McAfee Enterprise Mobility Management Performance and Scalability Guide

Size: px
Start display at page:

Download "McAfee Enterprise Mobility Management 12.0. Performance and Scalability Guide"

Transcription

1 McAfee Enterprise Mobility Management 12.0 Performance and Scalability Guide

2 Contents Purpose... 1 Executive Summary... 1 Testing Process... 1 Test Scenarios... 2 Scenario 1 Basic Provisioning and Sync... 2 Scenario 2 Threat Events and Application Compliance... 2 Scenario 3 Enterpirse Wi-Fi and VPN configuration (PKI)... 3 McAfee EMM 12.0 Architecture... 3 Test Environment... 4 Software... 4 Hardware... 4 System configuration... 4 External Influences on McAfee EMM 12.0 Scalability Limit... 4 McAfee epo Agent Handler Connection Limit... 5 McAfee EMM Deployment and Configuration Options... 5 Minimum Hardware Configuration... 6 Minimum McAfee EMM Server Deployment... 6 Software Configuration... 6 Performance Tuning... 6 Additional Performance Tuning PKI... 7 Sample Configuration for 10k Devices... 9 Alternate Configuration for 10k Devices (Tested)... 9 Alternate Configuration for 20k Devices (Tested) Test Results Scenario 1 Basic Provisioning and Sync Scenario 2 Threat Events and App Reputation Scenario 3 Enterprise Wi-Fi and VPN configuration (PKI)... 15

3 Purpose This document provides the performance and scalability test results for McAfee Enterprise Mobility Management 12.0 (McAfee EMM ). It is intended as a guideline for customers implementing McAfee EMM in networks with more than 3,000 devices. Executive Summary McAfee EMM can support up to 3,000 devices using the minimum system requirements defined in the data sheet and website. McAfee EMM can support up to a maximum of 20,000 concurrent mobile devices, regardless of the number of servers deployed in a single environment. This document describes the test scenarios and results, and explains the McAfee EMM configuration required to support up to 20,000 concurrent devices. For customers who intend to support between 10,000 and 20,000 mobile devices, with failover and redundancy, we recommend: Use McAfee epolicy Orchestrator (McAfee epo) server or later. Follow the recommended configurations in this document based on the projected total number of devices expected. Install only McAfee EMM on servers used to run the software. No other IIS services can co-exist Install McAfee EMM and McAfee epo on separate servers. The McAfee EMM and McAfee epo databases can co-exist on a single database server as long as the server is dedicated to only those products and appropriate redundancy is configured. Testing Process In order to mirror real-world usage, testing included the following common functions: Provisioning and enrollment of devices sync Policy update MDM check-in App compliance App blacklisting Threat events Provisioning with enterprise Wi-Fi and VPN certificate profiles (PKI environments) 1

4 Test Scenarios Simulated devices for each scenario included 70 percent ios and 30 percent Android devices. Scenario 1 Basic Provisioning and Sync Tests Provisioning sync Policy update Description Mobile devices were enrolled (provisioned) at a rate of one device every second. After ramping up to the target load of 20,000 devices, the system remained in sustaining mode for over 24 hours and the systems were monitored for: - Provisioning success - sync availability - System health, including CPU and memory utilization Note: Provisioning devices does not affect overall performance. Our tests involved provisioning devices much more quickly than would be expected in a real-world setting in order to more rapidly increase the number of devices in our test bed. Scenario 2 Threat Events and Application Compliance Tests Blacklisted app Malicious app (App reputation) Malware (as detected by VirusScan Mobile Security) Description Ten percent of Android and ios devices had a blacklisted app installed. The devices became non-compliant and a threat event was generated. Then, the blacklisted app was removed and the devices became compliant. Twenty-five percent of Android devices had a malicious app based on the app protection (reputation) score. The devices became noncompliant and a threat event was generated. Then, the malicious app was removed and the devices became compliant. Twenty-five percent of Android devices had malware based on McAfee VirusScan Mobile detection. The devices became noncompliant and a threat event was generated. Then, the malware was removed and the devices became compliant. 2

5 Scenario 3 Enterpirse Wi-Fi and VPN configuration (PKI) Tests Provisioning sync Description This scenario simulated provisioning one device every two seconds. McAfee epo policy was configured with a PKI-enabled profile, where each device got one enterprise Wi-Fi and one enterprise VPN configuration with a different certificate template for each. After ramping up to the target load of 20,000 devices, the system was maintained in sustaining mode for over 24 hours and the systems monitored for: Provisioning success sync availability System health, including CPU and memory utilization McAfee EMM 12.0 Architecture The diagram below illustrates a typical high-level architecture for a McAfee EMM deployment with Enterprise ActiveSync proxy server or servers in the DMZ and a Hub or Hubs in the internal network. 3

6 Test Environment This section describes how the load test environment was configured to run the three scenarios. All test machines were McAfee epo managed nodes with McAfee VirusScan Enterprise and McAfee Agent installed. Software SimDevice Tool used to simulate ios and Android devices Perfmon Tool used to collect performance metrics SQL Management Scripts to monitor metrics and database health Operating System: Windows 2008 R2 SP1, Windows 2012 Exchange Server: Exchange 2007, 2010, 2014 Hardware All test servers were virtual machines using VMware on ESX server. An F5 Big IP hardware load balancer was placed in front of the Exchange CAS array. - F5 was configured with an SSL pass-through rule. - F5 was configured to load balance with equal load across all servers. - Keep alive connections timeout setting was set to 5 minutes. System configuration McAfee EMM Servers Quad Core CPU 8GB RAM 100GB hard disk space McAfee epo Server Quad Core CPU 16GB RAM 100GB hard disk space SQL Server 16 Core CPU 32GB RAM 300GB dedicated database disk space External Influences on McAfee EMM 12.0 Scalability Limit The scalability limit of 20,000 devices depends on two important factors: McAfee epo Agent Handler connection. IIS concurrent connections limit. 4

7 McAfee epo Agent Handler Connection Limit All requests from a device, including initial provisioning and any ad-hoc or periodic updates, are pushed from McAfee EMM to McAfee epo as properties updates via McAfee epo Agent communications. Special threads on the McAfee EMM Hub queue requests and push them to McAfee epo at configured intervals. Various tests revealed that the McAfee epo Agent connection could withstand up to a maximum of four McAfee EMM threads pushing properties. McAfee EMM requires constant communication to keep devices connected. This results in McAfee EMM communicating with the McAfee epo Agent more than other integrated products and is the reason for limiting the number of McAfee EMM Hub threads to four. Each McAfee EMM Hub server is configured by default to run on one IIS worker process and each process runs one property update thread. Therefore, there can be no more than four McAfee EMM Hub servers with the default configuration or two McAfee EMM Hub servers running two IIS worker processes each. Microsoft IIS concurrent Connections Limit Microsoft IIS has a known limitation in application pools whereby no more than 5,000 concurrent connections can be handled per worker process. The McAfee EMM Hub server, during the course of normal operation with 20k devices, sees a maximum of 1,500 concurrent connections, and an average of 15. Therefore, the chances of the McAfee EMM Hub reaching the limit of concurrent connections are less than 50 percent. The McAfee EMM DMZ server, during the course of normal operation with 20k devices, has higher chances of reaching the concurrent connections limit due to the McAfee EMM Proxy component, which services Exchange ActiveSync requests ( sync). Exchange ActiveSync traffic supports keep-alive connections, called push (ping), that are used to automatically push new s to devices without user intervention. These keep-alive connections can stay open for up to 60 minutes. Since the McAfee EMM Proxy acts as a proxy between a device and the Exchange server, this component has to maintain keepalive connections, which makes it 80 percent likely to hit the concurrent limit. In order to support more than 5,000 devices per McAfee EMM Proxy, additional McAfee EMM servers or additional IIS worker processes must be added. Refer to Performance Tuning for more details. McAfee EMM Deployment and Configuration Options To support between 3,000 and 20,000 mobile devices, McAfee EMM and McAfee epo servers require specific hardware and software configuration with additional performance tuning. 5

8 Minimum Hardware Configuration McAfee EMM Servers Quad Core CPU 8GB RAM 100GB hard disk space McAfee epo Server Quad Core CPU 16GB RAM 100GB hard disk space SQL Server 16 Core CPU 32GB RAM 300GB dedicated database disk space Minimum McAfee EMM Server Deployment McAfee EMM in dual server configuration Two McAfee EMM DMZ servers and two McAfee EMM Hub servers Hardware Load Balancer (such as F5) configured in front of both the DMZ and the Hub servers Software Configuration McAfee epo or later Maximum SQL Server memory configured at 75 percent of actual physical memory (based on Microsoft SQL recommendation) Performance Tuning McAfee EMM servers can be configured in two ways to achieve scalability needs. The most common method is adding more servers. Apart from this option, each McAfee EMM server can be fine-tuned to increase the number of devices it can support at an application level. This can be achieved by increasing the number of worker process in the IIS application pool. The following formula can be used to determine the number of worker processes needed based on the maximum number of devices. On DMZ Servers Calculate minimum number of worker process per 1 DMZ server as rounding of: ((# of Device/5000) * 80%) - Example for 10k devices: (10000/5000)*80% = 1.6 = 2 worker processes - Example for 20k devices: (20000/5000)*80% = 3.2 = 3 worker processes The 80 percent factor is due to the IIS concurrent connections limit explained in External Influence on McAfee EMM 12.0 Scalability Limit. Configure the following properties on MSExchnageSyncAppPool IIS Application pool: - Process Model: Maximum Worker Process: <as calculated above> - Process Model: Queue Length:

9 - Process Model: Ping Enabled: False - Recycling: Regular Time Interval (Minutes): 0 Additionally, based on Microsoft best practices, there should be no more than five worker processes on each DMZ server. On Internal Servers Calculate minimum number of worker process per 1 Hub server as rounding of: ((# of Device/5000) * 50%) - Example for 10k devices: (10000/5000)*50% = 1 = 1 worker process - Example for 20k devices: (20000/5000)*50% = 2 = 2 worker processes The 50 percent factor is due to IIS concurrent connections limit explained under External Influence on McAfee EMM 12.0 Scalability Limit. Configure the following properties on EMMHubPool IIS Application pool: - Process Model: Maximum Worker Process: <as calculated above> Process Model: Queue Length: Process Model: Ping Enabled: False - Recycling: Regular Time Interval (Minutes): 0 Additionally, based on Microsoft best practices, there should be no more than four worker processes in total on all McAfee EMM Hub servers. For example, if there are two Hubs, you cannot have more than two worker processes on each Hub. This is due to the McAfee epo data channel limit explained under External Influence on McAfee EMM 12.0 Scalability Limit. The following change has to be made on each McAfee EMM Internal server configured to use more than one IIS worker process 1 Navigate to the McAfee EMM Hub Installation folder (c:\program Files (x86)\mcafee\emm Platform\EMM Hub). 2 Save a copy of the web.config file and open it for editing. 3 Search for the string WorkerProcessThreads_UseMutex and set the value to true. 4 Save the config file and reset IIS. Note: This approach helps increase scalability on an individual set of McAfee EMM servers. However, it does not address load balancing and high availability. To address high availability and load balancing needs, additional McAfee EMM servers should be added behind existing hardware load balancers Refer to the Knowledge Base article, Guideline for configuring load balancing in a McAfee EMM HA environment. Refer to the Knowledge base article, How to install McAfee EMM in High Availability Mode. Additional Performance Tuning PKI In a PKI environment, each device provisioning request results in an additional call to McAfee epo to request a client certificate. Therefore, the McAfee EMM server initiates connection to the McAfee epo Agent more often than the basic provisioning and threat event scenarios. To allow McAfee EMM and McAfee epo to scale up to 20,000 devices in PKI enabled environments, we must reduce the interval at which device properties are pushed to McAfee 7

10 epo via the Agent Handler connection. This interval can be set from the McAfee epo Console (Server Settings Enterprise Mobility Manager General Settings EMM Hub-toePO communication interval). Change this interval from 60 minutes to 1440 minutes (24 hours). 8

11 Sample Configuration for 10k Devices 3 DMZ servers 1 worker process each 2 Internal servers 1 worker process each Alternate Configuration for 10k Devices (Tested) 2 DMZ servers 2 worker processes each 2 Internal servers 1 worker process each 9

12 Sample Configuration for 20k Devices 5 DMZ servers 1 worker process each 4 Internal servers 1 worker process each Alternate Configuration for 20k Devices (Tested) 2 DMZ servers 3 worker process each 2 Internal servers 2 worker process each Note: A maximum of five worker processes is supported per DMZ server (Proxy) and a total of four worker processes is supported across all internal servers (Hubs). 10

13 Test Results Test results were recorded for the target load of 20,000 devices. Initial ramp-up of devices to the target load took approximately 14 hours. At the target load of 20,000 devices, the test was maintained in sustaining mode for more than three days. Scenario 1 Basic Provisioning and Sync McAfee EMM DMZ Server Average memory utilization: 40% Average CPU utilization: 11% McAfee EMM Hub Server Average memory utilization: 14% Average CPU utilization: 23% Legend: # of concurrent connections; Scale Memory consumption: % committed bytes in use; Scale 1 % CPU utilization; Scale

14 SQL Server Average memory utilization: 71% Average CPU utilization: 16% Average User Connections: 52 Legend: User connections; Scale 1.0 Memory consumption: % committed bytes in use; Scale 1 % CPU utilization; Scale

15 Scenario 2 Threat Events and App Reputation McAfee EMM DMZ Server Average memory utilization 28% Average CPU utilization - 48% McAfee EMM Hub Server Average memory utilization 12% Average CPU utilization - 18% Legend: # of concurrent connections; Scale Memory consumption: % committed bytes in use; Scale 1 % CPU utilization; Scale

16 McAfee epo Server Average memory utilization: 10% Average CPU utilization: 1.2% Legend: Memory consumption: % committed bytes in use; Scale 1 % CPU utilization; Scale 1.0 SQL Server Average memory utilization: 52% Average CPU utilization: 10% Average user connections: 52 Legend: User connections; Scale 1.0 Memory consumption: % committed bytes in use; Scale 1 % CPU utilization; Scale

17 Scenario 3 Enterprise Wi-Fi and VPN configuration (PKI) McAfee EMM DMZ Server Average memory utilization 52% Average CPU utilization - 9% McAfee EMM Hub Server Average memory utilization 21% Average CPU utilization - 19% Legend: # of concurrent connections; Scale Memory consumption: % committed bytes in use; Scale 1 % CPU utilization; Scale

18 McAfee epo Server Average memory utilization: 11% Average CPU utilization: 21% Legend: Memory consumption: % committed bytes in use; Scale 1 % CPU utilization; Scale 1.0 SQL Server Average memory utilization: 27% Average CPU utilization: 10% Average user connections: 50 Legend: User connection; Scale 1.0 Memory consumption: % committed bytes in use; Scale 1 % CPU utilization; Scale

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server) Scalability Results Select the right hardware configuration for your organization to optimize performance Table of Contents Introduction... 1 Scalability... 2 Definition... 2 CPU and Memory Usage... 2

More information

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee

More information

msuite5 & mdesign Installation Prerequisites

msuite5 & mdesign Installation Prerequisites CommonTime Limited msuite5 & mdesign Installation Prerequisites Administration considerations prior to installing msuite5 and mdesign. 7/7/2011 Version 2.4 Overview... 1 msuite version... 1 SQL credentials...

More information

McAfee Agent Handler

McAfee Agent Handler McAfee Agent Handler COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into

More information

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Virtualization Guide. McAfee Vulnerability Manager Virtualization

Virtualization Guide. McAfee Vulnerability Manager Virtualization Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee MOVE AntiVirus 2.6.0

McAfee MOVE AntiVirus 2.6.0 Deployment Guide McAfee MOVE AntiVirus 2.6.0 For use with epolicy Orchestrator 4.5.0, 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work. Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

System Requirements Table of contents

System Requirements Table of contents Table of contents 1 Introduction... 2 2 Knoa Agent... 2 2.1 System Requirements...2 2.2 Environment Requirements...4 3 Knoa Server Architecture...4 3.1 Knoa Server Components... 4 3.2 Server Hardware Setup...5

More information

Dragon Medical Enterprise Network Edition Technical Note: Requirements for DMENE Networks with virtual servers

Dragon Medical Enterprise Network Edition Technical Note: Requirements for DMENE Networks with virtual servers Dragon Medical Enterprise Network Edition Technical Note: Requirements for DMENE Networks with virtual servers This section includes system requirements for DMENE Network configurations that utilize virtual

More information

Ignify ecommerce. Item Requirements Notes

Ignify ecommerce. Item Requirements Notes wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor

More information

Performance Testing of Java Enterprise Systems

Performance Testing of Java Enterprise Systems Performance Testing of Java Enterprise Systems Katerina Antonova, Plamen Koychev Musala Soft Why Performance Testing? Recent studies by leading USA consultancy companies showed that over 80% of large corporations

More information

VMware vcloud Automation Center 6.0

VMware vcloud Automation Center 6.0 VMware 6.0 Reference Architecture TECHNICAL WHITE PAPER Table of Contents Overview... 4 Initial Deployment Recommendations... 4 General Recommendations... 4... 4 Load Balancer Considerations... 4 Database

More information

McAfee Enterprise Mobility Management 12.0 Software

McAfee Enterprise Mobility Management 12.0 Software Installation Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator 4.6.7-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

www.airpatrolcorp.com 2012 AirPatrol Corporation White Paper: Wireless Endpoint Security

www.airpatrolcorp.com 2012 AirPatrol Corporation White Paper: Wireless Endpoint Security www.airpatrolcorp.com 2012 AirPatrol Corporation To enhance productivity and efficiency, employees are increasingly turning to wireless devices and networks to get the job done. The security experts at

More information

Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software

Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software Best Practices Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Unprecedented Malware Growth

Unprecedented Malware Growth McAfee epolicy Orchestrator 4.5 Best Practices Sumeet Gohri Mid-Atlantic Sales Engineer McAfee User Group meeting organized by MEEC Agenda 9:30 am 9:45 am Welcome 9:45 am - 11:00 am epo 11:00 am 11:15

More information

AuditMatic Enterprise Edition Installation Specifications

AuditMatic Enterprise Edition Installation Specifications Enterprise Edition Installation Specifications Version: 4.0 Copyright 2005 F.A.S., Inc. All rights reserved. Copyright 2008 F.A.S., Inc. All rights reserved. Copyright Notice Information contained in this

More information

VMware vcloud Automation Center 6.1

VMware vcloud Automation Center 6.1 VMware vcloud Automation Center 6.1 Reference Architecture T E C H N I C A L W H I T E P A P E R Table of Contents Overview... 4 What s New... 4 Initial Deployment Recommendations... 4 General Recommendations...

More information

Virtual Server and Storage Provisioning Service. Service Description

Virtual Server and Storage Provisioning Service. Service Description RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

SQL diagnostic manager Management Pack for Microsoft System Center. Overview

SQL diagnostic manager Management Pack for Microsoft System Center. Overview Overview What is so cool about the SQL diagnostic manager Management Pack? The SQL diagnostic manager (SQLdm) Management Pack integrates key monitors and alerts used by SQL Server DBAs with Microsoft's

More information

Performance Analysis and Capacity Planning Whitepaper

Performance Analysis and Capacity Planning Whitepaper Performance Analysis and Capacity Planning Whitepaper Contents P E R F O R M A N C E A N A L Y S I S & Executive Summary... 3 Overview... 3 Product Architecture... 4 Test Environment... 6 Performance Test

More information

Using VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems

Using VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems Using VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems Applied Technology Abstract By migrating VMware virtual machines from one physical environment to another, VMware VMotion can

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

McAfee Network Security Platform 8.2

McAfee Network Security Platform 8.2 8.2.7.71-8.2.3.84 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.2 Revision B Contents About this release New features Enhancements Resolved Issues Installation instructions Known

More information

Performance in the Infragistics WebDataGrid for Microsoft ASP.NET AJAX. Contents. Performance and User Experience... 2

Performance in the Infragistics WebDataGrid for Microsoft ASP.NET AJAX. Contents. Performance and User Experience... 2 Performance in the Infragistics WebDataGrid for Microsoft ASP.NET AJAX An Infragistics Whitepaper Contents Performance and User Experience... 2 Exceptional Performance Best Practices... 2 Testing the WebDataGrid...

More information

CA MDM MOBILE DEVICE MANAGEMENT

CA MDM MOBILE DEVICE MANAGEMENT CA MDM MOBILE DEVICE MANAGEMENT Introduction, Setup and Troubleshooting of the Relay server and RSOE CAMDM Versions: 2014Q1, 2014Q1 SP1 Introduction to Relay Server and RSOE (relay server outbound enabler)

More information

Multi-Tenant Scalability Guidance for Exchange Server 2010 Service Pack 2

Multi-Tenant Scalability Guidance for Exchange Server 2010 Service Pack 2 Multi-Tenant Scalability Guidance for Exchange Server 2010 Service Pack 2 Customer Advisory Team Exchange Product Group Microsoft Corporation December 2011 Contents Introduction... 3 Scalability Guidance...

More information

VMware vrealize Automation

VMware vrealize Automation VMware vrealize Automation Reference Architecture Version 6.0 and Higher T E C H N I C A L W H I T E P A P E R Table of Contents Overview... 4 What s New... 4 Initial Deployment Recommendations... 4 General

More information

Virtual Desktops Security Test Report

Virtual Desktops Security Test Report Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January

More information

Introducing the Microsoft IIS deployment guide

Introducing the Microsoft IIS deployment guide Deployment Guide Deploying Microsoft Internet Information Services with the BIG-IP System Introducing the Microsoft IIS deployment guide F5 s BIG-IP system can increase the existing benefits of deploying

More information

Certification Report

Certification Report Certification Report McAfee Enterprise Mobility Management 12.0 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government

More information

Estimate Performance and Capacity Requirements for Workflow in SharePoint Server 2010

Estimate Performance and Capacity Requirements for Workflow in SharePoint Server 2010 Estimate Performance and Capacity Requirements for Workflow in SharePoint Server 2010 This document is provided as-is. Information and views expressed in this document, including URL and other Internet

More information

Informatica Data Director Performance

Informatica Data Director Performance Informatica Data Director Performance 2011 Informatica Abstract A variety of performance and stress tests are run on the Informatica Data Director to ensure performance and scalability for a wide variety

More information

Introduction to the Mobile Access Gateway

Introduction to the Mobile Access Gateway Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

Kronos Workforce Central on VMware Virtual Infrastructure

Kronos Workforce Central on VMware Virtual Infrastructure Kronos Workforce Central on VMware Virtual Infrastructure June 2010 VALIDATION TEST REPORT Legal Notice 2010 VMware, Inc., Kronos Incorporated. All rights reserved. VMware is a registered trademark or

More information

Bernie Velivis President, Performax Inc

Bernie Velivis President, Performax Inc Performax provides software load testing and performance engineering services to help our clients build, market, and deploy highly scalable applications. Bernie Velivis President, Performax Inc Load ing

More information

White Paper. Scalability Results. Select the hardware configuration that s right for your organization to optimize performance

White Paper. Scalability Results. Select the hardware configuration that s right for your organization to optimize performance White Paper Scalability Results Select the hardware configuration that s right for your organization to optimize performance Table of Contents Introduction... 3 Scalability... 3 Definition... 3 CPU and

More information

SharePoint 2013 Infrastructure Planning

SharePoint 2013 Infrastructure Planning SharePoint 2013 Infrastructure Planning SharePoint Configuration March 3, 2014 SharePoint 2013 Infrastructure Planning Confidential and Proprietary Information Entire contents Scholantis Learning Software

More information

WatchDox SharePoint Beta Guide. Application Version 1.0.0

WatchDox SharePoint Beta Guide. Application Version 1.0.0 Application Version 1.0.0 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

High Availability with Elixir

High Availability with Elixir High Availability with Elixir High Availability High-availability clusters (also known as HA Clusters or Failover Clusters) are computer clusters that are implemented primarily for the purpose of providing

More information

McAfee Enterprise Mobility Management 11.0 Software

McAfee Enterprise Mobility Management 11.0 Software Installation Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

VMware vrealize Automation

VMware vrealize Automation VMware vrealize Automation Reference Architecture Version 6.0 or Later T E C H N I C A L W H I T E P A P E R J U N E 2 0 1 5 V E R S I O N 1. 5 Table of Contents Overview... 4 What s New... 4 Initial Deployment

More information

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

Contents. Introduction...3. Designing the Virtual Infrastructure...5. Virtual Infrastructure Implementation... 12. Summary... 14

Contents. Introduction...3. Designing the Virtual Infrastructure...5. Virtual Infrastructure Implementation... 12. Summary... 14 Contents Introduction...3 Leveraging Virtual Infrastructure...4 Designing the Virtual Infrastructure...5 Design Overview...5 Design Considerations...5 Design Decisions...9 Virtual Infrastructure Implementation...

More information

McAfee Certified Product Specialist McAfee epolicy Orchestrator

McAfee Certified Product Specialist McAfee epolicy Orchestrator McAfee Certified Product Specialist McAfee epolicy Orchestrator Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 3 Recommended Exam Preparation 4 Exam Objectives

More information

Special Edition for Loadbalancer.org GmbH

Special Edition for Loadbalancer.org GmbH IT-ADMINISTRATOR.COM 09/2013 The magazine for professional system and network administration Special Edition for Loadbalancer.org GmbH Under Test Loadbalancer.org Enterprise VA 7.5 Load Balancing Under

More information

Tuning Tableau Server for High Performance

Tuning Tableau Server for High Performance Tuning Tableau Server for High Performance I wanna go fast PRESENT ED BY Francois Ajenstat Alan Doerhoefer Daniel Meyer Agenda What are the things that can impact performance? Tips and tricks to improve

More information

BLACKBOARD LEARN TM AND VIRTUALIZATION Anand Gopinath, Software Performance Engineer, Blackboard Inc. Nakisa Shafiee, Senior Software Performance

BLACKBOARD LEARN TM AND VIRTUALIZATION Anand Gopinath, Software Performance Engineer, Blackboard Inc. Nakisa Shafiee, Senior Software Performance BLACKBOARD LEARN TM AND VIRTUALIZATION Anand Gopinath, Software Performance Engineer, Blackboard Inc. Nakisa Shafiee, Senior Software Performance Engineer, Blackboard Inc.. Introduction Anand Gopinath

More information

McAfee epolicy Orchestrator

McAfee epolicy Orchestrator Best Practices Guide McAfee epolicy Orchestrator for use with epolicy Orchestrator versions 4.5.0 and 4.0.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be

More information

CVE-401/CVA-500 FastTrack

CVE-401/CVA-500 FastTrack CVE-401/CVA-500 FastTrack Description The CVE-400-1I Engineering a Citrix Virtualization Solution course teaches Citrix engineers how to plan for and perform the tasks necessary to successfully integrate

More information

Recommended Recommended for all environments. Apply this update at the earliest convenience.

Recommended Recommended for all environments. Apply this update at the earliest convenience. Release Notes McAfee Enterprise Mobility Management 11.0 Patch 4 About this document About this release Bug fixes and enhancement Installation instructions Files affected by patch Troubleshooting installation

More information

Microsoft Exchange Solutions on VMware

Microsoft Exchange Solutions on VMware Design and Sizing Examples: Microsoft Exchange Solutions on VMware Page 1 of 19 Contents 1. Introduction... 3 1.1. Overview... 3 1.2. Benefits of Running Exchange Server 2007 on VMware Infrastructure 3...

More information

MDM Multidomain Edition (Version 9.6.0) For Microsoft SQL Server Performance Tuning

MDM Multidomain Edition (Version 9.6.0) For Microsoft SQL Server Performance Tuning MDM Multidomain Edition (Version 9.6.0) For Microsoft SQL Server Performance Tuning 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic,

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group 2 WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.3 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

McAfee Web Gateway 7.4.1

McAfee Web Gateway 7.4.1 Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this

More information

Product Guide. McAfee epolicy Orchestrator 5.3.0 Software

Product Guide. McAfee epolicy Orchestrator 5.3.0 Software Product Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture

More information

Asta Powerproject Enterprise

Asta Powerproject Enterprise Asta Powerproject Enterprise Overview and System Requirements Guide Asta Development plc Kingston House Goodsons Mews Wellington Street Thame Oxfordshire OX9 3BX United Kingdom Tel: +44 (0)1844 261700

More information

McAfee Content Security Reporter 2.0.0

McAfee Content Security Reporter 2.0.0 Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Informatica Master Data Management Multi Domain Hub API: Performance and Scalability Diagnostics Checklist

Informatica Master Data Management Multi Domain Hub API: Performance and Scalability Diagnostics Checklist Informatica Master Data Management Multi Domain Hub API: Performance and Scalability Diagnostics Checklist 2012 Informatica Corporation. No part of this document may be reproduced or transmitted in any

More information

System requirements. for Installation of LANDESK Service Desk 2016. Clarita-Bernhard-Str. 25 D 81249 Muenchen. Magelan GmbH

System requirements. for Installation of LANDESK Service Desk 2016. Clarita-Bernhard-Str. 25 D 81249 Muenchen. Magelan GmbH System requirements for Installation of LANDESK Service Desk 2016 Created by: Magelan GmbH Magelan GmbH Clarita-Bernhard-Str. 25 D 81249 Muenchen Version Version Date Author Description 1.0 22.11.2012

More information

Content Repository Benchmark Loading 100 million documents

Content Repository Benchmark Loading 100 million documents Content Repository Benchmark Loading 100 million documents Goal The goal of this benchmark is to prove that the Content Repository is scalable enough to be called Enterprise Content Repository. To achieve

More information

Deploying F5 BIG-IP Virtual Editions in a Hyper-Converged Infrastructure

Deploying F5 BIG-IP Virtual Editions in a Hyper-Converged Infrastructure Deploying F5 BIG-IP Virtual Editions in a Hyper-Converged Infrastructure Justin Venezia Senior Solution Architect Paul Pindell Senior Solution Architect Contents The Challenge 3 What is a hyper-converged

More information

( ) ( ) TECHNOLOGY BRIEF. XTNDConnect Server: Scalability SCALABILITY REFERS TO HOW WELL THE SYSTEM ADAPTS TO INCREASED DEMANDS AND A GREATER

( ) ( ) TECHNOLOGY BRIEF. XTNDConnect Server: Scalability SCALABILITY REFERS TO HOW WELL THE SYSTEM ADAPTS TO INCREASED DEMANDS AND A GREATER TECHNOLOGY BRIEF XTNDConnect Server: Scalability An important consideration for IT professionals when choosing a server-based synchronization solution is that of scalability. Scalability refers to how

More information

Enterprise Deployment: Laserfiche 8 in a Virtual Environment. White Paper

Enterprise Deployment: Laserfiche 8 in a Virtual Environment. White Paper Enterprise Deployment: Laserfiche 8 in a Virtual Environment White Paper August 2008 The information contained in this document represents the current view of Compulink Management Center, Inc on the issues

More information

White Paper on Consolidation Ratios for VDI implementations

White Paper on Consolidation Ratios for VDI implementations White Paper on Consolidation Ratios for VDI implementations Executive Summary TecDem have produced this white paper on consolidation ratios to back up the return on investment calculations and savings

More information

This presentation provides an overview of the architecture of the IBM Workload Deployer product.

This presentation provides an overview of the architecture of the IBM Workload Deployer product. This presentation provides an overview of the architecture of the IBM Workload Deployer product. Page 1 of 17 This presentation starts with an overview of the appliance components and then provides more

More information

Symantec Secure Email Proxy Administration Guide

Symantec Secure Email Proxy Administration Guide Symantec Secure Email Proxy Administration Guide Documentation version: 4.4 (2) Legal Notice Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

NetIQ Access Manager 4.1

NetIQ Access Manager 4.1 White Paper NetIQ Access Manager 4.1 Performance and Sizing Guidelines Performance, Reliability, and Scalability Testing Revisions This table outlines all the changes that have been made to this document

More information

OBSERVEIT DEPLOYMENT SIZING GUIDE

OBSERVEIT DEPLOYMENT SIZING GUIDE OBSERVEIT DEPLOYMENT SIZING GUIDE The most important number that drives the sizing of an ObserveIT deployment is the number of Concurrent Connected Users (CCUs) you plan to monitor. This document provides

More information

Best Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software

Best Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software Best Practices Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Centralized Orchestration and Performance Monitoring

Centralized Orchestration and Performance Monitoring DATASHEET NetScaler Command Center Centralized Orchestration and Performance Monitoring Key Benefits Performance Management High Availability (HA) Support Seamless VPX management Enables Extensible architecture

More information

McAfee MOVE AntiVirus Multi-Platform 3.5.0

McAfee MOVE AntiVirus Multi-Platform 3.5.0 Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

1. Server 2008 - Microsoft FEP 2010 - Instalation

1. Server 2008 - Microsoft FEP 2010 - Instalation 1. Server 2008 - Microsoft FEP 2010 - Instalation 1 2. Windows XP x86 (32bit) - Microsoft FEP 2010 Instalation 2 3 2.1. 4 System Requirements Microsoft Forefront Endpoint Protection 2010 1 System Requirements

More information

Aqua Connect Load Balancer User Manual (Mac)

Aqua Connect Load Balancer User Manual (Mac) Aqua Connect Load Balancer User Manual (Mac) Table of Contents About Aqua Connect Load Balancer... 3 System Requirements... 4 Hardware... 4 Software... 4 Installing the Load Balancer... 5 Configuration...

More information

scalability OneBridge

scalability OneBridge scalability OneBridge Mobile Groupware technical brief An important consideration for IT professionals when choosing a server-based synchronization solution is that of scalability. Scalability refers to

More information

Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools

Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the

More information

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

BlackBerry Enterprise Service 10. Version: 10.2. Installation Guide

BlackBerry Enterprise Service 10. Version: 10.2. Installation Guide BlackBerry Enterprise Service 10 Version: 10.2 Installation Guide Published: 2015-08-17 SWD-20150817115607897 Contents 1 About this guide...5 2 What is BlackBerry Enterprise Service 10?... 6 Key features

More information

Esri ArcGIS Server 10 for VMware Infrastructure

Esri ArcGIS Server 10 for VMware Infrastructure Esri ArcGIS Server 10 for VMware Infrastructure October 2011 DEPLOYMENT AND TECHNICAL CONSIDERATIONS GUIDE Table of Contents Introduction... 3 Esri ArcGIS Server 10 Overview.... 3 VMware Infrastructure

More information

Qlik Sense Enabling the New Enterprise

Qlik Sense Enabling the New Enterprise Technical Brief Qlik Sense Enabling the New Enterprise Generations of Business Intelligence The evolution of the BI market can be described as a series of disruptions. Each change occurred when a technology

More information

Scaling out a SharePoint Farm and Configuring Network Load Balancing on the Web Servers. Steve Smith Combined Knowledge MVP SharePoint Server

Scaling out a SharePoint Farm and Configuring Network Load Balancing on the Web Servers. Steve Smith Combined Knowledge MVP SharePoint Server Scaling out a SharePoint Farm and Configuring Network Load Balancing on the Web Servers Steve Smith Combined Knowledge MVP SharePoint Server Scaling out a SharePoint Farm and Configuring Network Load Balancing

More information

Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60

Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 rev2.1, January 2006 Pre-Installation Guide Notice 2006 SurfControl. All rights reserved. SurfControl, SurfControl E-mail Filter, SurfControl

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

App Orchestration Setup Checklist

App Orchestration Setup Checklist App Orchestration Setup Checklist This checklist is a convenient tool to help you plan and document your App Orchestration deployment. Use this checklist along with the Getting Started with Citrix App

More information

BlackBerry Enterprise Service 10 version 10.2 preinstallation and preupgrade checklist

BlackBerry Enterprise Service 10 version 10.2 preinstallation and preupgrade checklist BlackBerry Enterprise Service version.2 preinstallation and preupgrade checklist Verify that the following requirements are met before you install or upgrade to BlackBerry Enterprise Service version.2.

More information

QuickStart Guide vcenter Server Heartbeat 5.5 Update 2

QuickStart Guide vcenter Server Heartbeat 5.5 Update 2 vcenter Server Heartbeat 5.5 Update 2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

Introduction 1 Performance on Hosted Server 1. Benchmarks 2. System Requirements 7 Load Balancing 7

Introduction 1 Performance on Hosted Server 1. Benchmarks 2. System Requirements 7 Load Balancing 7 Introduction 1 Performance on Hosted Server 1 Figure 1: Real World Performance 1 Benchmarks 2 System configuration used for benchmarks 2 Figure 2a: New tickets per minute on E5440 processors 3 Figure 2b:

More information

McAfee VirusScan and epolicy Orchestrator Administration Course

McAfee VirusScan and epolicy Orchestrator Administration Course McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from

More information

DMS Performance Tuning Guide for SQL Server

DMS Performance Tuning Guide for SQL Server DMS Performance Tuning Guide for SQL Server Rev: February 13, 2014 Sitecore CMS 6.5 DMS Performance Tuning Guide for SQL Server A system administrator's guide to optimizing the performance of Sitecore

More information

Uptime Infrastructure Monitor. Installation Guide

Uptime Infrastructure Monitor. Installation Guide Uptime Infrastructure Monitor Installation Guide This guide will walk through each step of installation for Uptime Infrastructure Monitor software on a Windows server. Uptime Infrastructure Monitor is

More information