DELL/EMC Isilon CEE time slice with Data Insight 6.1.X
Do any of the experts in this forum know if the suggested mechanism of utilizing multiple CEE servers form an Isilon array to increase throughput and performance would have a detriment on the Data Insight time slicing of events? I understand that configuring multiple CEE servers for an array would result in round-robin transmission of events from the array, but what I am wondering is if all of the CEE servers had the same DI Collector endpoint configured if there would be any issue at the endpoint (SymantecDataconnector) putting them in time slice order and capturing them to the correct MSU by path? Would there be any detriment to the DI application to be aware of? thank you PixSolved1.6KViews0likes2CommentsNetbackup 7.5 for VMware and DB2 backup.
Hi Guys.... After long time I am creating this thread in NBU forum........... We have the following:- 1. IBM Lotus 8.5 on RHEL 5 (64bit). 2. IBM Content Manager using DB2 9.7 on RHEL 5 (64 bit) used for Lotus Mail Archive. Websphare is used in this software bundle. 3. Two IBM TSM server(In VM ) were used to take Lotus mail backup and DB2 backup respectively. 4. VMware server. 5. A DELL storage server is used for all the VM (VMware datastore) and its in HA mode. Current situation:- 1. There is a IBM TSM (In a VM) taking backup of Lotus mail on to disk. (Disk Based backup). 2. Another IBM TSM (In VM) taking the DB2 backup (Lotus Archive Mail). Now, we were planning to take DB2, Lotus Mail and VMs backup using NBU 7.5. My query:- 1. Can we replace both IBM TSM backup server which was used for taking Lotus mail and DB2 backup. 2. I am not sure that the NBU 7.5 can be used to take DB2 backup and is this DB2 backup will have the entire archive mail. In other word does DB2 backup will backup the Archive mail done by "IBM Content Manager". 3. Is there any restoration issue of this DB2 (Archive mail) on to the IBM Content Manager. What are the pros and cons of replacement of IBM TSM, as this came bundled with IBM Content Manager. Any best practice for this.... Thanks.1.2KViews0likes6CommentsBackup/Restore Dell Optiplex 390
I created a backup of my Dell Optiplex 390 and there are 3 total files. A Dell File, A Recovery File, and the C Drive. When I boot into the SSR 2011 I am clicking Backup Recovery then clicking next and I am loading the files in this order. (I am deleting the c drive partition before laying down the images) 1.Dell File 2.C Drive 3.System Recovery (making it bootable option checked) Am I doing this wrong? Does anyone know the correct order to lay down the images, and what options I need to have checked when doing a recovery on this machine? So far I have gotten a missing boot file error then telling me to ctrl+alt+delete+, The error I have gotten the most is a black screen with a blinking cursor...... I am stumped on what options may need to be checked within the 3 different files and which order to lay them down. Any and all support is much appreciated, if you need more details please let me know what you need. Thanks, Joshua3.2KViews2likes21CommentsVaulted emails and delegations
Hi. We have users who receive delegation to other users emails. Our domain policy is vaulting the emails after 90 days. When the user goes into the vaulted emails that have been vaulted under someone else's username, they are not able to download the attachments. It seems like the text is viewable, but not the attachments - which is a big deal because a lot of what we do is being emailed to us in either pdf or jpg format. We are using Ent Vault v10.2. Even when the user is given the permissions on the exchange server for delegation AND permission to open the vaulted item, they still cannot get the attachment. Has anyone else seen this before? Any help would be greatly appreciated!Solved723Views0likes1CommentMonitoring machines
Good morning, It would not be important in similar forensic software security solution to point some strange movement in net for manual configuration? Would not it be nice to send this log to the administrator so that it has real science of what happens on their machines? The fact that even happens that the only security solution for password and disable it is discovered any protection software with password folder can hold a virus where this solution can not be detected due to have a password contained Performing a test in a given security software that will not mention the name says it the same as the high power of detection can not detect which way the folder with password there is a virus code that I created is not the same as new I sent them to the database and still is not detected because the folder containing password. In this case the solution would be important to periodically report to the administrator the steps that are being taken on all machines on your network because each machine would have this solution that would monitor every activity detecting managing such facilities that protect files with password and security does not detect your code simplest is that despite being in the database. Big hug893Views2likes2CommentsCluster Policy Date, ending with status 1. The requested operation was partially successful (1).
Hello everyone, Have you seen this issue before? I need urgent help becauseI'm facing this issue while i try to back up a VCS cluster, the policy "Cluster Data" returns a error code 1, see the detailed status below: 20/10/2012 04:31:52 - Info bpbrm(pid=5460) D5YLSRR1 is the host to backup data from 20/10/2012 04:31:52 - Info bpbrm(pid=5460) reading file list from client 20/10/2012 04:31:52 - Info nbjm(pid=3688) starting backup job (jobid=6523) for client D5YLSRR1, policy ClusterData, schedule Full 20/10/2012 04:31:52 - Info nbjm(pid=3688) requesting STANDARD_RESOURCE resources from RB for backup job (jobid=6523, request id:{96E060E9-2AC2-4ED7-9A11-4EB7DBFF4435}) 20/10/2012 04:31:52 - requesting resource hfisrv-bkp 20/10/2012 04:31:52 - requesting resource d5ylsrr1.hgi-adm.gov.NBU_CLIENT.MAXJOBS.D5YLSRR1 20/10/2012 04:31:52 - requesting resource d5ylsrr1.hgi-adm.gov.NBU_POLICY.MAXJOBS.ClusterData 20/10/2012 04:31:52 - granted resource d5ylsrr1.hgi-adm.gov.NBU_CLIENT.MAXJOBS.D5YLSRR1 20/10/2012 04:31:52 - granted resource d5ylsrr1.hgi-adm.gov.NBU_POLICY.MAXJOBS.ClusterData 20/10/2012 04:31:52 - granted resource 0005L4 20/10/2012 04:31:52 - granted resource Drive003 20/10/2012 04:31:52 - granted resource hfisrv-bkp 20/10/2012 04:31:52 - estimated 0 Kbytes needed 20/10/2012 04:31:52 - Info nbjm(pid=3688) started backup job for client D5YLSRR1, policy ClusterData, schedule Full on storage unit hfisrv-bkp 20/10/2012 04:31:52 - started process bpbrm (5460) 20/10/2012 04:31:52 - connecting 20/10/2012 04:31:53 - Info bpbrm(pid=5460) starting bpbkar32 on client 20/10/2012 04:31:53 - connected; connect time: 00:00:01 20/10/2012 04:31:57 - Info bpbkar32(pid=912) Backup started 20/10/2012 04:31:57 - Info bptm(pid=5116) start 20/10/2012 04:31:57 - Info bptm(pid=5116) using 65536 data buffer size 20/10/2012 04:31:57 - Info bptm(pid=5116) setting receive network buffer to 263168 bytes 20/10/2012 04:31:57 - Info bptm(pid=5116) using 30 data buffers 20/10/2012 04:31:57 - Info bptm(pid=5116) start backup 20/10/2012 04:31:57 - Info bptm(pid=5116) Waiting for mount of media id 0005L4 (copy 1) on server hfisrv-bkp. 20/10/2012 04:31:57 - mounting 0005L4 20/10/2012 04:32:48 - Info bptm(pid=5116) media id 0005L4 mounted on drive index 3, drivepath {6,0,16,0}, drivename Drive003, copy 1 20/10/2012 04:32:48 - mounted; mount time: 00:00:51 20/10/2012 04:32:48 - positioning 0005L4 to file 65 20/10/2012 04:33:33 - positioned 0005L4; position time: 00:00:45 20/10/2012 04:33:33 - begin writing 20/10/2012 04:42:15 - Warning bpbrm(pid=5460) from client D5YLSRR1: WRN - can't open file: C:\System Volume Information\Syscache.hve (WIN32 32: Unknown error) 20/10/2012 04:42:15 - Warning bpbrm(pid=5460) from client D5YLSRR1: WRN - can't open file: C:\System Volume Information\Syscache.hve.LOG1 (WIN32 32: Unknown error) 20/10/2012 04:42:15 - Warning bpbrm(pid=5460) from client D5YLSRR1: WRN - can't open file: C:\System Volume Information\Syscache.hve.LOG2 (WIN32 32: Unknown error) 20/10/2012 04:42:16 - Warning bpbrm(pid=5460) from client D5YLSRR1: WRN - can't open file: C:\Users\Administrator.HGI-ADM\AppData\Local\Microsoft\Windows\UsrClass.dat.LOG1 (WIN32 32: Unknown error) 20/10/2012 04:42:16 - Warning bpbrm(pid=5460) from client D5YLSRR1: WRN - can't open file: C:\Users\Administrator.HGI-ADM\AppData\Local\Microsoft\Windows\UsrClass.dat.LOG2 (WIN32 32: Unknown error) 20/10/2012 04:42:20 - Warning bpbrm(pid=5460) from client D5YLSRR1: WRN - can't open file: C:\Users\Administrator.HGI-ADM\ntuser.dat.LOG1 (WIN32 32: Unknown error) 20/10/2012 04:42:20 - Warning bpbrm(pid=5460) from client D5YLSRR1: WRN - can't open file: C:\Users\Administrator.HGI-ADM\ntuser.dat.LOG2 (WIN32 32: Unknown error) 20/10/2012 04:43:31 - Warning bpbrm(pid=5460) from client D5YLSRR1: WRN - can't open file: C:\Windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat (WIN32 32: Unknown error) 20/10/2012 04:43:31 - Warning bpbrm(pid=5460) from client D5YLSRR1: WRN - can't open file: C:\Windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat (WIN32 32: Unknown error) 20/10/2012 04:43:36 - Warning bpbrm(pid=5460) from client D5YLSRR1: WRN - can't open file: C:\Windows\ServiceProfiles\LocalService\NTUSER.DAT.LOG1 (WIN32 32: Unknown error) 20/10/2012 04:43:36 - Info bpbrm(pid=5460) from client D5YLSRR1: TRV - last message being suppressed after 10 occurrences 20/10/2012 04:45:25 - Error bpbrm(pid=5460) from client D5YLSRR1: ERR - failure reading file: D:\Program Files\Veritas\NetBackup\logs\nbemm\51216-111-3109920203-121020-0000000000.log (WIN32 13: Unknown error) 20/10/2012 05:06:48 - Info bpbkar32(pid=912) bpbkar waited 27237 times for empty buffer, delayed 29002 times. 20/10/2012 05:06:48 - Info bptm(pid=5116) waited for full buffer 18755 times, delayed 72195 times 20/10/2012 05:06:52 - Info bptm(pid=5116) EXITING with status 0 <---------- 20/10/2012 05:06:52 - Info bpbrm(pid=5460) validating image for client D5YLSRR1 20/10/2012 05:06:53 - end writing; write time: 00:33:20 the requested operation was partially successful(1) The job was successfully completed, but some files may have been busy or unaccessible. See the problems report or the client's logs for more details. 20/10/2012 05:06:58 - Info bpbkar32(pid=912) done. status: 1: the requested operation was partially successful995Views0likes4CommentsNew to SSR - cannot add second machine
Hello - I have two windows 7 machines. I have Symantec System Recovery installed and running on one machine, with backups configured to a USB attached RD 1000. I have installed a second copy on the other machine - but I cannot add it to the list of computers on the first machine to begin backing up files on that machine as well. They are both networked via workgroup.....is there a setting I have to configure on the second machine in the OS to add it? Thank youSolved1.2KViews0likes12CommentsPhrases that scare security professionals
Given the findings of some practices and routines, it is easy to know what the problems are with the security companies. It is your case? The scenes are classic. A child with chocolate smeared shirt says, categorically: "It was not me." Or the phone rings and mother assures you, "There's nothing to worry about." Or a systems administrator who carries a box of tapes back up guarantees: "Within minutes, all information will be retrieved." In some cases, the first words you hear - despite the distance between them and the truth - are enough to tell you everything you need to know. In some cases, the first words you hear - despite the distance between Them and the truth - are enough to tell you everything you need to know. The same applies to the world of information security. The same applies to the world of information security. Some words sound reassuring, but we know they often point out problems of internal security, technical resources or the people and processes involved in the protection systems. Get to know some of the phrases "revealing secrets" that signal the imminence of problems in security. One. One We have a culture of safety We have a culture of safety "No, you do not have" is the immediate response of the professionals. "No, you have not's" is the immediate response of the professionals. Even if only mentally. Even if only mentally. This is the kind of phrase that comes from companies that started with five people - in the traditional family business model - and, as they grew, a snap themselves operating with thousands of people without governance or policies. This is the kind of phrase That comes from companies That started with five people - in the traditional family business model - and, As They grew to snap Themselves Thousands of people operating with or without governance policies. Some exchanged and its "safety culture" are enough to buy a good espresso in a quiet corner allowing look to the horizon and find out how much work lies ahead. Some Exchanged and its "safety culture" are enough to buy a good espresso in a quiet corner Allowing look to the horizon and find out how much work lies ahead. The simple fact is that without support guidelines or feedback mechanisms (feedback), security is defined differently by each and is not verified by anyone. The simple fact is without support guidelines That common mechanisms or feedback (feedback), security is defined differently by each and is not verified by anyone. There are no metrics for compliance with the "culture" and a "safety culture" is hidden by a practice of "do your job". If there are rules, write them down. If there are rules, write down Them. If technology is put into action to implement or monitor the rules, write that down too. If technology is put into action to Implement or monitor the rules, write down That too. If people break the rules, comply with what was agreed. If the rules undermine the legitimacy of the business when completed, change them. 2nd. 2nd. IT security is information security IT security is the security of information Information security is not the same thing in the information technology security. If the term "information security" is used in the same way that "IT security", it invariably means that nobody has taken decisions not primarily security techniques that affect departments - IT, human resources, legal, audit and perhaps others in the organization. Join those who have influence in the departments listed above and decide whether information (not paper documents or equipment) is an asset of the company, such as computers and desks. Decide whether the company authorizes people to do jobs, logical and physical access to information as individuals. Decides Whether the company authorizes people to the jobs, logical and physical access to the information Individuals. Take these policies in group decisions. Take these policies in group decisions. Then maybe there will be more time to decide "how to" manage security - rather than trying to guess ... 3rd. 3rd. This does not apply to the chief This does not apply to the chief Although this is becoming less of an issue in public, occasionally an executive simply refuses to follow security guidelines that he himself approved. Although this is less of an issue Becoming in public, occasionally an executive simply Refuses to follow security guidelines That he himself approved. Unless you are prepared to meticulously document all "escapades" following the model of forensics and then deliver them to the directors or the police (or just quit), be prepared to work around the situation. Most bad apples can be managed by applying the Machiavellian sense of having influence the relationship of the other: they must at least pretend to lead by example, while continuing to do whatever they do behind closed doors. Few will admit it, but many Organizations simply put in the budget and install a DSL line access to "guests" in the halls of top executives and Their Eyes close to anything that is plugged into That line. This is not a desirable solution, but if you still solve these executives sign the documents required by Sarbanes-Oxley, the rest comes from the ability to deny knowledge of security professionals. 4th. 4th. Our department gets information security IT staff Our department gets information security IT staff Titles do not matter. Titles of not matter. A report by a security expert at the IT director is always a security administrator, even if that person has the job of information security officer. The problem is that in the corporate world the word "officer" usually means that professional has the authority to verify and monitor whether all the techniques and processes that control proprietary information are efficient. An IT security administrator is usually involved in designing technical control and therefore can not be "self-audit" and make sure that IT is doing the right thing, particularly if it relates to someone within IT. The security professional with the position of "officer" should always report the same level or higher as the IT director. The security professional with the position of "officer" should always report the same level or higher to the IT director. 5th. 5th. We have a password policy We have a password policy Speaking directly, a document that specifies the size, shape and complexity of a password is a technical standard or procedure, not a policy. Speaking directly, the document that specifies the size, shape and complexity of the password is a technical standard or procedure, not a policy. Politics is a directory for directing business, something like "individuals must be identified uniquely and authenticated priority to have the condition to access the company's assets." Politics is a business directory for directing, something like "Individuals must be authenticated and uniquely Identified priority to have the condition to access the company's assets." Note that this example policy involves "what" to do about people and access, not "how" to construct a sequence of character types. 6th. 6th. Our executives have copies of all passwords Our executives have copies of all passwords Although the idea to make a young student faint, ex ist indeed managers who demand that their direct employees to disclose their individual passwords. Although the idea to make the faint young student, ex ist indeed managers who demand That Their direct employees to Disclose Their individual passwords. The explanation for this is always: "What if someone is fired or sick? How could we find your documents?." When this happens, the only effective strategy is to tell anyone who asks such a thing: "If you do, then you are a suspect in any negative situation that arises. When this happens, the only effective strategy is to tell anyone who ASKs such a thing: " You'll never be Able to fire anybody because you will Also be a suspect. "Or you can always summarize it all in a simple:" Grow friend. " 7th. 7th. The brand is our standard I have nothing against the major hardware vendors in the market, but when the personal shopping company says: "Our standard is Dell" (or any other brand), what they are really saying is: "We play our standards security out the window in exchange for discounts and now we buy whatever the vendor offers. " I have nothing against the major hardware vendors in the market, but When the personal shopping company says: "Our standard is Dell" (or any other brand), What They are really saying is: "We play our security standards out the window in exchange for discounts and now we buy whatever the vendor offers. "It's the equivalent of shopping that her great-aunt in a store with inflated prices, getting happy because" a product is discounted 75%. " It's the equivalent of shopping That her great-aunt in the store with inflated prices, getting happy because "the product is discounted 75%." The point is, that both her great-aunt when IT people in the real world have other decisions to make and are commodity PCs. The point is, that her great-aunt ambos When IT people in the real world have other Decisions to make and are commodity PCs are all sure to choose the product from a vendor and maintain applications with it for a while. It's all right to choose the product from the vendor and Maintain applications with it for a while. But a manufacturer is not a technical standard and there is a problem in that mix if anyone does their homework. But the manufacturer is not a technical standard and there is a problem in That mix if anyone does Their homework. When a manufacturer makes changes in line or software product - especially when that part of an equipment manufacturer and network security such as Cisco Systems - it is important to have clearly defined functional requirements to assess whether the products still work as desired. When the customers not know what They want, any bargain Seems to be what you need. 8th. 8th. Hey, where did that come from? It is conceivable that those highly technical users should organize their own equipment as well as support them. On the other hand, this means that the area of IT and support personnel were knocked out by hardware manufacturers that provide only an 0800 number that never works. Security policies must be present everywhere, including the bathrooms attached to the wall behind the toilet paper of an organization. Security policy in the company can be exposed Also next to the bathroom towels. The important thing is to be clear and known to all. Solving this problem is a fundamental respect. Solving this problem is a fundamental respect. Start with the basic governance and making it clear that there are rules, with much effort and communication, this will at least make the "safety culture" a settled matter. 9th. 9th. We ship to the firewall rules ... Most network administrators cowers with the words mentioned above. Still, many will still send free email with a copy of the firewall rules. Worse, they have an OEM or a freelance consultant who set up the firewall for them and retain the single copy of the rules. These rules, if they present complexity, provide a detailed map of the security scheme of the company, with important information about the identity of internal networks and services and how to make them a target. No serious security professional would date a copy of the firewall rules of someone without a specific requirement to do so. A competent auditor of information systems certificate or other auditor will review firewall rules directly into the system administrator and can not take. The Competent auditor of information systems certificate or other auditor will review firewall rules Directly into the system administrator and can not take. If you see a copy of your corporate firewall rules put in an audit report, especially an audience, get ready to redo the design of IP ... and call their lawyers. Their lawyers and call.Solved1.4KViews2likes6Comments