is located, the operator simply executes "RestoreArc.exe" to place the contents of the compressed file into the "logs" directory. Restoring Archive Data With "RestoreArc.exe" The easiest way to restore a single archive file for a specific date is to use the "RestoreArc.exe" program, which is a standard utility found in the "system" folder of the CorreLog Server. This utility unzips the archive, then re-indexes the keyword list, and optionally re-indexes all the various other index files, used by the "Devices", "Users", "Facilities", "Severities", and "Threads" screens. Backup and Recovery Guide, Page 4

5 To restore a log file from an archive file, the user creates an administrative command prompt, and issues the following command in the "CorreLog\system" directory. (The date below of is substituted for the date of the archive file.) RestoreArc.exe overwrite The above command unzips the archive file, and places it in the correct location in the "logs" directory. The command also re-indexes the keyword list. This enables the " Search", " Query", and the " Graph" screens to access the data. HOWEVER, this does not update any of the catalog data (i.e. the "Devices", "Users", "Facilities", "Severities", or "Threads" screen.) To make data accessible to these screens, also execute the following command. RestoreArc.exe index The above command can take some time to execute; hence it must be explicitly executed. (Depending on the size of the log file, the above command can take several minutes or even several hours to complete) Executing the "RestoreArc.exe" command with no arguments displays brief but complete help on the command usage and argument syntax. Repairing And Re-indexing Data With "CGenx.exe" As an alternative to executing the "RestoreArc.exe" program with the "-index" option, the administrator can also execute the "CGenx.exe" command line utility to rebuild index files. This command is documented in the "Command Line Interface (CLI) User Manual", which is available in the "s-doc" directory of each CorreLog installation. (The "RestoreArc.exe (date) index" command is an alias for the "CGenx.exe all (date)" command. The "CGenx.exe" program permits the operator to individually re-index any catalog on the system, and provides an equivalent (but slightly more flexible) interface than the "RestoreArc.exe" program. The "CGenx.exe" program is also useful for fixing corrupt index files that may cause "Unformatted Text" messages to appear on certain message list screens. Backup of Agent Configurations As a special note, the operator can backup the configuration files of agents using the "rsmconf.exe download" command line utility. This script downloads a configuration file from a specified agent that can later be uploaded to the same agent or some other agent to affect recovery functions. Backup and Recovery Guide, Page 5

6 Detailed notes on the "rsmconf.exe" utility are included in the "Windows Tool Set User Manual", Section 5. (This manual is available from the "Home" screen of the CorreLog Server, after user login.) The agent configuration files reside at the physical location of the managed platforms, and the data is not immediately available for backup at the CorreLog Server. If the CorreLog site has many strategic agent configurations, it may be useful to create a small batch file to backup these agents. For example, the user can create a simple batch file as follows that will copy the agent configurations to an Agent-Backup folder. This script could be launched via the CorreLog "Scheduler" routine at periodic intervals (such as each day.) REM: # BACKUP_AGENTS.bat REM: # Backup strategic CorreLog Agent configurations. if not exist..\agent-backup mkdir..\agent-backup rsmconf.exe download >..\Agent-Backup\1_1_1_1.bak rsmconf.exe download >..\Agent-Backup\1_1_1_2.bak rsmconf.exe download >..\Agent-Backup\1_1_1_3.bak rsmconf.exe download >..\Agent-Backup\1_1_1_4.bak echo Agent Backup completed. REM # Agent config backup complete. No further action is required. REM # Finished The above script can be edited to supply the list of strategic agents, and placed in the "system" directory of the CorreLog Server. Then, the script can be periodically executed (such as with the "Scheduler" function) to copy the agent configurations from remote agents to the local machine. The "Agent-Backup" folder will then retain the latest copies of the agent programs. Agent configurations can then be restored (if needed) by uploading the values back to the agents using the "rsmconf.exe upload" option (or using the "Directly Edit Remote Agent Config" link on the CorreLog Server platform.) The above script can be improved to first download the agent configuration to a temporary file, then copy the files into the "Agent-Backup" folder once all downloads are successful. (This provides a hedge against overwriting a backup with an empty file when the agent is not accessible for some reason.) Executing the "rsmconf.exe" program with no arguments provides brief but complete help on the usage of this program, which can also be used to check configuration data. Backup and Recovery Guide, Page 6

7 Example Configuration Data Backup Script An example configuration data backup script is provided below. The information below can be (1) cut and paste to a batch file; (2) modified by the administrator to adjust parameters; (3) placed in the "CorreLog\System" directory, and then (4) launched by the "System > Schedule" function of CorreLog. As written below, the configuration data backup script places the CorreLog system configuration data onto the "D\:" drive, in a directory with the same name as today's date. The script below can be modified by an administrator to change its operating characteristics. REM # BACKUP_CONFIG.bat REM # This script creates a directory on the "D:" drive with today's REM # date, and copies all the configuration data of the system into REM # this directory. REM # This is the location where files are stored: set BACKUP_DIRECTORY=D:\CorreLog_Config REM # Get today's date in YYYY-MM-DD format: FOR /F "tokens=1-4 delims=/ " %%I in ('date /t') do ( set FILEDATE=%%L-%%J-%%K ) set MAIN_DIRECTORY=%BACKUP_DIRECTORY%\%FILEDATE% REM # Make subdirectories: mkdir %MAIN_DIRECTORY%\actions mkdir %MAIN_DIRECTORY%\c-alerts mkdir %MAIN_DIRECTORY%\config mkdir %MAIN_DIRECTORY%\dash\config mkdir %MAIN_DIRECTORY%\dash\layouts mkdir %MAIN_DIRECTORY%\graph mkdir %MAIN_DIRECTORY%\t-action mkdir %MAIN_DIRECTORY%\tickets REM # Copy files here. copy..\actions\*.* copy..\c-alerts\*.* copy..\config\*.* copy..\dash\config\*.* copy..\dash\layouts\*.* copy..\graph\*.* copy..\t-actions\*.* copy..\tickets\*.* %MAIN_DIRECTORY%\actions %MAIN_DIRECTORY%\c-alerts %MAIN_DIRECTORY%\config %MAIN_DIRECTORY%\dash\config %MAIN_DIRECTORY%\dash\layouts %MAIN_DIRECTORY%\graphs %MAIN_DIRECTORY%\t-actions %MAIN_DIRECTORY%\tickets REM # Config backup complete. No further action is required. REM # Finished Backup and Recovery Guide, Page 7

8 Example Archive Data Backup Script An example archive data backup script is provided below. The information below can be (1) cut and paste to a batch file; (2) modified by the administrator to adjust parameters; (3) placed in the "CorreLog\System" directory, and then (4) launched by the "System > Schedule" function of CorreLog. As written below, the log data backup script copies CorreLog system archive data onto the "D\:" drive, in a directory with the same directory structure as the CorreLog archive folder. Only archives that have not been previously backed up are copied, to conserve disk space and CPU. The script below can be modified by an administrator to change its operating characteristics, such as to additionally backup message digest files, or the raw log file data of the system. REM # BACKUP_ARC.bat REM # This script backs up all the archive files to a location on REM # the D:\ drive configured by the operator below. The script REM # can be launched by the CorreLog "System > Schedule" function REM # daily basis to copy ONLY new archive files. REM # This is the location where files are stored: set ADIR=D:\CorreLog_Archive REM # Get today's year value: FOR /F "tokens=4 delims=/ " %%I in ('date /t') do set YEAR=%%I REM # Make the backup directory structure. mkdir %ADIR% mkdir %ADIR%\archive\ mkdir %ADIR%\archive\%YEAR% REM # Copy the archive files, only if they have not been previously REM # copied by this script. FOR %%I in (..\archive\%year%\*.gz ) do ( ) if NOT EXIST %ADIR%\archive\%%I COPY %%I %ADIR%\archive\%%I REM # Archive backup complete. No further action is required. REM # Finished. Backup and Recovery Guide, Page 8

9 Remote Configuration Backup via HTTP and ZIP It is fairly easy to configure the HTTP server and ZIP program to backup configuration data, initiated by a remote HTTP request. This technique may be useful for situations such as failover, disaster recovery, or simple remote storage of backups. The script below can be placed in the "x-cg\r-backup.bat" folder, and then an HTTP request (such as via the wget.exe utility) can generate the backup and then download the backup ZIP file. This requires permissions to be modified for the "x-cgi" folder via a modification to the "htaccess.txt" file in that directory. REM: # R-BACKUP.bat REM: # Backup a files to the BACKUP_FILE_NAME zip file REM: # This script can be launched via an HTTP request by REM: # Storing this file in the "CorreLog\x-cgi" folder, REM: # and modifying the "htaccess.txt" file in that folder REM: # to permit access via the "wget.exe" program. set BACKUP_FILE_NAME=..\s-html\BACKUP.zip REM: These are the folders to backup. ( echo../advisory echo../audit echo../c-alerts echo../config echo../dash echo../etext echo../excel echo../graph echo../net-snmp echo../net-user echo../query echo../s-html echo../t-actions echo../temp echo../u-agent )> ziplist.txt REM: # Zip the files here. del /f %BACKUP_FILE_NAME% type ziplist.txt..\system\zip.exe -r -@ %BACKUP_FILE_NAME% del /f ziplist.txt REM: # Finished. The BACKUP_FILE_NAME has been created. Note that the "x-cgi" CGI folder normally requires authentication to execute any program therein. The "htaccess.txt" file in that folder should be modified to permit the R- BACKUP.bat file above to be launched from a specific IP address or machine. The resulting BACKUP.zip file can then be downloaded as a separate operation. Backup and Recovery Guide, Page 9

10 Creating a Custom Configuration Package Using the techniques discussed in this manual, an operator can easily create a custom configuration package that can assist with deployment of the software at multiple sites. For example, if the CorreLog Server is to be installed and configured at may different locations, and a special target configuration exists, the operator can create a zip file (or other archive file) containing the desired configuration data of the system, and then unzip these files into the CorreLog Server root directory to effect an immediate configuration of the system. The configuration data of a site resides in specific folders, similar to the data previously identified, as follows: CorreLog\config Folder This folder (and all of its subfolders) contains the main configuration data of the system, including templates, installation defaults, and checkpoints. The user should include this directory in any custom package. CorreLog\actions Folder This folder contains the "Correlation > Actions" scripts of the system. The user may include these files in a custom package if there are one or more special "bat" programs referenced by the "Correlation Actions" screen. CorreLog\c-alerts Folder This folder contains the "Alerts > Custom" scripts of the system. The user may include these files in a custom configuration package if there are one or more special "bat" programs referenced by the "Custom Alerts" screen. CorreLog\dash Folder This folder (and all of its subfolders) contains the configuration items associated with the dashboard facility, which works with the data in the "CorreLog\config" folder listed above. The user may include these files in a custom package if there are any special dashboard elements. CorreLog\graph Folder This folder contains graph configuration files for use with the CorreLog graph viewer. The user may include these files in a custom package if there are any special graphs. CorreLog\t-actions Folder This folder contains the "Correlation > Ticket Actions" scripts of the system. The user may include these files in a custom package if there are one or more special "bat" files referenced by the "Ticket Actions" screen. Backup and Recovery Guide, Page 10

11 To create a custom package, the operator executes the following procedure. 1. The operator identifies a "Master" CorreLog site, and configures the CorreLog Server as desired, including dashboards, threads, alerts, and other necessary configuration data. 2. The operator creates a Zip file (or other archive file) containing the various directories and files identified at the start of this section. The resulting archive will be a relatively small package, typically less than 100 Kbytes in size, which is easily redistributed to other sites. 3. At a new site, the operator installs the COTS CorreLog Server software using the standard installation procedure documented in the "CorreLog Installation and Quick Start" manual. 4. After installation is complete, the operator stops the CorreLog Server Framework Service, extracts files from the package prepared in step (2) above, and then restarts the CorreLog Server. The above steps are sufficient to configure the CorreLog Server dashboards, threads, alerts, custom actions, and other items represented in the master site, with no other action necessary on the part of the end-user of the site. Note that variations to the above procedure are possible, such as including additional screens and documentation, or dynamic creation of threads and alerts based upon external data, and installation of plug-in components that may be necessary or desireable. Backup and Recovery Guide, Page 11

12 Professional Services CorreLog, Inc. provides professional services to assist in all phases of deployment activities, and assists with all deployment and operational issues through its support division. Prior to deploying CorreLog Server (whether a small single-tier deployment or a large multi-tier deployment) licensed users are encouraged to contact CorreLog for a detailed discussion of options and capabilities. Further information on installation is available from the "Home" page of each CorreLog installation, and is contained in the comprehensive documentation accompanying the product. Refer to the "Installation and Quick Start Guide" for additional information For Additional Help Detailed specifications regarding the CorreLog Server, add-on components, and resources are available from our corporate website. Test software may be downloaded for immediate evaluation. Additionally, CorreLog is pleased to support proof-ofconcepts, and provide technology proposals and demonstrations on request. CorreLog, Inc., a privately held corporation, has produced software and framework components used successfully by hundreds of government and private operations worldwide. We deliver security information and event management (SIEM) software, combined with deep correlation functions, and advanced security solutions. CorreLog markets its solutions directly and through partners. We are committed to advancing and redefining the state-of-art of system management, using open and standards-based protocols and methods. Visit our website today for more information. CorreLog, Inc. mailto:support@correlog.com Backup and Recovery Guide, Page 12

orrelog SNMP Trap Monitor Software Users Manual

orrelog SNMP Trap Monitor Software Users Manual orrelog SNMP Trap Monitor Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, SNMP Trap Monitor Software Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No

More information

Internal Security Concepts Users Guide

Internal Security Concepts Users Guide orrelog Internal Security Concepts Users Guide This guide provides overview information on the internal security concepts of the CorreLog Server needed to provide secure operation and data safety. This

More information

orrelog Ping Monitor Adapter Software Users Manual

orrelog Ping Monitor Adapter Software Users Manual orrelog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, Ping Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part

More information

How To Use The Correlog With The Cpl Powerpoint Powerpoint Cpl.Org Powerpoint.Org (Powerpoint) Powerpoint (Powerplst) And Powerpoint 2 (Powerstation) (Powerpoints) (Operations

How To Use The Correlog With The Cpl Powerpoint Powerpoint Cpl.Org Powerpoint.Org (Powerpoint) Powerpoint (Powerplst) And Powerpoint 2 (Powerstation) (Powerpoints) (Operations orrelog SQL Table Monitor Adapter Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, SQL Table Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Syslog Windows Tool Set (WTS) Configuration File Directives And Help

Syslog Windows Tool Set (WTS) Configuration File Directives And Help orrelog Syslog Windows Tool Set (WTS) Configuration File Directives And Help The CO-sysmsg.cnf file contains all the parameters and specifications related to the program s operation. This file is found

More information

Backing Up TestTrack Native Project Databases

Backing Up TestTrack Native Project Databases Backing Up TestTrack Native Project Databases TestTrack projects should be backed up regularly. You can use the TestTrack Native Database Backup Command Line Utility to back up TestTrack 2012 and later

More information

Backing Up CNG SAFE Version 6.0

Backing Up CNG SAFE Version 6.0 Backing Up CNG SAFE Version 6.0 The CNG-Server consists of 3 components. 1. The CNG Services (Server, Full Text Search and Workflow) 2. The data file repository 3. The SQL Server Databases The three services

More information

Federal and Large Enterprise Solutions - FAQs

Federal and Large Enterprise Solutions - FAQs Federal and Large Enterprise Solutions - FAQs Correlog has special capability working with Federal (and other) large enterprises. Our technology operates either independently of, or alongside, other SIEM

More information

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols

More information

Server application Client application Quick remote support application. Server application

Server application Client application Quick remote support application. Server application The system needs to be Online, with a server hosted as a HTTP/WEB interface. The WEB interface will have a login interface, Administrators can download the server & client application to any desktop to

More information

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic. OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does

More information

BackupPC. Network Startup Resource Center www.nsrc.org

BackupPC. Network Startup Resource Center www.nsrc.org BackupPC Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

inforouter Version 8.0 Administrator s Backup, Restore & Disaster Recovery Guide

inforouter Version 8.0 Administrator s Backup, Restore & Disaster Recovery Guide inforouter Version 8.0 Administrator s Backup, Restore & Disaster Recovery Guide Active Innovations, Inc. Names of all products herein are used for identification purposes only and are trademarks and/or

More information

Installing QCColorService as a Service on a Windows Platform

Installing QCColorService as a Service on a Windows Platform A basic install does not set the MonacoQCcolor Server to operate as a service on the Windows platform. It requires that an operator remain logged onto the server console else the process terminates. To

More information

SQL Server Protection

SQL Server Protection User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information

Log files management. Katarzyna KAPUSTA

Log files management. Katarzyna KAPUSTA Log files management Katarzyna KAPUSTA CERN openlab 07 September 2012 CERN openlab otn-2012-01 openlab Summer Student Report Log files management Katarzyna KAPUSTA Giacomo TENAGLIA 07 September 2012 Version

More information

Using Symantec NetBackup with Symantec Security Information Manager 4.5

Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights

More information

NetVanta Unified Communications Server Backup and Restore Procedures

NetVanta Unified Communications Server Backup and Restore Procedures NetVanta Unified Communications Technical Note NetVanta Unified Communications Server Backup and Restore Procedures 1 Introduction 1.1 Overview This document provides backup and restore procedures to protect

More information

SQL Server Protection Whitepaper

SQL Server Protection Whitepaper SQL Server Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 The benefits of using the SQL Server Add-on... 2 Requirements... 2 2. SQL Protection overview... 3 User databases...

More information

EMC Data Domain Operating System 4.6 5.1 Retention Lock Software User s Guide

EMC Data Domain Operating System 4.6 5.1 Retention Lock Software User s Guide EMC Data Domain Operating System 4.6 5.1 Retention Lock Software User s Guide Backup Recovery Systems Division Data Domain LLC 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800

More information

Perforce Backup Strategy & Disaster Recovery at National Instruments

Perforce Backup Strategy & Disaster Recovery at National Instruments Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir National Instruments Perforce User Conference April 2005-1 - Contents 1. Introduction 2. Development Environment 3. Architecture

More information

SharePoint Best Practices

SharePoint Best Practices This document is the exclusive property of The egroup LLC and may not be reproduced, shared, disseminated, or otherwise transmitted to another party either in part or in whole without prior written consent.

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

IBM WebSphere Application Server Version 7.0

IBM WebSphere Application Server Version 7.0 IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

BIRT Application and BIRT Report Deployment Functional Specification

BIRT Application and BIRT Report Deployment Functional Specification Functional Specification Version 1: October 6, 2005 Abstract This document describes how the user will deploy a BIRT Application and BIRT reports to the Application Server. Document Revisions Version Date

More information

Here you can see an example of the command results:

Here you can see an example of the command results: CA Embedded Entitlements Manager (EEM) can be configured for Server failover which automatically routes requests to a secondary EEM Server when the primary EEM server is not available. However, for this

More information

vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide

vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide This document supports the version of each product listed and supports all subsequent versions until a new edition replaces

More information

Centralized Disaster Recovery using RDS

Centralized Disaster Recovery using RDS Centralized Disaster Recovery using RDS RDS is a cross-platform, scheduled replication application. Using RDS s replication and scheduling capabilities, a Centralized Disaster Recovery model may be used

More information

Microsoft Exchange 2003 Disaster Recovery Operations Guide

Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Corporation Published: December 12, 2006 Author: Exchange Server Documentation Team Abstract This guide provides installation and deployment

More information

Backup and Restore FAQ

Backup and Restore FAQ Backup and Restore FAQ Topic 50210 Backup and Restore Web, Data, and Email Security Solutions 11-Mar-2014 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information

Online Backup Client User Manual

Online Backup Client User Manual Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have

More information

Managing Software and Configurations

Managing Software and Configurations 55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page

More information

Actualtests.com - The Power of Knowing

Actualtests.com - The Power of Knowing Explanation: We should use Global Security groups. QUESTION 87 You are the network administrator for Certkiller.com. Your network consists of a single Active Directory domain named Certkiller.com. All

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

Installing SQL Express. For CribMaster 9.2 and Later

Installing SQL Express. For CribMaster 9.2 and Later Installing SQL Express For CribMaster 9.2 and Later CRIBMASTER USER GUIDE Installing SQL Express Document ID: CM9-031-03012012 Copyright CribMaster. 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,

More information

Protecting SQL Server Databases. 1997-2008 Software Pursuits, Inc.

Protecting SQL Server Databases. 1997-2008 Software Pursuits, Inc. Protecting SQL Server Databases 1997-2008 Table of Contents Introduction... 2 Overview of the Backup Process... 2 Configuring SQL Server to Perform Scheduled Backups... 3 Configuring SureSync Relation

More information

IM and Presence Disaster Recovery System

IM and Presence Disaster Recovery System Disaster Recovery System, page 1 Access the Disaster Recovery System, page 2 Back up data in the Disaster Recovery System, page 3 Restore scenarios, page 9 Backup and restore history, page 15 Data authentication

More information

Backup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases

Backup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases Backup and Recovery What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases CONTENTS Introduction 3 Terminology and concepts 3 Database files that make up a database 3 Client-side

More information

NovaBACKUP Central Management Console

NovaBACKUP Central Management Console NovaBACKUP Central Management Console User Manual NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Secure Messaging Server Console... 2

Secure Messaging Server Console... 2 Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Customer Control Panel Manual

Customer Control Panel Manual Customer Control Panel Manual Contents Introduction... 2 Before you begin... 2 Logging in to the Control Panel... 2 Resetting your Control Panel password.... 3 Managing FTP... 4 FTP details for your website...

More information

How to Back Up and Restore an ACT! Database Answer ID 19211

How to Back Up and Restore an ACT! Database Answer ID 19211 How to Back Up and Restore an ACT! Database Answer ID 19211 Please note: Answer ID documents referenced in this article can be located at: http://www.act.com/support/index.cfm (Knowledge base link). The

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

HPOM 8.1 High Availability Utilizing Microsoft SQL Server Log Shipping

HPOM 8.1 High Availability Utilizing Microsoft SQL Server Log Shipping HPOM 8.1 High Availability Utilizing Microsoft SQL Server Log Shipping White Paper version 2.4 HPOM 8.1 High Availability Utilizing Microsoft SQL Server Log Shipping... 1 Change record... 3 Architectural

More information

Upgrade your Software

Upgrade your Software Video server software From time to time software upgrades are issued for the video servers. These are posted on our website www.ad-networkvideo.com or on the product CD and consist of two parts, the application

More information

HP D2D NAS Integration with HP Data Protector 6.11

HP D2D NAS Integration with HP Data Protector 6.11 HP D2D NAS Integration with HP Data Protector 6.11 Abstract This guide provides step by step instructions on how to configure and optimize HP Data Protector 6.11 in order to back up to HP D2D Backup Systems

More information

Online Backup Linux Client User Manual

Online Backup Linux Client User Manual Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might

More information

High Availability for VMware GSX Server

High Availability for VMware GSX Server High Availability for GSX Server High Availability for GSX Server Revision 1.1.0 published January 2005, GeoCluster, and NSI are registered trademarks of NSI Software, Inc. Balance is a trademark of NSI

More information

Online Backup Client User Manual

Online Backup Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Magento Search Extension TECHNICAL DOCUMENTATION

Magento Search Extension TECHNICAL DOCUMENTATION CHAPTER 1... 3 1. INSTALLING PREREQUISITES AND THE MODULE (APACHE SOLR)... 3 1.1 Installation of the search server... 3 1.2 Configure the search server for usage with the search module... 7 Deploy the

More information

Healthstone Monitoring System

Healthstone Monitoring System Healthstone Monitoring System Patrick Lambert v1.1.0 Healthstone Monitoring System 1 Contents 1 Introduction 2 2 Windows client 2 2.1 Installation.............................................. 2 2.2 Troubleshooting...........................................

More information

MapGuide Open Source Repository Management Back up, restore, and recover your resource repository.

MapGuide Open Source Repository Management Back up, restore, and recover your resource repository. MapGuide Open Source Repository Management Back up, restore, and recover your resource repository. Page 1 of 5 Table of Contents 1. Introduction...3 2. Supporting Utility...3 3. Backup...4 3.1 Offline

More information

White Paper Integrating The CorreLog Security Correlation Server with BMC Software

White Paper Integrating The CorreLog Security Correlation Server with BMC Software orrelogtm White Paper Integrating The CorreLog Security Correlation Server with BMC Software This white paper describes how the CorreLog Security Correlation Server easily integrates with BMC Performance

More information

End Your Data Center Logging Chaos with VMware vcenter Log Insight

End Your Data Center Logging Chaos with VMware vcenter Log Insight End Your Data Center Logging Chaos with VMware vcenter Log Insight By David Davis, vexpert WHITE PAPER Table of Contents Deploying vcenter Log Insight... 4 vcenter Log Insight Usage Model.... 5 How vcenter

More information

orrelog Apache TLS / Crypto Enhanced Encryption Software

orrelog Apache TLS / Crypto Enhanced Encryption Software orrelog Apache TLS / Crypto Enhanced Encryption Software http://www.correlog.com mailto:info@correlog.com CorreLog, Enhanced Encryption Software Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved.

More information

SOA Software API Gateway Appliance 7.1.x Administration Guide

SOA Software API Gateway Appliance 7.1.x Administration Guide SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,

More information

How to Install Multiple Monitoring Agents on a Microsoft Operating System. Version StoneGate Firewall/VPN 2.6 and SMC 3.2

How to Install Multiple Monitoring Agents on a Microsoft Operating System. Version StoneGate Firewall/VPN 2.6 and SMC 3.2 How to Install Multiple Monitoring Agents on a Microsoft Operating System Version StoneGate Firewall/VPN 2.6 and SMC 3.2 INTRODUCTION This document provides detailed instructions for installing multiple

More information

Management Utilities Configuration for UAC Environments

Management Utilities Configuration for UAC Environments Management Utilities Configuration for UAC Environments For optimal use of SyAM Management Utilities, Windows client machines should be configured with User Account Control disabled or set to the least

More information

Backup Agent Plug-in. Installation Manual. Theater Management Suite

Backup Agent Plug-in. Installation Manual. Theater Management Suite Backup Agent Plug-in Installation Manual Theater Management Suite R59770810/00 06/11/2012 Barco nv Entertainment Division Noordlaan 5, B-8520 Kuurne Phone: +32 56.36.82.11 Fax: +32 56.36.883.86 Support:

More information

FileMaker Server 12. FileMaker Server Help

FileMaker Server 12. FileMaker Server Help FileMaker Server 12 FileMaker Server Help 2010-2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc.

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

Tivoli Access Manager Agent for Windows Installation Guide

Tivoli Access Manager Agent for Windows Installation Guide IBM Tivoli Identity Manager Tivoli Access Manager Agent for Windows Installation Guide Version 4.5.0 SC32-1165-03 IBM Tivoli Identity Manager Tivoli Access Manager Agent for Windows Installation Guide

More information

Xopero Centrally managed backup solution. User Manual

Xopero Centrally managed backup solution. User Manual Centrally managed backup solution User Manual Contents Desktop application...2 Requirements...2 The installation process...3 Logging in to the application...6 First logging in to the application...7 First

More information

Barracuda Message Archiver Vx Deployment. Whitepaper

Barracuda Message Archiver Vx Deployment. Whitepaper Barracuda Message Archiver Vx Deployment Whitepaper Document Scope This document provides guidance on designing and deploying Barracuda Message Archiver Vx on VMware vsphere Document Scope, and Microsoft

More information

Maximum Availability Architecture. Oracle Best Practices For High Availability. Backup and Recovery Scenarios for Oracle WebLogic Server: 10.

Maximum Availability Architecture. Oracle Best Practices For High Availability. Backup and Recovery Scenarios for Oracle WebLogic Server: 10. Backup and Recovery Scenarios for Oracle WebLogic Server: 10.3 An Oracle White Paper January, 2009 Maximum Availability Architecture Oracle Best Practices For High Availability Backup and Recovery Scenarios

More information

CommandCenter Secure Gateway

CommandCenter Secure Gateway CommandCenter Secure Gateway Quick Setup Guide for CC-SG Virtual Appliance - VMware, XEN, HyperV This Quick Setup Guide explains how to install and configure the CommandCenter Secure Gateway. For additional

More information

HP Operations Manager Software for Windows Integration Guide

HP Operations Manager Software for Windows Integration Guide HP Operations Manager Software for Windows Integration Guide This guide documents the facilities to integrate EnterpriseSCHEDULE into HP Operations Manager Software for Windows (formerly known as HP OpenView

More information

Online Backup Client User Manual

Online Backup Client User Manual For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.

More information

FaxCore 2007 Application-Database Backup & Restore Guide :: Microsoft SQL 2005 Edition

FaxCore 2007 Application-Database Backup & Restore Guide :: Microsoft SQL 2005 Edition 1 FaxCore 2007 - Database Backup & Restore Guide :: Microsoft SQL 2005 Edition Version 1.0.4 FaxCore 2007 Application-Database Backup & Restore Guide :: Microsoft SQL 2005 Edition 2 FaxCore 2007 - Database

More information

DEPLOYING EMC DOCUMENTUM BUSINESS ACTIVITY MONITOR SERVER ON IBM WEBSPHERE APPLICATION SERVER CLUSTER

DEPLOYING EMC DOCUMENTUM BUSINESS ACTIVITY MONITOR SERVER ON IBM WEBSPHERE APPLICATION SERVER CLUSTER White Paper DEPLOYING EMC DOCUMENTUM BUSINESS ACTIVITY MONITOR SERVER ON IBM WEBSPHERE APPLICATION SERVER CLUSTER Abstract This white paper describes the process of deploying EMC Documentum Business Activity

More information

- 1 - SmartStor Cloud Web Admin Manual

- 1 - SmartStor Cloud Web Admin Manual - 1 - SmartStor Cloud Web Admin Manual Administrator Full language manuals are available in product disc or website. The SmartStor Cloud Administrator web site is used to control, setup, monitor, and manage

More information

Tk20 Backup Procedure

Tk20 Backup Procedure Tk20 Backup Procedure 1 TK20 BACKUP PROCEDURE OVERVIEW 3 FEATURES AND ADVANTAGES: 3 TK20 BACKUP PROCEDURE 4 DAILY BACKUP CREATION 4 TRANSFER OF BACKUPS 5 AUDITING PROCESS 5 BACKUP REPOSITORY 5 WRITE TO

More information

CorreLog Agent For SAP SAP Audit Log Monitor Interface

CorreLog Agent For SAP SAP Audit Log Monitor Interface orrelog CorreLog Agent For SAP SAP Audit Log Monitor Interface This application note describes how to install configure the CorreLog to accept and format SAP audit files. The information herein supplements

More information

AXIS 70U - Using Scan-to-File

AXIS 70U - Using Scan-to-File AXIS 70U - Using Scan-to-File Introduction This document describes the Scan-to-File feature in the AXIS 70U. The step-by-step instructions describe the process of configuring the AXIS 70U and an FTP server.

More information

McAfee One Time Password

McAfee One Time Password McAfee One Time Password Integration Module Outlook Web App 2010 Module version: 1.3.1 Document revision: 1.3.1 Date: Feb 12, 2014 Table of Contents Integration Module Overview... 3 Prerequisites and System

More information

Database Administration

Database Administration Unified CCE, page 1 Historical Data, page 2 Tool, page 3 Database Sizing Estimator Tool, page 11 Administration & Data Server with Historical Data Server Setup, page 14 Database Size Monitoring, page 15

More information

Adaptive Log Exporter Users Guide

Adaptive Log Exporter Users Guide IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,

More information

Using Internet or Windows Explorer to Upload Your Site

Using Internet or Windows Explorer to Upload Your Site Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting

More information

AVG Business SSO Connecting to Active Directory

AVG Business SSO Connecting to Active Directory AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

TABLE OF CONTENTS. Quick Start - Windows File System idataagent. Page 1 of 44 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT

TABLE OF CONTENTS. Quick Start - Windows File System idataagent. Page 1 of 44 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT Page 1 of 44 Quick Start - Windows File System idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Simplified Data Management Point-In-Time Recovery System State SnapProtect Backup Office Communications

More information

DNS must be up and running. Both the Collax server and the clients to be backed up must be able to resolve the FQDN of the Collax server correctly.

DNS must be up and running. Both the Collax server and the clients to be backed up must be able to resolve the FQDN of the Collax server correctly. This howto describes the setup of backup, bare metal recovery, and restore functionality. Collax Backup Howto Requirements Collax Business Server Collax Platform Server Collax Security Gateway Collax V-Cube

More information

An Introduction To The Web File Manager

An Introduction To The Web File Manager An Introduction To The Web File Manager When clients need to use a Web browser to access your FTP site, use the Web File Manager to provide a more reliable, consistent, and inviting interface. Popular

More information

VTLBackup4i. Backup your IBM i data to remote location automatically. Quick Reference and Tutorial. Version 02.00

VTLBackup4i. Backup your IBM i data to remote location automatically. Quick Reference and Tutorial. Version 02.00 VTLBackup4i Backup your IBM i data to remote location automatically Quick Reference and Tutorial Version 02.00 Manufacture and distributed by VRTech.Biz LTD Last Update:16.9.2013 Contents 1. About VTLBackup4i...

More information

Tracking Network Changes Using Change Audit

Tracking Network Changes Using Change Audit CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and

More information

Installation Manual Version 8.5 (w/sql Server 2005)

Installation Manual Version 8.5 (w/sql Server 2005) C ase Manag e m e n t by C l i e n t P rofiles Installation Manual Version 8.5 (w/sql Server 2005) T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W Table of Contents - 2 - Table of Contents SERVER

More information

Quick Start Guide. IT Management On-Demand

Quick Start Guide. IT Management On-Demand 1 Quick Start Guide Quick Start Guide IT Management On-Demand Introduction... 2 Getting Started... 3 Planning Your Deployment... 5 Performing a Test Deployment... 6 Enterprise Deployment Options... 8 Remote

More information

TD0156 - Data Management Server 2010 Backup

TD0156 - Data Management Server 2010 Backup TD0156 - Data Management Server 2010 Backup When running Autodesk Data Management Server, you should use the tools provided within the software to create a backup. The backup tools create a complete snapshot

More information

ManageEngine EventLog Analyzer. Best Practices Document

ManageEngine EventLog Analyzer. Best Practices Document ManageEngine EventLog Analyzer Best Practices Document Table of Contents System Requirements... 3 Up to 50 hosts... 3 Up to 100 hosts... 3 Up to 200 hosts... 3 Up to 500 hosts... 3 Above 500 hosts... 4

More information

Database Fundamentals

Database Fundamentals Database Fundamentals A article about database maintenance in Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org October 2006 Table of Contents Introduction... 3 Microsoft

More information

Best Practices for Implementing Autodesk Vault

Best Practices for Implementing Autodesk Vault AUTODESK VAULT WHITE PAPER Best Practices for Implementing Autodesk Vault Introduction This document guides you through the best practices for implementing Autodesk Vault software. This document covers

More information

Central Administration QuickStart Guide

Central Administration QuickStart Guide Central Administration QuickStart Guide Contents 1. Overview... 2 Licensing... 2 Documentation... 2 2. Configuring Central Administration... 3 3. Using the Central Administration web console... 4 Managing

More information

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution

More information

Retailman POS Multi-location Setup

Retailman POS Multi-location Setup Retailman POS Multi-location Setup The new version of Retail Man of 1.90 and above has a new way of setting up the multilocation version. There are new components that have to be taken in to account and

More information