Storage Intelligence, Optimization and Security with File Reporter



Similar documents
Storage Intelligence, Optimization and Security with Novell File Reporter

Simplifying Data Migration through Storage Manager

Best Practices for Enterprise Mobile Printing

Augmenting VMware View Horizon (VDI) with Micro Focus Client Management

ZENworks Asset Management 11. Product Brochure

An Enterprise Approach to Mobile File Access and Sharing

Backup Exec 15: Protecting Microsoft SQL

Veritas Backup Exec 15: Protecting Microsoft SQL

Boost Productivity While Cutting Costs with Next-Generation Collaboration

DEDUPLICATION BASICS

Module 12. Configuring and Managing Storage Technologies. Contents:

TECHNICAL BRIEF. Primary Storage Compression with Storage Foundation 6.0

Introducing ZENworks 11 SP4

How Exclaimer Mail Archiver Works

Novell File Reporter 2.5 Who Has What?

AdminToys Suite. Installation & Setup Guide

Whitepaper - Disaster Recovery with StepWise

File Management Suite. Novell. Intelligently Manage File Storage for Maximum Business Benefit. Sophia Germanides

Backup Exec 2014: Protecting Microsoft SQL

DiskBoss. File & Disk Manager. Version 2.0. Dec Flexense Ltd. info@flexense.com. File Integrity Monitor

Symantec Enterprise Vault

The information in these Release Notes applies to Novell File Reporter 2.6 and contains the following sections:

Implementing HIPAA Compliance with ScriptLogic

Automated Patch Management: Impressive Return on Investment

An Oracle White Paper June Security and the Oracle Database Cloud Service

W H I T E P A P E R. Symantec Enterprise Vault and Exchange Server November 2011

OpenText Media Management Audit Module FAQ

Archiving, Backup, and Recovery for Complete the Promise of Virtualization

Symantec Backup Exec 11d for Windows Small Business Server

Complementing Your Web Services Strategy with Verastream Host Integrator

Analyzing Network Servers. Disk Space Utilization Analysis. DiskBoss - Data Management Solution

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

An Enterprise Approach to Mobile File Access and Sharing

Driving Down the High Cost of Storage. Pillar Axiom 600

Backup Exec 15: Protecting Microsoft Hyper-V

DocAve 4.1 Backup User Guide

What s New with Enterprise Vault 11? Symantec Enterprise Vault 11 - What's New?

SiteAudit Solutions Next Generation MPS Fleet Services

Backup Exec 15: Deduplication Option

Protecting Miscrosoft Hyper-V Environments

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud

Backup Exec 2014: Deduplication Option

CA Repository for Distributed. Systems r2.3. Benefits. Overview. The CA Advantage

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

Managing and Maintaining a Windows Server 2003 Network Environment

Veritas Backup Exec : Protecting Microsoft SharePoint

Analytics Software for a World of Smart Devices. Find What Matters in the Data from Equipment Systems and Smart Devices

User Manual for Web. Help Desk Authority 9.0

Sisense. Product Highlights.

Quantum Q-Cloud Backup-as-a-Service Reference Architecture

Simple Powerful. Efficient! Inventory. Network Audit and Computer Inventory Within Minutes. DATA CONCEPT software. PC Hardware Inventory

Kaseya 2. User Guide. Version 7.0. English

Control scanning, printing and copying effectively with uniflow Version 5. you can

Veritas Backup Exec 15: Deduplication Option

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

Discovery and Usage data for Software License Management

White Paper. 7 Questions to Assess Data Security in the Enterprise

WHITE PAPER. QUANTUM S TIERED ARCHITECTURE And Approach to Data Protection

Managing and Maintaining a Microsoft Windows Server 2003 Environment

McAfee Web Reporter Turning volumes of data into actionable intelligence

Q&A. DEMO Version

Netwrix Auditor for Active Directory

HP LTO-5 Ultrium Tape Drive Portfolio Bridging the gap between current data protection infrastructure capabilities and today s business demands

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

Symantec NetBackup Snapshots, Continuous Data Protection, and Replication

Symantec Backup Exec 2012 Licensing Guide

SharePoint Backup and Recovery: Ensuring Complete Protection

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Archiving Technical Overview. A Technical Overview Paper Describing Key Functions And Capabilities Of The Managed Archiving Service

Microsoft Office SharePoint Server (MOSS) 2007 Backup Strategies

Solve your PST headaches with or without Archiving

One platform for printing, copying and scanning management. you can

Backup Exec 2014: Protecting Microsoft SharePoint

BUSINESS FOCUSED EXCHANGE REPORTING. Guide To Successful Microsoft Exchange Reporting & Analysis

IBM Tivoli Storage Manager Suite for Unified Recovery

Simplifying Desktop Mgmt With Novell ZENworks

Netwrix Auditor for Exchange

August Transforming your Information Infrastructure with IBM s Storage Cloud Solution

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

VCE Vision Intelligent Operations Version 2.5 Technical Overview

Also on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system.

DATA BACKUP & RESTORE

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

Archiving and the Cloud: Perfect Together

Enterprise Reporter Report Library

Hands-On Microsoft Windows Server 2008

Course Syllabus. Course 6451A: Planning, Deploying and Managing Microsoft Systems Center Configuration Manager Key Data.

How Reflection Software Facilitates PCI DSS Compliance

Common Questions and Concerns About Documentum at NEF

Asigra DS-Client LAN Storage Discovery Saves Service Providers and IT Administrators Time, Money and Productivity

Asset Managers Guide. LANDesk Asset Lifecycle Manager

Asset Inventory Reference

How To Use Uniflow

Course Outline. Configuring, Managing & Maintaining Windows 2008 Server. Course Description: Pre-requisites:

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Case Studies. Data Sheets : White Papers : Boost your storage buying power... use ours!

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, Kaseya Catalog Kaseya Copyright All rights reserved.

Novell ZENworks Asset Management

LEARNING SOLUTIONS website milner.com/learning phone

Transcription:

File Reporter Storage Intelligence, Optimization and Security with File Reporter Table of Contents page Detailed File Reporting for Storage Analysis and Planning...2 Growth of Network-Stored Files...2 Data Storage, Compliance and Costs...2 Introducing File Reporter...2 How File Reporter Works...3 Solving File Management Challenges through Reporting...4 Unique Benefits of File Reporter...5 Conclusion...6

Storage Intelligence, Optimization and Security with File Reporter Detailed File Reporting for Storage Analysis and Planning Micro Focus File Reporter inventories network file systems and delivers the detailed file storage intelligence you need to optimize and secure your network for efficiency and compliance. Growth of Network-Stored Files For a myriad of reasons, the amount of file-based data stored by organizations is growing at exponential rates. Compliance with industry, government and corporate regulations is causing organizations to maintain files indefinitely. Cheaper storage is encouraging IT to grant users expanded network disk quotas and thus let them store more personal files on the network. Applications, with all of their enhancements, become larger with each new release and require file-based storage and access as opposed to database storage and access. Enhanced capabilities such as virtual servers, desktop virtualization, cloud computing projects and mobile computing are driving more files into the data center in the form of stored virtual-machine images, replicated copies of cloud-based data, and copies of documents and applications for use by mobile workers using smartphones. Factoring in all of these contributors, it s not surprising to learn that even very small organizations may be storing terabytes of file-based data.. Data Storage, Compliance and Costs Sizable storage growth introduces sizable management challenges one of which is file inventory. Simply put, the more files the users in your organization store on the network, the more difficult it is to locate and identify what those users are storing. One significant aspect of regulatory com pliance is data retention, with mandates on how long data must be kept in storage in some cases for 20 years or longer. The ability to effectively search and locate retained documents is paramount. Another compliance aspect is security. Organizations must protect sensitive data from unauthorized access. Network admin istrators need to know who has access rights to what areas on the network and how those rights were derived. Similarly, they need to know all documents a user has access rights to. Finally, there are the challenges associated with costs. Without even a basic knowledge of how much your organization is storing, whether the data should be stored on primary or secondary storage, if you are storing duplicate files, and so on, how can you be sure you are spending wisely? Storage costs pertain not only to storage disk capacity, but include expenses asso ciated with storage allocation, power consumption, maintenance, additional hardware, incremental management costs, the increased cost and complexity of backup systems, and additional square footage for added hardware. With so many issues pertaining to expo nential storage growth, organizations of all sizes and in all industries are looking for help with their storage management and it all starts with first knowing what files you are storing on the network. Introducing File Reporter File Reporter inventories network file systems and delivers the detailed file storage intelligence you need to optimize and secure your network for efficiency and compliance. Engineered for enterprise file system reporting, File Reporter gathers data across the millions of files and folders scattered among the various network storage devices that make up your network. Flexible reporting, filtering, and querying options then present the exact findings you need so you can demonstrate compliance or take corrective action. File Reporter identifies files currently stored on the network, the size of the files, when users last accessed or modified the files, and the locations of duplicate files. File Reporter can also help you calculate department or individual storage costs. File Reporter can even identify access rights to folders and consequently, the files that are contained within. 2

How File Reporter Works We developed File Reporter (FR) to examine and report on terabytes of data in other words, millions of files, folders and volumes, scattered among the various storage devices that make up your network. This reporting includes the rights to network folders and volumes and permissions to Microsoft network folders and shares. To report on this data efficiently, File Reporter disperses the work between a FR Engine, FR Agents, a Microsoft SQL Server or PostgreSQL database, and either Micro Focus edirectory or Active Directory. Through the FR Agent, File Reporter takes a scan of the file system s storage resource at a given moment. A storage resource can be a network server volume or Microsoft network share. Scans are indexed data that are specific to a storage resource. They are the means of generating a storage report. Scans include comprehensive information on the file types users are storing, if users have duplicated the files, where duplicate files reside, when users created the files, when they last modi fied the files, permission data on the folders where these files reside and much more. File Reporter collects scans from the FR Agents, compresses them, and sends them to the FR Engine, where it stores them in the database. The FR Engine is the mechanism that drives File Reporter. The FR Engine: Stores scans in the database Schedules the scans that the FR Agents conduct Processes the scans and compiles them for inclusion in a report Provides all the report information to the user interface Runs scheduled reports Specifies in the dashboard that File Reporter has completed a scan or generated a report File Reporter Component Diagram By inventorying your network storage s volumes and shares, files and folders, as well as the rights and permissions associated with each, File Reporter can filter and present the exact information you need through one of its 20 built-in report types. Figure 1. This diagram shows how the File Reporter components function in the scanning and reporting of files stored on the enterprise network. 3

Storage Intelligence, Optimization and Security with File Reporter Solving File Management Challenges through Reporting By inventorying the volumes and shares, files and folders, as well as the rights and permissions associated with each through one of its 20 built-in report types, File Reporter can filter, query, and present the exact information you need. Unauthorized Access For a financial institution involved in a security audit that needs to know who has access to which areas of the network and how they got that access, File Reporter can generate a Direct Assignments report. Rights Knowledge For a corporation that suspects an employee has shared trade secrets and needs to know what documents he has access to across the network, File Reporter can generate an Access for Identity report. Volume Free Space Trending Report Data Loss Prevention For a government agency that needs to retain certain files for a set amount of years, File Reporter can generate a Date Age report. Network Data Growth For a network administrator at an organization experiencing large data growth, File Reporter has an extensive array of customizable reports that can show who is storing files, where they re storing them, what files they re storing and whether any duplicates exist. Additionally, Historic File System Comparison reports can compare the file system contents between two points in time, identifying what new files have been added. Historic Permissions Comparison Whether intentionally or not, user file system access rights can change over time. Historic Permissions Comparison reports lets you compare the NCP or NTFS per missions between two points in time. Custom Querying Even though File Reporter provides an extensive set of built-in reports, there might be instances where you need very specific information that is not provided in any of the built-in reports. Custom Query reports let you specify what you want included in your report using SQL commands. Custom Query reports use the same file system scans used to create built-in reports, but limits the reported content to the conditions of the SQL commands. Once generated, you can design the Custom Query Report using the new Report Designer. Enterprise Reporting For a large corporation with multiple de partments, rather than gathering data individually, one server at a time, network administrators can gather storage data across multiple department servers at once, or even across the entire enterprise. Figure 2. Trending reports specify disk space usage over time and the rate a network volume or share is nearing storage capacity. 4

Unique Benefits of File Reporter We developed File Reporter to be unlike other network reporting products. We designed it to gather and present a comprehensive set of file system data and thus, offer many unique benefits. Graphical Report Sample Compliance Answers With regulations dictating that you be able to demonstrate file retention and security, File Reporter gives you the ability to not only locate specific documents, but quickly determine how secure those documents are. There are Permissions reports that can specify who can access a network folder and how that access is derived. Other Permissions reports can specify what access rights a user has to folders throughout the network. Enterprise Level Reporting Unlike other reporting products that provide limited file system reporting at the server level, File Reporter lets you inventory all the storage devices that make up your directory service. File Reporter provides you the flexibility to structure your reporting for just a single server volume, for all the servers in a department or for the entire network. Identity-Based Reporting File Reporter integrates with your network s directory service (edirectory or Microsoft Active Directory) to ascertain and report on rights and permissions tied to the file system. File Reporter can even report across storage residing in edirectory and Active Directory at the same time. For exam ple, you can report on storage across two or more edirectory trees, on Active Directory and edirectory networks, or an Active Directory and multiple edirectory trees. Figure 3. This figure shows a sample graphical report. Filtered Reporting When File Reporter creates a report, it contains all the file-based or security data for the storage resources or Micro Focus Storage Manager policies from which you want information. This report has the potential to be gigabytes in size, and possibly hundreds of thousands of pages long. Reviewing all this data in a report is impractical and inefficient. File Reporter therefore lets you view reports through Boolean filtering that present a reduced number of entries according to the criteria you want to see. Flexible Presentation Types File Reporter lets you present reports in various formats including PDF, Microsoft Excel, RTF, HTML, TXT and CSV. The Report Designer includes advanced design and graphing capabilities for presenting data in various formats. 5

Storage Intelligence, Optimization and Security with File Reporter Conclusion The exploding growth of file-based data requires that organizations look for data management efficiencies. But if you don t know the current state of storage on your network, there is little hope for making any significant and lasting improvements. File Reporter provides network administrators the ability to access a comprehensive set of network storage information on Windows network file systems and does so in a uniquely powerful way. Anything from a small, single-server organization to a very large enterprise can benefit immensely from File Reporter because of its ability to report on who is storing files, what files users are storing, where the files are stored, who has access to them and much more. File Reporter gives you the information you need to make storage decisions for today and tomorrow. About Micro Focus Since 1976, Micro Focus has helped more than 20,000 customers unlock the value of their business logic by creating enabling solutions that bridge the gap from well-established technologies to modern functionality. The two portfolios work to a single, clear vision to deliver innovative products supported by exceptional customer service. www.microfocus.com 6

Micro Focus UK Headquarters United Kingdom +44 (0) 1635 565200 U.S. Headquarters Provo, Utah 801 861 4272 888 321 4272 Additional contact information and office locations: www.novell.com 162-000038-001 N 09/15 2015 Micro Focus. All rights reserved. Micro Focus, the Micro Focus logo, and edirectory, among others, are trademarks or registered trademarks of Micro Focus or its subsidiaries or affiliated companies in the United Kingdom, United States and other countries. All other marks are the property of their respective owners.