McAfee Enterprise Mobility Management Performance and Scalability Guide
|
|
- Dwayne Ryan
- 8 years ago
- Views:
Transcription
1 McAfee Enterprise Mobility Management 12.0 Performance and Scalability Guide
2 Contents Purpose... 1 Executive Summary... 1 Testing Process... 1 Test Scenarios... 2 Scenario 1 Basic Provisioning and Sync... 2 Scenario 2 Threat Events and Application Compliance... 2 Scenario 3 Enterpirse Wi-Fi and VPN configuration (PKI)... 3 McAfee EMM 12.0 Architecture... 3 Test Environment... 4 Software... 4 Hardware... 4 System configuration... 4 External Influences on McAfee EMM 12.0 Scalability Limit... 4 McAfee epo Agent Handler Connection Limit... 5 McAfee EMM Deployment and Configuration Options... 5 Minimum Hardware Configuration... 6 Minimum McAfee EMM Server Deployment... 6 Software Configuration... 6 Performance Tuning... 6 Additional Performance Tuning PKI... 7 Sample Configuration for 10k Devices... 9 Alternate Configuration for 10k Devices (Tested)... 9 Alternate Configuration for 20k Devices (Tested) Test Results Scenario 1 Basic Provisioning and Sync Scenario 2 Threat Events and App Reputation Scenario 3 Enterprise Wi-Fi and VPN configuration (PKI)... 15
3 Purpose This document provides the performance and scalability test results for McAfee Enterprise Mobility Management 12.0 (McAfee EMM ). It is intended as a guideline for customers implementing McAfee EMM in networks with more than 3,000 devices. Executive Summary McAfee EMM can support up to 3,000 devices using the minimum system requirements defined in the data sheet and website. McAfee EMM can support up to a maximum of 20,000 concurrent mobile devices, regardless of the number of servers deployed in a single environment. This document describes the test scenarios and results, and explains the McAfee EMM configuration required to support up to 20,000 concurrent devices. For customers who intend to support between 10,000 and 20,000 mobile devices, with failover and redundancy, we recommend: Use McAfee epolicy Orchestrator (McAfee epo) server or later. Follow the recommended configurations in this document based on the projected total number of devices expected. Install only McAfee EMM on servers used to run the software. No other IIS services can co-exist Install McAfee EMM and McAfee epo on separate servers. The McAfee EMM and McAfee epo databases can co-exist on a single database server as long as the server is dedicated to only those products and appropriate redundancy is configured. Testing Process In order to mirror real-world usage, testing included the following common functions: Provisioning and enrollment of devices sync Policy update MDM check-in App compliance App blacklisting Threat events Provisioning with enterprise Wi-Fi and VPN certificate profiles (PKI environments) 1
4 Test Scenarios Simulated devices for each scenario included 70 percent ios and 30 percent Android devices. Scenario 1 Basic Provisioning and Sync Tests Provisioning sync Policy update Description Mobile devices were enrolled (provisioned) at a rate of one device every second. After ramping up to the target load of 20,000 devices, the system remained in sustaining mode for over 24 hours and the systems were monitored for: - Provisioning success - sync availability - System health, including CPU and memory utilization Note: Provisioning devices does not affect overall performance. Our tests involved provisioning devices much more quickly than would be expected in a real-world setting in order to more rapidly increase the number of devices in our test bed. Scenario 2 Threat Events and Application Compliance Tests Blacklisted app Malicious app (App reputation) Malware (as detected by VirusScan Mobile Security) Description Ten percent of Android and ios devices had a blacklisted app installed. The devices became non-compliant and a threat event was generated. Then, the blacklisted app was removed and the devices became compliant. Twenty-five percent of Android devices had a malicious app based on the app protection (reputation) score. The devices became noncompliant and a threat event was generated. Then, the malicious app was removed and the devices became compliant. Twenty-five percent of Android devices had malware based on McAfee VirusScan Mobile detection. The devices became noncompliant and a threat event was generated. Then, the malware was removed and the devices became compliant. 2
5 Scenario 3 Enterpirse Wi-Fi and VPN configuration (PKI) Tests Provisioning sync Description This scenario simulated provisioning one device every two seconds. McAfee epo policy was configured with a PKI-enabled profile, where each device got one enterprise Wi-Fi and one enterprise VPN configuration with a different certificate template for each. After ramping up to the target load of 20,000 devices, the system was maintained in sustaining mode for over 24 hours and the systems monitored for: Provisioning success sync availability System health, including CPU and memory utilization McAfee EMM 12.0 Architecture The diagram below illustrates a typical high-level architecture for a McAfee EMM deployment with Enterprise ActiveSync proxy server or servers in the DMZ and a Hub or Hubs in the internal network. 3
6 Test Environment This section describes how the load test environment was configured to run the three scenarios. All test machines were McAfee epo managed nodes with McAfee VirusScan Enterprise and McAfee Agent installed. Software SimDevice Tool used to simulate ios and Android devices Perfmon Tool used to collect performance metrics SQL Management Scripts to monitor metrics and database health Operating System: Windows 2008 R2 SP1, Windows 2012 Exchange Server: Exchange 2007, 2010, 2014 Hardware All test servers were virtual machines using VMware on ESX server. An F5 Big IP hardware load balancer was placed in front of the Exchange CAS array. - F5 was configured with an SSL pass-through rule. - F5 was configured to load balance with equal load across all servers. - Keep alive connections timeout setting was set to 5 minutes. System configuration McAfee EMM Servers Quad Core CPU 8GB RAM 100GB hard disk space McAfee epo Server Quad Core CPU 16GB RAM 100GB hard disk space SQL Server 16 Core CPU 32GB RAM 300GB dedicated database disk space External Influences on McAfee EMM 12.0 Scalability Limit The scalability limit of 20,000 devices depends on two important factors: McAfee epo Agent Handler connection. IIS concurrent connections limit. 4
7 McAfee epo Agent Handler Connection Limit All requests from a device, including initial provisioning and any ad-hoc or periodic updates, are pushed from McAfee EMM to McAfee epo as properties updates via McAfee epo Agent communications. Special threads on the McAfee EMM Hub queue requests and push them to McAfee epo at configured intervals. Various tests revealed that the McAfee epo Agent connection could withstand up to a maximum of four McAfee EMM threads pushing properties. McAfee EMM requires constant communication to keep devices connected. This results in McAfee EMM communicating with the McAfee epo Agent more than other integrated products and is the reason for limiting the number of McAfee EMM Hub threads to four. Each McAfee EMM Hub server is configured by default to run on one IIS worker process and each process runs one property update thread. Therefore, there can be no more than four McAfee EMM Hub servers with the default configuration or two McAfee EMM Hub servers running two IIS worker processes each. Microsoft IIS concurrent Connections Limit Microsoft IIS has a known limitation in application pools whereby no more than 5,000 concurrent connections can be handled per worker process. The McAfee EMM Hub server, during the course of normal operation with 20k devices, sees a maximum of 1,500 concurrent connections, and an average of 15. Therefore, the chances of the McAfee EMM Hub reaching the limit of concurrent connections are less than 50 percent. The McAfee EMM DMZ server, during the course of normal operation with 20k devices, has higher chances of reaching the concurrent connections limit due to the McAfee EMM Proxy component, which services Exchange ActiveSync requests ( sync). Exchange ActiveSync traffic supports keep-alive connections, called push (ping), that are used to automatically push new s to devices without user intervention. These keep-alive connections can stay open for up to 60 minutes. Since the McAfee EMM Proxy acts as a proxy between a device and the Exchange server, this component has to maintain keepalive connections, which makes it 80 percent likely to hit the concurrent limit. In order to support more than 5,000 devices per McAfee EMM Proxy, additional McAfee EMM servers or additional IIS worker processes must be added. Refer to Performance Tuning for more details. McAfee EMM Deployment and Configuration Options To support between 3,000 and 20,000 mobile devices, McAfee EMM and McAfee epo servers require specific hardware and software configuration with additional performance tuning. 5
8 Minimum Hardware Configuration McAfee EMM Servers Quad Core CPU 8GB RAM 100GB hard disk space McAfee epo Server Quad Core CPU 16GB RAM 100GB hard disk space SQL Server 16 Core CPU 32GB RAM 300GB dedicated database disk space Minimum McAfee EMM Server Deployment McAfee EMM in dual server configuration Two McAfee EMM DMZ servers and two McAfee EMM Hub servers Hardware Load Balancer (such as F5) configured in front of both the DMZ and the Hub servers Software Configuration McAfee epo or later Maximum SQL Server memory configured at 75 percent of actual physical memory (based on Microsoft SQL recommendation) Performance Tuning McAfee EMM servers can be configured in two ways to achieve scalability needs. The most common method is adding more servers. Apart from this option, each McAfee EMM server can be fine-tuned to increase the number of devices it can support at an application level. This can be achieved by increasing the number of worker process in the IIS application pool. The following formula can be used to determine the number of worker processes needed based on the maximum number of devices. On DMZ Servers Calculate minimum number of worker process per 1 DMZ server as rounding of: ((# of Device/5000) * 80%) - Example for 10k devices: (10000/5000)*80% = 1.6 = 2 worker processes - Example for 20k devices: (20000/5000)*80% = 3.2 = 3 worker processes The 80 percent factor is due to the IIS concurrent connections limit explained in External Influence on McAfee EMM 12.0 Scalability Limit. Configure the following properties on MSExchnageSyncAppPool IIS Application pool: - Process Model: Maximum Worker Process: <as calculated above> - Process Model: Queue Length:
9 - Process Model: Ping Enabled: False - Recycling: Regular Time Interval (Minutes): 0 Additionally, based on Microsoft best practices, there should be no more than five worker processes on each DMZ server. On Internal Servers Calculate minimum number of worker process per 1 Hub server as rounding of: ((# of Device/5000) * 50%) - Example for 10k devices: (10000/5000)*50% = 1 = 1 worker process - Example for 20k devices: (20000/5000)*50% = 2 = 2 worker processes The 50 percent factor is due to IIS concurrent connections limit explained under External Influence on McAfee EMM 12.0 Scalability Limit. Configure the following properties on EMMHubPool IIS Application pool: - Process Model: Maximum Worker Process: <as calculated above> Process Model: Queue Length: Process Model: Ping Enabled: False - Recycling: Regular Time Interval (Minutes): 0 Additionally, based on Microsoft best practices, there should be no more than four worker processes in total on all McAfee EMM Hub servers. For example, if there are two Hubs, you cannot have more than two worker processes on each Hub. This is due to the McAfee epo data channel limit explained under External Influence on McAfee EMM 12.0 Scalability Limit. The following change has to be made on each McAfee EMM Internal server configured to use more than one IIS worker process 1 Navigate to the McAfee EMM Hub Installation folder (c:\program Files (x86)\mcafee\emm Platform\EMM Hub). 2 Save a copy of the web.config file and open it for editing. 3 Search for the string WorkerProcessThreads_UseMutex and set the value to true. 4 Save the config file and reset IIS. Note: This approach helps increase scalability on an individual set of McAfee EMM servers. However, it does not address load balancing and high availability. To address high availability and load balancing needs, additional McAfee EMM servers should be added behind existing hardware load balancers Refer to the Knowledge Base article, Guideline for configuring load balancing in a McAfee EMM HA environment. Refer to the Knowledge base article, How to install McAfee EMM in High Availability Mode. Additional Performance Tuning PKI In a PKI environment, each device provisioning request results in an additional call to McAfee epo to request a client certificate. Therefore, the McAfee EMM server initiates connection to the McAfee epo Agent more often than the basic provisioning and threat event scenarios. To allow McAfee EMM and McAfee epo to scale up to 20,000 devices in PKI enabled environments, we must reduce the interval at which device properties are pushed to McAfee 7
10 epo via the Agent Handler connection. This interval can be set from the McAfee epo Console (Server Settings Enterprise Mobility Manager General Settings EMM Hub-toePO communication interval). Change this interval from 60 minutes to 1440 minutes (24 hours). 8
11 Sample Configuration for 10k Devices 3 DMZ servers 1 worker process each 2 Internal servers 1 worker process each Alternate Configuration for 10k Devices (Tested) 2 DMZ servers 2 worker processes each 2 Internal servers 1 worker process each 9
12 Sample Configuration for 20k Devices 5 DMZ servers 1 worker process each 4 Internal servers 1 worker process each Alternate Configuration for 20k Devices (Tested) 2 DMZ servers 3 worker process each 2 Internal servers 2 worker process each Note: A maximum of five worker processes is supported per DMZ server (Proxy) and a total of four worker processes is supported across all internal servers (Hubs). 10
13 Test Results Test results were recorded for the target load of 20,000 devices. Initial ramp-up of devices to the target load took approximately 14 hours. At the target load of 20,000 devices, the test was maintained in sustaining mode for more than three days. Scenario 1 Basic Provisioning and Sync McAfee EMM DMZ Server Average memory utilization: 40% Average CPU utilization: 11% McAfee EMM Hub Server Average memory utilization: 14% Average CPU utilization: 23% Legend: # of concurrent connections; Scale Memory consumption: % committed bytes in use; Scale 1 % CPU utilization; Scale
14 SQL Server Average memory utilization: 71% Average CPU utilization: 16% Average User Connections: 52 Legend: User connections; Scale 1.0 Memory consumption: % committed bytes in use; Scale 1 % CPU utilization; Scale
15 Scenario 2 Threat Events and App Reputation McAfee EMM DMZ Server Average memory utilization 28% Average CPU utilization - 48% McAfee EMM Hub Server Average memory utilization 12% Average CPU utilization - 18% Legend: # of concurrent connections; Scale Memory consumption: % committed bytes in use; Scale 1 % CPU utilization; Scale
16 McAfee epo Server Average memory utilization: 10% Average CPU utilization: 1.2% Legend: Memory consumption: % committed bytes in use; Scale 1 % CPU utilization; Scale 1.0 SQL Server Average memory utilization: 52% Average CPU utilization: 10% Average user connections: 52 Legend: User connections; Scale 1.0 Memory consumption: % committed bytes in use; Scale 1 % CPU utilization; Scale
17 Scenario 3 Enterprise Wi-Fi and VPN configuration (PKI) McAfee EMM DMZ Server Average memory utilization 52% Average CPU utilization - 9% McAfee EMM Hub Server Average memory utilization 21% Average CPU utilization - 19% Legend: # of concurrent connections; Scale Memory consumption: % committed bytes in use; Scale 1 % CPU utilization; Scale
18 McAfee epo Server Average memory utilization: 11% Average CPU utilization: 21% Legend: Memory consumption: % committed bytes in use; Scale 1 % CPU utilization; Scale 1.0 SQL Server Average memory utilization: 27% Average CPU utilization: 10% Average user connections: 50 Legend: User connection; Scale 1.0 Memory consumption: % committed bytes in use; Scale 1 % CPU utilization; Scale
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
More informationHow To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)
Scalability Results Select the right hardware configuration for your organization to optimize performance Table of Contents Introduction... 1 Scalability... 2 Definition... 2 CPU and Memory Usage... 2
More informationHow To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device
Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee
More informationmsuite5 & mdesign Installation Prerequisites
CommonTime Limited msuite5 & mdesign Installation Prerequisites Administration considerations prior to installing msuite5 and mdesign. 7/7/2011 Version 2.4 Overview... 1 msuite version... 1 SQL credentials...
More informationMcAfee Agent Handler
McAfee Agent Handler COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into
More informationHardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software
Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationVirtualization Guide. McAfee Vulnerability Manager Virtualization
Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee MOVE AntiVirus 2.6.0
Deployment Guide McAfee MOVE AntiVirus 2.6.0 For use with epolicy Orchestrator 4.5.0, 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationWhen your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
More informationTroubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
More informationSystem Requirements Table of contents
Table of contents 1 Introduction... 2 2 Knoa Agent... 2 2.1 System Requirements...2 2.2 Environment Requirements...4 3 Knoa Server Architecture...4 3.1 Knoa Server Components... 4 3.2 Server Hardware Setup...5
More informationDragon Medical Enterprise Network Edition Technical Note: Requirements for DMENE Networks with virtual servers
Dragon Medical Enterprise Network Edition Technical Note: Requirements for DMENE Networks with virtual servers This section includes system requirements for DMENE Network configurations that utilize virtual
More informationIgnify ecommerce. Item Requirements Notes
wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor
More informationPerformance Testing of Java Enterprise Systems
Performance Testing of Java Enterprise Systems Katerina Antonova, Plamen Koychev Musala Soft Why Performance Testing? Recent studies by leading USA consultancy companies showed that over 80% of large corporations
More informationVMware vcloud Automation Center 6.0
VMware 6.0 Reference Architecture TECHNICAL WHITE PAPER Table of Contents Overview... 4 Initial Deployment Recommendations... 4 General Recommendations... 4... 4 Load Balancer Considerations... 4 Database
More informationMcAfee Enterprise Mobility Management 12.0 Software
Installation Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator 4.6.7-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationwww.airpatrolcorp.com 2012 AirPatrol Corporation White Paper: Wireless Endpoint Security
www.airpatrolcorp.com 2012 AirPatrol Corporation To enhance productivity and efficiency, employees are increasingly turning to wireless devices and networks to get the job done. The security experts at
More informationBest Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software
Best Practices Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationData Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationUnprecedented Malware Growth
McAfee epolicy Orchestrator 4.5 Best Practices Sumeet Gohri Mid-Atlantic Sales Engineer McAfee User Group meeting organized by MEEC Agenda 9:30 am 9:45 am Welcome 9:45 am - 11:00 am epo 11:00 am 11:15
More informationAuditMatic Enterprise Edition Installation Specifications
Enterprise Edition Installation Specifications Version: 4.0 Copyright 2005 F.A.S., Inc. All rights reserved. Copyright 2008 F.A.S., Inc. All rights reserved. Copyright Notice Information contained in this
More informationVMware vcloud Automation Center 6.1
VMware vcloud Automation Center 6.1 Reference Architecture T E C H N I C A L W H I T E P A P E R Table of Contents Overview... 4 What s New... 4 Initial Deployment Recommendations... 4 General Recommendations...
More informationVirtual Server and Storage Provisioning Service. Service Description
RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...
More informationServer Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
More informationSQL diagnostic manager Management Pack for Microsoft System Center. Overview
Overview What is so cool about the SQL diagnostic manager Management Pack? The SQL diagnostic manager (SQLdm) Management Pack integrates key monitors and alerts used by SQL Server DBAs with Microsoft's
More informationPerformance Analysis and Capacity Planning Whitepaper
Performance Analysis and Capacity Planning Whitepaper Contents P E R F O R M A N C E A N A L Y S I S & Executive Summary... 3 Overview... 3 Product Architecture... 4 Test Environment... 6 Performance Test
More informationUsing VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems
Using VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems Applied Technology Abstract By migrating VMware virtual machines from one physical environment to another, VMware VMotion can
More informationGRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
More informationMcAfee Network Security Platform 8.2
8.2.7.71-8.2.3.84 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.2 Revision B Contents About this release New features Enhancements Resolved Issues Installation instructions Known
More informationPerformance in the Infragistics WebDataGrid for Microsoft ASP.NET AJAX. Contents. Performance and User Experience... 2
Performance in the Infragistics WebDataGrid for Microsoft ASP.NET AJAX An Infragistics Whitepaper Contents Performance and User Experience... 2 Exceptional Performance Best Practices... 2 Testing the WebDataGrid...
More informationCA MDM MOBILE DEVICE MANAGEMENT
CA MDM MOBILE DEVICE MANAGEMENT Introduction, Setup and Troubleshooting of the Relay server and RSOE CAMDM Versions: 2014Q1, 2014Q1 SP1 Introduction to Relay Server and RSOE (relay server outbound enabler)
More informationMulti-Tenant Scalability Guidance for Exchange Server 2010 Service Pack 2
Multi-Tenant Scalability Guidance for Exchange Server 2010 Service Pack 2 Customer Advisory Team Exchange Product Group Microsoft Corporation December 2011 Contents Introduction... 3 Scalability Guidance...
More informationVMware vrealize Automation
VMware vrealize Automation Reference Architecture Version 6.0 and Higher T E C H N I C A L W H I T E P A P E R Table of Contents Overview... 4 What s New... 4 Initial Deployment Recommendations... 4 General
More informationVirtual Desktops Security Test Report
Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January
More informationIntroducing the Microsoft IIS deployment guide
Deployment Guide Deploying Microsoft Internet Information Services with the BIG-IP System Introducing the Microsoft IIS deployment guide F5 s BIG-IP system can increase the existing benefits of deploying
More informationCertification Report
Certification Report McAfee Enterprise Mobility Management 12.0 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
More informationEstimate Performance and Capacity Requirements for Workflow in SharePoint Server 2010
Estimate Performance and Capacity Requirements for Workflow in SharePoint Server 2010 This document is provided as-is. Information and views expressed in this document, including URL and other Internet
More informationInformatica Data Director Performance
Informatica Data Director Performance 2011 Informatica Abstract A variety of performance and stress tests are run on the Informatica Data Director to ensure performance and scalability for a wide variety
More informationIntroduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
More informationInteract Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
More informationKronos Workforce Central on VMware Virtual Infrastructure
Kronos Workforce Central on VMware Virtual Infrastructure June 2010 VALIDATION TEST REPORT Legal Notice 2010 VMware, Inc., Kronos Incorporated. All rights reserved. VMware is a registered trademark or
More informationBernie Velivis President, Performax Inc
Performax provides software load testing and performance engineering services to help our clients build, market, and deploy highly scalable applications. Bernie Velivis President, Performax Inc Load ing
More informationWhite Paper. Scalability Results. Select the hardware configuration that s right for your organization to optimize performance
White Paper Scalability Results Select the hardware configuration that s right for your organization to optimize performance Table of Contents Introduction... 3 Scalability... 3 Definition... 3 CPU and
More informationSharePoint 2013 Infrastructure Planning
SharePoint 2013 Infrastructure Planning SharePoint Configuration March 3, 2014 SharePoint 2013 Infrastructure Planning Confidential and Proprietary Information Entire contents Scholantis Learning Software
More informationWatchDox SharePoint Beta Guide. Application Version 1.0.0
Application Version 1.0.0 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationHigh Availability with Elixir
High Availability with Elixir High Availability High-availability clusters (also known as HA Clusters or Failover Clusters) are computer clusters that are implemented primarily for the purpose of providing
More informationMcAfee Enterprise Mobility Management 11.0 Software
Installation Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationVMware vrealize Automation
VMware vrealize Automation Reference Architecture Version 6.0 or Later T E C H N I C A L W H I T E P A P E R J U N E 2 0 1 5 V E R S I O N 1. 5 Table of Contents Overview... 4 What s New... 4 Initial Deployment
More informationZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationContents. Introduction...3. Designing the Virtual Infrastructure...5. Virtual Infrastructure Implementation... 12. Summary... 14
Contents Introduction...3 Leveraging Virtual Infrastructure...4 Designing the Virtual Infrastructure...5 Design Overview...5 Design Considerations...5 Design Decisions...9 Virtual Infrastructure Implementation...
More informationMcAfee Certified Product Specialist McAfee epolicy Orchestrator
McAfee Certified Product Specialist McAfee epolicy Orchestrator Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 3 Recommended Exam Preparation 4 Exam Objectives
More informationSpecial Edition for Loadbalancer.org GmbH
IT-ADMINISTRATOR.COM 09/2013 The magazine for professional system and network administration Special Edition for Loadbalancer.org GmbH Under Test Loadbalancer.org Enterprise VA 7.5 Load Balancing Under
More informationTuning Tableau Server for High Performance
Tuning Tableau Server for High Performance I wanna go fast PRESENT ED BY Francois Ajenstat Alan Doerhoefer Daniel Meyer Agenda What are the things that can impact performance? Tips and tricks to improve
More informationBLACKBOARD LEARN TM AND VIRTUALIZATION Anand Gopinath, Software Performance Engineer, Blackboard Inc. Nakisa Shafiee, Senior Software Performance
BLACKBOARD LEARN TM AND VIRTUALIZATION Anand Gopinath, Software Performance Engineer, Blackboard Inc. Nakisa Shafiee, Senior Software Performance Engineer, Blackboard Inc.. Introduction Anand Gopinath
More informationMcAfee epolicy Orchestrator
Best Practices Guide McAfee epolicy Orchestrator for use with epolicy Orchestrator versions 4.5.0 and 4.0.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be
More informationCVE-401/CVA-500 FastTrack
CVE-401/CVA-500 FastTrack Description The CVE-400-1I Engineering a Citrix Virtualization Solution course teaches Citrix engineers how to plan for and perform the tasks necessary to successfully integrate
More informationRecommended Recommended for all environments. Apply this update at the earliest convenience.
Release Notes McAfee Enterprise Mobility Management 11.0 Patch 4 About this document About this release Bug fixes and enhancement Installation instructions Files affected by patch Troubleshooting installation
More informationMicrosoft Exchange Solutions on VMware
Design and Sizing Examples: Microsoft Exchange Solutions on VMware Page 1 of 19 Contents 1. Introduction... 3 1.1. Overview... 3 1.2. Benefits of Running Exchange Server 2007 on VMware Infrastructure 3...
More informationMDM Multidomain Edition (Version 9.6.0) For Microsoft SQL Server Performance Tuning
MDM Multidomain Edition (Version 9.6.0) For Microsoft SQL Server Performance Tuning 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic,
More informationWHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
2 WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.3 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
More informationMcAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
More informationProduct Guide. McAfee epolicy Orchestrator 5.3.0 Software
Product Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationINUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture
More informationAsta Powerproject Enterprise
Asta Powerproject Enterprise Overview and System Requirements Guide Asta Development plc Kingston House Goodsons Mews Wellington Street Thame Oxfordshire OX9 3BX United Kingdom Tel: +44 (0)1844 261700
More informationMcAfee Content Security Reporter 2.0.0
Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationInformatica Master Data Management Multi Domain Hub API: Performance and Scalability Diagnostics Checklist
Informatica Master Data Management Multi Domain Hub API: Performance and Scalability Diagnostics Checklist 2012 Informatica Corporation. No part of this document may be reproduced or transmitted in any
More informationSystem requirements. for Installation of LANDESK Service Desk 2016. Clarita-Bernhard-Str. 25 D 81249 Muenchen. Magelan GmbH
System requirements for Installation of LANDESK Service Desk 2016 Created by: Magelan GmbH Magelan GmbH Clarita-Bernhard-Str. 25 D 81249 Muenchen Version Version Date Author Description 1.0 22.11.2012
More informationContent Repository Benchmark Loading 100 million documents
Content Repository Benchmark Loading 100 million documents Goal The goal of this benchmark is to prove that the Content Repository is scalable enough to be called Enterprise Content Repository. To achieve
More informationDeploying F5 BIG-IP Virtual Editions in a Hyper-Converged Infrastructure
Deploying F5 BIG-IP Virtual Editions in a Hyper-Converged Infrastructure Justin Venezia Senior Solution Architect Paul Pindell Senior Solution Architect Contents The Challenge 3 What is a hyper-converged
More information( ) ( ) TECHNOLOGY BRIEF. XTNDConnect Server: Scalability SCALABILITY REFERS TO HOW WELL THE SYSTEM ADAPTS TO INCREASED DEMANDS AND A GREATER
TECHNOLOGY BRIEF XTNDConnect Server: Scalability An important consideration for IT professionals when choosing a server-based synchronization solution is that of scalability. Scalability refers to how
More informationEnterprise Deployment: Laserfiche 8 in a Virtual Environment. White Paper
Enterprise Deployment: Laserfiche 8 in a Virtual Environment White Paper August 2008 The information contained in this document represents the current view of Compulink Management Center, Inc on the issues
More informationWhite Paper on Consolidation Ratios for VDI implementations
White Paper on Consolidation Ratios for VDI implementations Executive Summary TecDem have produced this white paper on consolidation ratios to back up the return on investment calculations and savings
More informationThis presentation provides an overview of the architecture of the IBM Workload Deployer product.
This presentation provides an overview of the architecture of the IBM Workload Deployer product. Page 1 of 17 This presentation starts with an overview of the appliance components and then provides more
More informationSymantec Secure Email Proxy Administration Guide
Symantec Secure Email Proxy Administration Guide Documentation version: 4.4 (2) Legal Notice Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationNetIQ Access Manager 4.1
White Paper NetIQ Access Manager 4.1 Performance and Sizing Guidelines Performance, Reliability, and Scalability Testing Revisions This table outlines all the changes that have been made to this document
More informationOBSERVEIT DEPLOYMENT SIZING GUIDE
OBSERVEIT DEPLOYMENT SIZING GUIDE The most important number that drives the sizing of an ObserveIT deployment is the number of Concurrent Connected Users (CCUs) you plan to monitor. This document provides
More informationBest Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software
Best Practices Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationCentralized Orchestration and Performance Monitoring
DATASHEET NetScaler Command Center Centralized Orchestration and Performance Monitoring Key Benefits Performance Management High Availability (HA) Support Seamless VPX management Enables Extensible architecture
More informationMcAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More information1. Server 2008 - Microsoft FEP 2010 - Instalation
1. Server 2008 - Microsoft FEP 2010 - Instalation 1 2. Windows XP x86 (32bit) - Microsoft FEP 2010 Instalation 2 3 2.1. 4 System Requirements Microsoft Forefront Endpoint Protection 2010 1 System Requirements
More informationAqua Connect Load Balancer User Manual (Mac)
Aqua Connect Load Balancer User Manual (Mac) Table of Contents About Aqua Connect Load Balancer... 3 System Requirements... 4 Hardware... 4 Software... 4 Installing the Load Balancer... 5 Configuration...
More informationscalability OneBridge
scalability OneBridge Mobile Groupware technical brief An important consideration for IT professionals when choosing a server-based synchronization solution is that of scalability. Scalability refers to
More informationTerminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools
Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the
More informationZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationBlackBerry Enterprise Service 10. Version: 10.2. Installation Guide
BlackBerry Enterprise Service 10 Version: 10.2 Installation Guide Published: 2015-08-17 SWD-20150817115607897 Contents 1 About this guide...5 2 What is BlackBerry Enterprise Service 10?... 6 Key features
More informationEsri ArcGIS Server 10 for VMware Infrastructure
Esri ArcGIS Server 10 for VMware Infrastructure October 2011 DEPLOYMENT AND TECHNICAL CONSIDERATIONS GUIDE Table of Contents Introduction... 3 Esri ArcGIS Server 10 Overview.... 3 VMware Infrastructure
More informationQlik Sense Enabling the New Enterprise
Technical Brief Qlik Sense Enabling the New Enterprise Generations of Business Intelligence The evolution of the BI market can be described as a series of disruptions. Each change occurred when a technology
More informationScaling out a SharePoint Farm and Configuring Network Load Balancing on the Web Servers. Steve Smith Combined Knowledge MVP SharePoint Server
Scaling out a SharePoint Farm and Configuring Network Load Balancing on the Web Servers Steve Smith Combined Knowledge MVP SharePoint Server Scaling out a SharePoint Farm and Configuring Network Load Balancing
More informationBest Practices & Deployment SurfControl Mobile Filter v 5.0.2.60
Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 rev2.1, January 2006 Pre-Installation Guide Notice 2006 SurfControl. All rights reserved. SurfControl, SurfControl E-mail Filter, SurfControl
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationApp Orchestration Setup Checklist
App Orchestration Setup Checklist This checklist is a convenient tool to help you plan and document your App Orchestration deployment. Use this checklist along with the Getting Started with Citrix App
More informationBlackBerry Enterprise Service 10 version 10.2 preinstallation and preupgrade checklist
BlackBerry Enterprise Service version.2 preinstallation and preupgrade checklist Verify that the following requirements are met before you install or upgrade to BlackBerry Enterprise Service version.2.
More informationQuickStart Guide vcenter Server Heartbeat 5.5 Update 2
vcenter Server Heartbeat 5.5 Update 2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
More informationIntroduction 1 Performance on Hosted Server 1. Benchmarks 2. System Requirements 7 Load Balancing 7
Introduction 1 Performance on Hosted Server 1 Figure 1: Real World Performance 1 Benchmarks 2 System configuration used for benchmarks 2 Figure 2a: New tickets per minute on E5440 processors 3 Figure 2b:
More informationMcAfee VirusScan and epolicy Orchestrator Administration Course
McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from
More informationDMS Performance Tuning Guide for SQL Server
DMS Performance Tuning Guide for SQL Server Rev: February 13, 2014 Sitecore CMS 6.5 DMS Performance Tuning Guide for SQL Server A system administrator's guide to optimizing the performance of Sitecore
More informationUptime Infrastructure Monitor. Installation Guide
Uptime Infrastructure Monitor Installation Guide This guide will walk through each step of installation for Uptime Infrastructure Monitor software on a Windows server. Uptime Infrastructure Monitor is
More information