Introduction to Computer Administration. System Administration
|
|
|
- Charles Shepherd
- 10 years ago
- Views:
Transcription
1 Introduction to Computer Administration System Administration
2 System Administration System Administration Duties of System Administrator Types of Administrators/Users Operating Systems Supporting Administration Windows Unix
3 System Administration What is System Administration Management of the System System Comprise of Computers Hardware (CPU, Printer, Scanner etc) Software o Operating System o Application Software (Business Software, Office Automation, Peach Tree etc) o Management Software (Database / Web / etc) Networks Users Any thing else? What do you understand by Management?
4 System Administration The subject matter of systems administration includes computer systems and the ways people use them in an organization. This entails a knowledge of operating systems and applications, as well as hardware and software troubleshooting, but also knowledge of the purposes for which people in the organization use the computers.
5 Duties of a System Administrator A system administrator's responsibilities might include: Applying operating system updates, patches, and configuration changes. Installing and configuring new hardware and software. Adding, removing, or updating user account information, resetting passwords, etc. System performance tuning.
6 Duties of a System Administrator Responsibility for documenting the configuration of the system. Responsibility for security. Performing routine audits of systems and software. Performing backups. Analyzing system logs and identifying potential issues with computer systems. Troubleshooting any reported problems.
7 Duties of a System Administrator Introducing and integrating new technologies into existing data center environments. Answering technical queries. Insuring that the network infrastructure is up and running
8
9 Types of Administrators/Users In a larger company, following may all be separate positions within a computer support or Information Services (IS) department. In a smaller group they may be shared by a few sysadmins, or even a single person. Database Administrator Network Administrator Security Administrator Web Administrator Technical support computer operator
10 Types of Administrators/Users A database administrator (DBA) maintains a database system, and is responsible for the integrity of the data and the efficiency and performance of the system. A network administrator maintains network infrastructure such as switches and routers, and diagnoses problems with these or with the behavior of network-attached computers. A security administrator is a specialist in computer and network security, including the administration of security devices such as firewalls, as well as consulting on general security measures.
11 Types of Administrators/Users A web administrator maintains web server services (such as IIS or Apache) that allow for internal or external access to web sites. Tasks include managing multiple sites, administering security, and configuring necessary components and software. Responsibilities may also include software change management. Technical support staff respond to individual users' difficulties with computer systems, provide instructions and sometimes training, and diagnose and solve common problems. A computer operator performs routine maintenance and upkeep, such as changing backup tapes or replacing failed drives in a RAID array. Such tasks usually require physical presence in the room with the computer; and while less skilled than sysadmin tasks require a similar level of trust, since the operator has access to possibly sensitive data.
12 Operating Systems Supporting Administration Microsoft Windows History: Microsoft Formed Xenix released by Microsoft MS-DOS 1.0 released with new IBM PC Windows 1.0 released Windows 3.1 released Windows NT 3.1 released (over 6 million lines of code)
13 Operating Systems Supporting Administration Windows NT released Windows 95 released Windows NT 4.0 released Windows 98 released Microsoft announces Windows NT 5.0 will be renamed Windows release of windows 2000 (aka NT 5.0) release of windows XP (aka NT 5.1) release of windows 2003 server
14 Operating Systems Supporting Administration UNIX Early 70s --> AT&T System V Unix (and C developed)--> BSD Unix (U. Cal-Berkley) Today - many variants. Portable and Scalable. HP - HP/UX IBM - AIX Silicon Graphics - Irix Sun Microsystems - SunOS/Solaris For history see:
15 Operating Systems Supporting Administration Sun Microsystems founded. PC Based Unix - solaris, SCO Unix, FreeBSD, NetBSD Linux - Linus Torvalds (Finland) Free/Open. (Red Hat Linux Commercial Version) Debian, another popular version of Linux (freeware)
Unit 10 : An Introduction to Linux OS
Unit 10 : An Introduction to Linux OS Linux is a true 32/64-bit operating system that run on different platforms. It is a multi-user, multi-tasking and time sharing operating system. Linux is a very stable
CSE 265: System and Network Administration. CSE 265: System and Network Administration
CSE 265: System and Network Administration MW 9:10-10:00am Packard 258 F 9:10-11:00am Packard 112 http://www.cse.lehigh.edu/~brian/course/sysadmin/ Find syllabus, lecture notes, readings, etc. Instructor:
CSE 265: System and Network Administration
CSE 265: System and Network Administration MW 1:10-2:00pm Maginnes 105 http://www.cse.lehigh.edu/~brian/course/sysadmin/ Find syllabus, lecture notes, readings, etc. Instructor: Prof. Brian D. Davison
CSE 265: System and Network Administration. CSE 265: System and Network Administration
CSE 265: System and Network Administration WF 9:10-10:00am Packard 258 M 9:10-11:00am Packard 112 http://www.cse.lehigh.edu/~brian/course/sysadmin/ Find syllabus, lecture notes, readings, etc. Instructor:
Chapter 7A. Functions of Operating Systems. Types of Operating Systems. Operating System Basics
Chapter 7A Operating System Basics Functions of Operating Provide a user interface Run programs Manage hardware devices Organized file storage 2 Types of Operating Real-time operating system Very fast
HP Security Assessment Services
HP Security Assessment Services HP Data Center Services Technical data Your corporate information and intellectual property are important assets that you want to protect from unauthorized users. Developing
Citrix ICA UNIX Client Quick Reference Card
Citrix ICA UNIX Client Quick Reference Card. Introduction to the ICA UNIX Client The ICA UNIX Client supports the following systems and versions. Features may vary among the supported platforms. Instructions
24x7 Scheduler Multi-platform Edition 5.2
24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
SCOPE: Role Descriptions/Job Profiles
SCOPE: Role Descriptions/Job Profiles a) Computing Infrastructure 1. Exchange Administrator Assists with ensuring the availability of email servers and applications, configuring new implementations, and
Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.
Chapter 8 Objectives Chapter 8 Operating Systems and Utility Programs Identify the the types types of of system software Summarize the the startup process on on a a personal computer Describe the the functions
Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List
Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List Created on December 20, 2013 Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and
Robot/SCHEDULE Enterprise
Robot/SCHEDULE Enterprise Enterprise Job Scheduling Experience Complete Job Scheduling For Your Enterprise Robot/SCHEDULE Overview With more than 15,000 users worldwide, Robot/ SCHEDULE is the most popular
Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. [email protected].
Fall 2009 Lecture 1 Operating Systems: Configuration & Use CIS345 Introduction to Operating Systems Mostafa Z. Ali [email protected] 1-1 Chapter 1 Introduction to Operating Systems An Overview of Microcomputers
Strategies for Bare Machine Recovery
Strategies for Bare Machine Recovery Protecting Your Mission-Critical Servers Differing BMR Strategies System reinstallation Full system reinstallation using installation CDs (Windows and ITSM client)
BMC BladeLogic Client Automation Installation Guide
BMC BladeLogic Client Automation Installation Guide Supporting BMC BladeLogic Client Automation 8.2.02 January 2013 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
Sun ONE Identity Server Web Policy Agents Release Notes
Sun ONE Identity Server Web Policy Agents Release Notes Version 6.0 SP1 Part Number 816-6860-10 July 2003 These release notes contain important information available at the time of the release of Sun Open
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
Veritas NetBackup 6.0 Database and Application Protection
Veritas NetBackup 6.0 Database and Application Protection Innovative data protection When it comes to database and application recovery, Symantec has a clear goal in mind simplify the complexity of database
Chapter 8 Operating Systems and Utility Programs
Operating Systems What are the functions of an? start the computer provide a user interface manage programs Chapter 8 Operating Systems and Utility Programs administer security control a network manage
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
IBM Tivoli Monitoring for Databases
Enhance the availability and performance of database servers IBM Tivoli Monitoring for Databases Highlights Integrated, intelligent database monitoring for your on demand business Preconfiguration of metric
syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com
syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com Introduction Log messages contain information about the events happening on the hosts.
IBM Internet Scanner software
Uncovering vulnerabilities with speed and precision IBM Internet Scanner software Intelligent scanning agent With dynamic check assignment, IBM Internet Scanner software will identify assets and unearth
To use PowerChute Web Device Manager, the Smart-UPS must connect to your network through one of the following types of servers or workstations:
PowerChute Web Device Manager, Version 2.0.0: Entire contents copyright 2000, American Power Conversion. All rights reserved; reproduction in whole or in part without permission is prohibited. PowerChute
Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List
Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List Created on March 12, 2015 Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and NetBackup
Heroix Longitude Quick Start Guide V7.1
Heroix Longitude Quick Start Guide V7.1 Copyright 2011 Heroix 165 Bay State Drive Braintree, MA 02184 Tel: 800-229-6500 / 781-848-1701 Fax: 781-843-3472 Email: [email protected] Notice Heroix provides
Texas Skyward User Group Conference Skyward Server Management Options Jeffery Thompson
Texas Skyward User Group Conference Skyward Server Management Options Jeffery Thompson Server Management Options Managed Services Overview Secure Cloud Computing (SCC) Hosted Overview OpenEdge Management
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
Veritas NetBackup 6.0 Server Now from Symantec
Veritas NetBackup 6.0 Server Now from Symantec Innovative data protection As the recognized leader for enterprise-class backup and recovery, Veritas NetBackup Server software is designed to help provide
Shipping Products Chart. Contents
Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 7.11e ()... 2 Director Management Console (console
Integrigy Corporate Overview
mission critical applications mission critical security Application and Database Security Auditing, Vulnerability Assessment, and Compliance Integrigy Corporate Overview Integrigy Overview Integrigy Corporation
Microsoft Windows Apple Mac OS X
Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OSX Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-02-12
Clustering in Parallels Virtuozzo-Based Systems
Parallels Clustering in Parallels Virtuozzo-Based Systems Copyright 1999-2009 Parallels Holdings, Ltd. ISBN: N/A Parallels Holdings, Ltd. c/o Parallels Software, Inc. 13755 Sunrise Valley Drive Suite 600
Veritas NetBackup Installation Guide
Veritas NetBackup Installation Guide Windows Release 6.5 12308334 NetBackup Installation Guide Copyright 1998-2007 Symantec Corporation. All rights reserved. NetBackup 6.5 Symantec, the Symantec logo,
Parallels Virtuozzo Containers 4.7 for Linux Readme
Parallels Virtuozzo Containers 4.7 for Linux Readme This document provides the first-priority information about Parallels Virtuozzo Containers 4.7 for Linux and supplements the included documentation.
Ahsay Replication Server v5.5. Administrator s Guide. Ahsay TM Online Backup - Development Department
Ahsay Replication Server v5.5 Administrator s Guide Ahsay TM Online Backup - Development Department October 9, 2009 Copyright Notice Ahsay Systems Corporation Limited 2008. All rights reserved. Author:
IBM RealSecure Server Sensor System Requirements
IBM RealSecure Server Sensor System Requirements Contents of This Document This document describes the system requirements for the current versions of IBM RealSecure Server Sensor components. Overview
Red Hat Network: Monitoring Module Overview
Red Hat Network: Monitoring Module Overview Red Hat has built the next generation of systems management software presenting both highgrowth businesses and service providers with a simple, scalable and
Symantec Critical System Protection Configuration Monitoring Edition Release Notes
Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes The software described in this book
How To Use Ibm Tivoli Composite Application Manager For Response Time Tracking
Track transactions end to end across your enterprise to drive fast response times and help maintain high customer satisfaction IBM Tivoli Composite Application Manager for Response Time Tracking Highlights
SequeLink Server for ODBC Socket
P RODUCT O VERVIEW Server for ODBC Socket Overview DataDirect is highly scalable, server-based middleware that gives you a complete platform for data connectivity. Common Servers offer the performance
Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks
Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server
Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server Hardware Windows Windows NT 4.0 Linux Server Software and
ArcGIS 9. Installing ArcIMS 9 on Red Hat Linux
ArcGIS 9 Installing ArcIMS 9 on Red Hat Linux Table Of Contents Introduction...1 Introduction...1 Overview...2 What s included with ArcIMS 9.0?...2 ArcIMS components...2 Five steps to get ArcIMS up and
ORACLE DATABASE ADMINISTRATOR RESUME
1 of 5 1/17/2015 1:28 PM ORACLE DATABASE ADMINISTRATOR RESUME ORACLE DBA Resumes Please note that this is a not a Job Board - We are an I.T Staffing Company and we provide candidates on a Contract basis.
Diploma in Computer Science
SPECIALIST PROFILE Personal Details Reference: Job Title: Nationality: IT Experience: Qualifications: Languages: CN5191 Senior Linux Engineer British 22 years RedHat Certified Engineer Diploma in Computer
ontune SPA - Server Performance Monitor and Analysis Tool
ontune SPA - Server Performance Monitor and Analysis Tool Product Components - ontune is composed of the Manager; the Agents ; and Viewers Manager - the core ontune component, and installed on the management/viewing
Upon completion of this chapter, you will able to answer the following questions:
CHAPTER 2 Operating Systems Objectives Upon completion of this chapter, you will able to answer the following questions: What is the purpose of an OS? What role do the shell and kernel play? What is the
ICC MANAGED SERVICES can provide maintenance, support, supply and installation on:
www.icc4services.co.uk ICC MANAGED SERVICES offers comprehensive support across the full range of HP, IBM, Sun and Dell systems. We deliver onsite hardware maintenance with a range of service levels and
Release: 1. ICASAS206A Detect and protect from spam and destructive software
Release: 1 ICASAS206A Detect and protect from spam and destructive software ICASAS206A Detect and protect from spam and destructive software Modification History Release Release 1 Comments This Unit first
Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.
NETWORK OPERATING SYSTEM Introduction Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. Network operating
PARALLELS SERVER 4 BARE METAL README
PARALLELS SERVER 4 BARE METAL README This document provides the first-priority information on Parallels Server 4 Bare Metal and supplements the included documentation. TABLE OF CONTENTS 1 About Parallels
Automatic job scheduling software for AIX, HP-UX, Linux, Solaris and Windows
JobQue/X Automatic job scheduling software for AIX, HP-UX, Linux, Solaris and Windows JobQue/X is simple to use, yet powerful automated job scheduling software that defines and schedules interdependent
REXX-like Macro Language for UNIX and Windows
REXX-like Macro Language for UNIX and Windows Product Overview TREEHOUSE SOFTWARE, INC. 2605 Nicholson Road, Suite 1230 Sewickley, PA 15143 Phone: 724.759.7070 Fax: 724.759.7067 E-mail: [email protected]
Detecting a Hacking Attempt
Detecting a Hacking Attempt Speaker: Isaac Thompson Director of Sales Engineering and Training About Prism Microsystems Founded in 1999, headquartered Columbia, Maryland Current Version EventTracker 6
StreamServe Persuasion SP5 Supported platforms and software
StreamServe Persuasion SP5 Supported platforms and software Reference Guide Rev A StreamServe Persuasion SP5 Reference Guide Rev A 2001-2010 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent #7,127,520
DAS (Direct Attached Storage)
Data Storage 101 Data Storage 101 In this guide, we will explain the differences between:» DAS (Direct Attached Storage)» JBOD (Just a Bunch Of Drives)» NAS (Network Attached Storage)» SAN (Storage Area
Computers: Tools for an Information Age
Computers: Tools for an Information Age Chapter 3 Operating Systems: Software in the Background Objectives of Chapter 3 Describe the functions of an Operating System Explain the basics of a personal computer
Chapter 5: System Software: Operating Systems and Utility Programs
Understanding Computers Today and Tomorrow 12 th Edition Chapter 5: System Software: Operating Systems and Utility Programs Learning Objectives Understand the difference between system software and application
Strategies for Bare Machine Recovery
Strategies for Bare Machine Recovery September 2003 2003 Cristie Data Products What Is Bare Machine Recovery? The ability to recover the operating system of a machine to the identical state it was at a
Symantec Server Management Suite 7.6 powered by Altiris technology
Symantec Server Management Suite 7.6 powered by Altiris technology Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Management Overviewview Symantec Server Management
Hamish Whittal, 41. PRESENT POSITION: IT Manager, SAAO, Cape Town.
Hamish Whittal, 41 PRESENT POSITION: IT Manager, SAAO, Cape Town. BACKGROUND I have been involved in the IT industry for over 16 years and over this time have worked in a number of diverse environments,
NetIQ Chariot and Application Scanner for Application Performance Management
John Inverso Product Report 29 September 2003 NetIQ Chariot and Application Scanner for Application Performance Management Summary NetIQ Chariot tests network equipment by generating application-layer
Module 5 Introduction to Processes and Controls
IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development
Microsoft Windows Apple Mac OS X
Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OS X Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-04-02
DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS
DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication
Plesk 8.3 for Linux/Unix Acronis True Image Server Module Administrator's Guide
Plesk 8.3 for Linux/Unix Acronis True Image Server Module Administrator's Guide Revision 1.0 Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 600 Herndon VA 20171 USA Phone: +1 (703)
Shipping Products Chart. Contents
Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 7.11d ()... 2 Director Management Console (console
SNOW LICENSE MANAGER (7.X)... 3
SYSTEM REQUIREMENTS Products Snow License Manager Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner External Data Provider Snow Distribution
SENTINEL MANAGEMENT & MONITORING
MANAGEMENT & MONITORING Network Monitoring Server Monitoring Database Monitoring Application Monitoring End User Response Time Monitoring Virtualisation Monitoring VOIP Monitoring SLA Monitoring Knowing
How To Understand The History Of An Operating System
7 Operating Systems 7.1 Source: Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 7.2 Understand the role of the operating system.
IBM Tivoli Remote Control
Robust remote desktop management across the enterprise IBM Tivoli Remote Control Highlights Enables organizations to Supports Federal Desktop Core remotely manage thousands of Configuration (FDCC) and
Hitachi Backup Services Manager Certified Configurations Guide 6.5
Hitachi Backup Services Manager Certified Configurations Guide 6.5 Doc ID:MK-96APT014-02 i ii Chapter 0Preface Thank you for purchasing Hitachi TM Backup Services Manager powered by APTARE. About This
DB Audit Expert 3.1. Performance Auditing Add-on Version 1.1 for Microsoft SQL Server 2000 & 2005
DB Audit Expert 3.1 Performance Auditing Add-on Version 1.1 for Microsoft SQL Server 2000 & 2005 Supported database systems: Microsoft SQL Server 2000 Microsoft SQL Server 2005 Copyright SoftTree Technologies,
Lecture 6: Operating Systems and Utility Programs
Lecture 6: Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone
Symantec Enterprise Security Manager Patch Policy Release Notes
Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes The software described in this book is furnished under a license agreement
secure Agent Secure Enterprise Solutions
secure Agent Secure Enterprise Solutions SecureAgent Software The Secure Data Solution U.S. Patent 7,293,179; European Patent 1669872; and Others Pending Midrange Systems SecureAgent Software 2448 E 81
Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Network (RHN) Satellite server is an easy-to-use, advanced systems management platform
Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Satellite server is an easy-to-use, advanced systems management platform for your Linux infrastructure.
MCSA Security + Certification Program
MCSA Security + Certification Program 12 credit hours 270 hours to complete certifications Tuition: $4500 Information technology positions are high-demand occupations that support virtually all industries.
Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac 01.10.2008
Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments Dragos Manac 01.10.2008 Agenda The Need for Identity & Access Management Enterprise IPA Overview Pricing Questions to
IBM Tivoli Monitoring for Applications
Optimize the operation of your critical e-business applications IBM Tivoli Monitoring for Applications Highlights Helps maintain the performance and availability of your application environment including
Data Sheet: Storage Management Veritas CommandCentral Storage 5.1 Centralized visibility and control across heterogeneous storage environments
Centralized visibility and control across heterogeneous storage environments Overview Veritas CommandCentral Storage is an industry standard based, comprehensive software solution that seamlessly integrates
Data Sheet: Archiving Altiris Server Management Suite 7.0 from Symantec Essential server management: Discover, provision, manage, and monitor
Essential server management: Discover, provision, manage, and monitor Overview Complexity with physical and virtual machine proliferation increases the challenges involved in managing servers. Server administrators
