Introducing Systemwalker Operation Manager V13.3. July 2008 FUJITSU LIMITED



Similar documents
Introducing FUJITSU Software Systemwalker Operation Manager V13.8.0

Introducing FUJITSU Software Systemwalker Centric Manager V15.1.1

FUJITSU Software Systemwalker Desktop Patrol V15 Introducing July 2015 Fujitsu Limited

Security Audit Log (BC-SEC)

Application Monitoring for SAP

Windows Authentication on Microsoft SQL Server

ServerView ROR Express XOC Pack

IBM Tivoli Remote Control

Datasheet FUJITSU Software Systemwalker Runbook Automation V15

PATROL From a Database Administrator s Perspective

System Manager 1.1. Customer Presentation Feb 2010

8 Steps to Holistic Database Security

Interstage Application Server V7.0 Single Sign-on Operator's Guide

Information Security Solutions

System Security Policy Management: Advanced Audit Tasks

Fulfilling HIPAA Compliance by Eliminating

Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/ Barfield Road Atlanta, GA Tel: Fax:

Enforcive /Cross-Platform Audit

FuegoBPM Archive Viewer 5 Documentation. Fuego, Inc.

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

Balance Sheet Valuation (MM- IM-VP)

Datasheet. FUJITSU Storage ETERNUS SF Storage Cruiser V16.0 ETERNUS SF AdvancedCopy Manager V16.0 ETERNUS SF Express V16.0

The syslog-ng Store Box 3 LTS

Version 7.5 Backup and Recovery Guide

IBM Tivoli Storage FlashCopy Manager

BIT300 Application Link Enabling (ALE) Technology

Veritas Cluster Server by Symantec

WS_FTP: The smarter way to transfer files

Sidebar Dashboard User Guide. Modified: June, 2013 Version 8.2

Documentation Road Map

FSC130 SAP Bank Communication Management

Guardium Change Auditing System (CAS)

KD-DP Integrated Network Management System. Easily Installed and Configured! NEC Corporation

IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready

The syslog-ng Store Box 3 F2

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

Failover Support. DataDirect Connect for ODBC Drivers. Introduction. Connection Failover

syslog-ng Store Box PRODUCT DESCRIPTION Copyright BalaBit IT Security All rights reserved.

New Features Guide. Adaptive Server Enterprise 15.7 SP50

HR Data Retrieval in a LDAP- Enabled Directory Service

SAP GUI Scripting Security Guide

IBM Security Privileged Identity Manager helps prevent insider threats

IBM WebSphere MQ File Transfer Edition, Version 7.0

IBM Tivoli Identity Manager

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Enterprise-Wide Information Systems in the Modern Organization

BIT601 SAP Workflow Definition and Use of Customer-Specific Workflows

NWBC10 NetWeaver Business Client

I/A Series Information Suite AIM*Track Batch and Lot Tracking Software

Securing Your Microsoft SQL Server Databases in an Enterprise Environment

Sun ONE Identity Server Web Policy Agents Release Notes

How To Understand And Understand The Basic Principles Of An Ansper System

INCIDENT RESPONSE CHECKLIST

ISO COMPLIANCE WITH OBSERVEIT

CMT Self-Service Archive Migrator Release Notes

IBM WebSphere Business Integration Monitor, Version 4.2.4

SPI Backup via Remote Terminal

DOCUMENTATION FILE RESTORE

ESM s management across multi-platforms eliminates the need for various account managers.

Legacy System Integration Technology for Legacy Application Utilization from Distributed Object Environment

How To Manage A System Vulnerability Management Program

DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS

Windows Least Privilege Management and Beyond

SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH

SWsoft Plesk 8.2 for Linux/Unix Backup and Restore Utilities. Administrator's Guide

Basic knowledge of the Microsoft Windows operating system and its core functionality Working knowledge of Transact-SQL and relational databases

How To Understand The History Of A Webmail Website On A Pc Or Macodeo.Com

55004A: Installing and Configuring System Center 2012 Operations Manager

Securing Information in LiveBackup

Test Plan Security Assertion Markup Language Protocol Interface BC-AUTH-SAML 1.0

IBM Endpoint Manager for Mobile Devices

Information Disclosure Guidelines for Safety and Reliability of ASP / SaaS

IBM Tivoli Composite Application Manager for WebSphere

Ahsay Online Backup AutoUpdateAgent Guide. We back up your business. Ahsay Online Backup v5.5. AutoUpdateAgent Guide. Version 5.

Release Bulletin EAServer for HP-UX Itanium and IBM AIX

Administering a SQL Database Infrastructure (MS )

Workflow extended notifications

Secure network guest access with the Avaya Identity Engines portfolio

PE Training and Event Management. SAP ERP Central Component

Plesk 8.3 for Linux/Unix Acronis True Image Server Module Administrator's Guide

Log Management and Intrusion Detection

Connecticut Justice Information System Security Compliance Assessment Form

IBM Tivoli Monitoring for Databases

Tivoli Endpoint Manager for Security and Compliance Analytics

Availability and Integrated Management. Monitoring

The IDG 9074 Remote Access Controller

Real-Time Database Protection and. Overview IBM Corporation

Complete Database Security. Thomas Kyte

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Backup & Restore with SAP BPC (MS SQL 2005)

System Overview. Security

DATA ARCHIVING IN SAP R/3 ENTERPRISE. Georg Fischer PM Data Archiving SAP AG

Introduction to Computer Administration. System Administration

DB Audit for Oracle, Microsoft SQL Server, Sybase ASE, Sybase ASA, and IBM DB2

IBM Tivoli Monitoring for Applications

Product Life Cycle Management

White paper December Addressing single sign-on inside, outside, and between organizations

Healthcare: La sicurezza nel Cloud October 18, IBM Corporation

SWsoft Plesk 8.3 for Linux/Unix Backup and Restore Utilities

Transcription:

Introducing Systemwalker Operation Manager V13.3 July 2008 FUJITSU LIMITED

Contents I. Market Requirements II. Product Overview a. Planning Execution/Operation b. Operation Visualization c. Operational Records d. Security III. System Configuration 1

I. Market Requirements 2

Legal Requirements on IT Systems Legal Systems Privacy Protection Laws Unfair Competition Laws SOX Act etc. IT Requirements Unauthorized Access countermeasures Filtering Unauthorized Access Controls Vulnerability Management Anti-virus Measures Information Leakage countermeasures Preventing of Unauthorized Reporting Thin Clients Enhanced ID Authentication Blocking of Unauthorized Connections File/Disk encryption Restricted PC Operation Restricted File Operation IT Governance IT Management Development/Maintenance Release Management System Operation Contingency Planning Outsourcing Management Security 3

Requirements on System Operations System Development/Change/Maintenance Fully approved and tested - Procurement of new systems and software products - Changes to systems and software products System Operation/Management Proper and appropriate system operations management: - Data backup - Monitoring of system status and performance - Failure recovery Ensured System Security Protect systems from: - Unauthorized use - System tampering - System destruction 4

Coverage of Systemwalker Operation Manager Requirements System Development System Change Mgmt System Maintenance Functions Change Management History of Operational Processes Audit Trail Proof of proper operation System Operation Management Ensured System Security Automated System Operations Access Control Management Console Login History of operations History of Access by Server Administrator Operation Management Audit Reports 5

Challenges of Automated System Operations Manual work increases risk of operational mistakes and misconducts Before (Manual) After (Automated) Data transfer Data arrival Backup Centrally Manage Execution Histories Staff in business location Operation staff Sales data Aggregation Backup Sales Data Aggregation Backup Backup Backup Automated Operations and Result Recording Tasks not organized between staff No visualization of entire task process No records of tasks Execution procedures defined using tools Manual work automated Automatic recording of execution logs 6

II. Product Overview 7

Main Features 1. Establishes an operational plan based on job schedules, and automates operations based on the plan. 2. User friendly windows monitoring simplifies analysis of differences between operational plan and actual results. 3. Records job schedules and operations 4. Effectively defines access privileges for each system administrator and operator. 1. Plan and execute operations - Power control - Job scheduling - Backup 4. Security Access control/ Operation control 3. Record operations - Record execution results - Audit log management 2. Visualize operations - Monitor execution status - Automatic notification 8

System Configuration Supports multiple systems to match customer requirements, system configurations and numbers of servers Stand-alone configuration Preserves schedule information on each execution server. Centralized schedule configuration Schedules can be centrally managed on an independent schedule server, independent of the execution server. Schedule distribution configuration Entire schedule information is managed on a management server, with information distributed to a schedule server and then executed. Stand-alone configuration Job Schedule Centralized schedule configuration Job Schedule Schedule distribution configuration Management Server Program Batch file Schedule Server Execution Server Execution Server Program Batch file Schedule Server 9

1. Plan and execute operations Prevents human error and misconduct by automating system operations based on a plan Automates operations such as server power-on/off, job operation and backup, to a plan. Automates backup of all operational job data at end of day. Power on / off Automates operations Automated Backup* Job data Backup data *Backup software (e.g. ARCserve) is separately required. 10

2. Operation Visualization Monitors entire operation status with management view visualization Centrally monitors entire job operation status using graphical visualization Automated notification prevents problems from being overlooked (audio, short mail, e-mail, etc.) Enables easy understand of differences between job schedule and actual results Monitoring entire system Monitoring each server Drill down Execution status of multiple servers can be summarized and displayed in a single management view. Each job execution status can be highlighted in a Gantt Chart. 11

3. Operational Records Records operation logs, and reports job execution results Execution results can be printed in same format as management view. Execution status is logged. Printing Jobscheduler information Logs of job nets 12

4. Security Operation permissions defined on a per-user basis Independent of OS user management, operational permissions can be granted based on the user management function of Systemwalker Operation Manager User management by OS Administrator Account System Management User management by Systemwalker Administrator of Systemwalker Operation Manager Operator A Operator B Sets up users separately on a peroperator basis Who is allowed to change the settings of Systemwalker Who has only the reference rights Who only has Operation job rights 13 Granted rights; - Update Rights Users with update rights can execute operations with all of the privileges granted by change rights, operation rights and reference rights. - Change Rights Users with change rights can register job nets and groups in projects. - Operation Rights Users with operation rights can perform operations such as starting and canceling job nets and groups. This right includes reference rights. -Reference Rights Users with reference rights can monitor the execution status of job nets and groups, and look up the execution results.

III. System Configuration 14

System Configuration Entire system monitoring Job net monitoring Job operation status Schedule Server Systemwalker Operation Manager Systemwalker for R/3 Job Linkage Operation History Operation Report Job Net Daily: Multiple times execution (9:00 / 12:00 / 15: 00) Systemwalker Centric Manager Auto execution Sales items extraction Auto execution Data conversion Updating master Auto execution Delay monitoring Delay monitoring Delay monitoring Sale Management System EAI System (SAP XI) Master Management System Sales items extraction Data conversion Updating master Data before conversion Data after conversion Sales master 15

Trademarks Systemwalker and Interstage are registered trademarks of FUJITSU LIMITED. Windows and Windows NT are registered trademarks of Microsoft Corporation in the United States and other countries. Sun, Sun Microsystems, the Sun Logo, Solaris and all Solaris based marks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries, and are used under license. UNIX is a registered trademark of The Open Group in the United States and other countries. Java and all Java-based marks are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. Oracle is a registered trademark of Oracle Corporation. IBM is a registered trademark of IBM Corp. The other product names are trademarks or registered trademarks of their respective holders. The trademark notices (TM, ) are not necessarily appended to company, system, and product names described in others or this material. 16

17 Copyright 2010 FUJITSU LIMITED