OES CIFS for Linux Administration Guide

Total Page:16

File Type:pdf, Size:1020Kb

OES CIFS for Linux Administration Guide Open Enterprise Server 2018 SP2 OES CIFS Administration Guide May 2020 Legal Notices Copyright © 2017 - 2020 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are as may be set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Contents About This Guide 9 1 Overview of CIFS 11 1.1 Understanding CIFS. 11 1.2 CIFS and Universal Password . 12 1.3 CIFS Features and Capabilities . 12 1.4 Limitations . 14 1.5 What's Next . 14 2 What’s New or Changed in CIFS 15 2.1 What’s New or Changed in OES CIFS (OES 2018 SP2). 15 2.2 What’s New or Changed in Novell CIFS (OES 2018 SP1). 16 2.3 What’s new or Changed in Novell CIFS (Update 7 - OES 2018) . 16 2.4 What’s New or Changed in Novell CIFS (OES 2018) . 16 3 Planning and Implementing CIFS 19 3.1 Planning for CIFS. 19 3.2 Preparing for CIFS Installation . 19 3.2.1 Prerequisites . 19 3.2.2 Required eDirectory Rights and Permissions . 20 3.3 CIFS System Prerequisites . 22 3.3.1 Server Operating System Requirements . 22 3.3.2 Server Hardware Requirements . 22 3.3.3 Client Operating System Requirements . 22 3.3.4 CIFS Prerequisite Checklist. 22 3.4 Co-existence Issues. 23 3.5 Planning for SMB Changes in OES 2018 and later . 23 3.6 What's Next . 25 4 Installing and Setting Up CIFS 27 4.1 Installing CIFS during the OES Installation . 27 4.2 Installing CIFS after the OES Installation. 29 4.3 Installing NMAS . 30 4.4 Verifying the Installation . 31 4.4.1 Verifying Files and Folders . 31 4.4.2 Verifying the File Configuration Information. 33 4.4.3 Verifying LSM Installation . 33 4.5 Installing the CIFS iManager Plug-In . 33 4.6 What's Next . 33 5 Administering the CIFS Server 35 5.1 Using iManager to Manage CIFS. 35 5.1.1 Prerequisites . 36 5.1.2 Selecting a Server to Manage . 36 Contents 3 5.1.3 Setting the CIFS Server and Authentication Properties. 37 5.1.4 Managing CIFS Shares . 41 5.1.5 Configuring a CIFS User Context . 43 5.1.6 Stopping CIFS . 43 5.2 Using the Command Line to Manage CIFS . .43 5.2.1 Starting CIFS . 44 5.2.2 Stopping CIFS . 44 5.2.3 Restarting CIFS . 44 5.2.4 Monitoring CIFS. 44 5.2.5 Modifying the CIFS Configuration . 44 5.2.6 Anonymous Login for CIFS . .45 5.2.7 Working with CIFS Shares. 45 5.2.8 Configuring the CIFS Context Search File. 46 5.3 Locks Management for CIFS . 46 5.4 Third-Party Domain Authentication . 47 5.4.1 Prerequisites . 47 5.4.2 Using iManager to Enable Third-Party Authentication . 49 5.5 Roaming User Profile . 50 5.5.1 Configuration Required on OES Server for Roaming Profiles . 50 5.6 Dynamic Storage Technology for CIFS Server. 51 5.7 DFS Junction Support in CIFS Linux . 52 5.7.1 Prerequisites . 52 5.7.2 Enabling DFS Support . 52 5.7.3 Limitations . 52 5.8 Subtree Search . 53 5.8.1 Prerequisites . 53 5.8.2 Enabling a Subtree Search . 53 5.8.3 Subtree Search in a Cluster Setup . 53 5.9 Enabling Offline Files Support . ..
Recommended publications
  • Add Administrator to Roaming Profile Group Policy
    Add Administrator To Roaming Profile Group Policy Imputative and unfashioned Ignacius intruded his waterproofing instigating grump expansively. Shifting and colory Vince burkes while transeunt Tedrick departmentalises her hausfrau long and estranged thenceforth. Carangoid and ex-directory Redford outsum her Gloucestershire pats or annoys disgracefully. Is done to take advantage of horizon agent redirection to administrators group on as the properties panel is created an external network computer settings roaming to profile group policy We have change. The Administrator account so by default the only direction that is enabled Mirroring. The salvage to user store location you define via policy always include AD. Computer group that profile is summoned to add you administrator groups can query and. After checking for roaming policies? By default groups in administrator to a policy is a new gpo icon or implementing new profile version is specified by this is reduce and delegation pane. Not sure if that goal possible can the GUI. System User Profiles Add the Administrators security group to roaming user profiles Enabled. This method allows you to granularly configure a users roaming profile path location however coverage is option lot more laborious process of ensure those they are handsome with your folder redirection policy period is also applied to the users. A junior administrator deleted a GPO accidentally but violet had backed it up. No changes made to statistically evaluate the local credentials from this process more efficient way it allows you to roaming. File share name of roaming. Which adds to administrators can without any policy! Allocate sufficient storage and roaming to add profile group policy provides the footprints and.
    [Show full text]
  • Bulk Data Migration Using Robocopy
    Bulk Data Migration Using Robocopy Created by: Nasuni Support Last update: 6/14/2011 Contents Overview...................................................................................................................................................................... 2 Using Robocopy to copy data to the Nasuni Filer....................................................................................... 2 2011 © Nasuni Corporation. All Rights Reserved Resizing the Cache and Snapshots Disks in Nasuni Filer v2.7 Robocopy and the Nasuni Filer cache ............................................................................................................. 2 Conclusion ................................................................................................................................................................... 3 Overview The information in this document applies to Nasuni Filer 2.x versions. It explains how to use Robocopy, a Microsoft Windows tool, to migrate data from a Windows file server to the Nasuni Filer. Robocopy has been bundled with Windows operating systems since Vista and Server 2008. Using Robocopy to copy data to the Nasuni Filer Robocopy is a Windows command line tool. To migrate data to the Nasuni Filer using Robocopy follow the steps below. 1. Identify the data set you want to migrate to the Nasuni Filer 2. Create/locate a share on the Nasuni Filer to write your data set to 3. Run cmd.exe 4. Run the command below from the source server’s command line. robocopy (path to source data) (path to Filer share)
    [Show full text]
  • Preparation of Papers in Two-Column Format
    Protecting Media Production Companies against Ransomware Rob Gonsalves Avid Technology, Inc. Burlington Massachusetts [email protected] Abstract - Ransomware, a type of malicious software designed to block access to digital assets until a sum of money is paid, represents a growing threat for media production companies, as digital media assets are a valued target for hackers. To protect their media assets and mitigate the risk of these types of attacks, companies can implement a set of security policies, procedures and systems. Deploying and operating Disaster Recovery (DR) systems with specific safeguards against ransomware will help companies retrieve valuable files without having to pay FIGURE 1 - INITIAL RANSOMWARE ATTACK cyber-criminals. This paper will discuss the growing threat of ransomware to media companies and cover the key The initial attack often comes when a user inadvertently concepts for understanding and building security and DR downloads and installs malware from a website. After systems with specific safeguards against ransomware. installation, the ransomware quietly searches for and Using these techniques, critical business functions can encrypts files. Its goal is to stay below the radar until it can continue in the event of an attack. find and encrypt all of the files that could be of value to the user. By the time the company is presented with the RANSOMWARE malware’s message with the ransom demand, the damage has already been done [2]. Ransomware is a form of malware that encrypts data files and holds these files for ransom. After the initial infection, the malware begins encrypting files on local drives, shared storage, and potentially other computers on the network.
    [Show full text]
  • Novell CIFS for Linux Administration Guide 9.4.2 Creating Shared Pools and Accessing Sharepoints
    Open Enterprise Server 11 SP3 Novell CIFS Administration Guide July 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.novell.com/company/legal/. Copyright © 2014 - 2016 Novell, Inc. All Rights Reserved. Contents About This Guide 7 1 Overview of CIFS 9 1.1 Understanding CIFS. 9 1.2 CIFS and Universal Password . 10 1.3 CIFS Features and Capabilities . 10 1.4 Limitations . 12 1.5 What's Next . 12 2 What’s New or Changed in Novell CIFS 13 2.1 What’s New (OES11 SP3) . 13 2.2 What’s New (OES11 SP2 May 2016 Patches). 13 2.3 What’s New (OES11 SP2 May 2014 Patches). 13 2.4 What’s New (OES 11 SP1 January 2014 Patches) . 13 2.5 What’s New (OES 11 SP2). 14 2.6 What’s New or Changed in Novell CIFS (OES 11 SP1). 15 2.7 What’s New or Changed in Novell CIFS (OES 11). 15 3 CIFS Monitoring and Management 17 3.1 Overview of CIFS Monitoring and Management . 17 3.2 Using CIFS Monitoring and Management . .17 3.3 Monitoring Connections . 17 3.3.1 Access Modes . 18 3.4 Monitoring Files . 18 4 Planning and Implementing CIFS 21 4.1 Planning for CIFS. 21 4.2 Preparing for CIFS Installation . 21 4.2.1 Prerequisites . 21 4.2.2 Required eDirectory Rights and Permissions . 22 4.3 CIFS System Prerequisites . 24 4.3.1 Server Operating System Requirements .
    [Show full text]
  • OES 2015 SP1: Novell CIFS for Linux Administration Guide
    Open Enterprise Server 2015 SP1 Novell CIFS Administration Guide June 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.novell.com/company/legal/. Copyright © 2016 Novell, Inc., a Micro Focus company. All Rights Reserved. Contents About This Guide 9 1 Overview of CIFS 11 1.1 Understanding CIFS. 11 1.2 CIFS and Universal Password . 12 1.3 CIFS Features and Capabilities . 12 1.4 Limitations . 14 1.5 What's Next . 14 2 What’s New or Changed in CIFS 15 2.1 What’s New or Changed in CIFS (Update 33 - OES 2015 SP1) . 15 2.2 What’s New or Changed in CIFS (OES 2015 SP1 September 2017 Patch) . 15 2.3 What’s New or Changed in CIFS (OES 2015 SP1 July 2017 Patch) . 16 2.4 What’s New or Changed in CIFS (OES 2015 SP1 March 2017 Patch) . 16 2.5 What’s New or Changed in CIFS (OES 2015 and OES 2015 SP1 March 2017 Patch). 16 2.6 What’s New or Changed in CIFS (OES 2015 SP1 September 2016 Patch) . 16 2.7 What’s New or Changed in CIFS (OES 2015 SP1) . 17 2.8 What’s New or Changed in CIFS (OES 2015) . 17 3 Planning and Implementing CIFS 21 3.1 Planning for CIFS. 21 3.2 Preparing for CIFS Installation . 21 3.2.1 Prerequisites . 21 3.2.2 Required eDirectory Rights and Permissions . 22 3.3 CIFS System Prerequisites .
    [Show full text]
  • Windows 10 Rollout Programme
    Windows 10 Rollout Programme Key decision points for consideration 1. Folder Redirection 2. Admin Rights 3. Roaming Profiles 4. Data Ownership W10 - Key Decision 1 - Folder Redirection We are consulting with College and Service Group Representatives on Folder Redirection for Windows 10 as follows: 1) Please respond by accepting the only offered solution option 1 below 2) Or by rejecting with reasons for that response. Options: Option 1 – Folder redirection ON for desktop clients but OFF for mobile clients. This is the same as the existing SD7 “Windows 7” and “MDSD Windows 8” folder redirection configuration. This “option” is recommended by the service team. W10 - Key Decision 2 - Admin Rights 1) Please respond by choosing one or more from the options presented below. 2) Or by rejecting all options with reasons for that response. Option 1 – Admin rights for end users are enabled on request, are not reviewed, and are rarely revoked. This is the current solution. Enables users to install any application they want, which means that: The estate is vulnerable to threats posed by Potentially Unwanted Applications (PUAs). Applications which install to provide some stated function but modify the OS in unknown ways, e.g. install as search toolbar but harvest web activity. The estate is vulnerable to threats from unmanaged applications. E.g. Applications dependant on insecure versions of Java, Flash or .Net. End user’s files, data and information is unprotected. E.g. PUA’s which inspect html traffic on client and inject paid advertisements. Enables users to change a range of setting on a device, which means that: The state of estate is uncontrolled and unknown.
    [Show full text]
  • Understanding Device Configurations | 3
    Understanding Device LESSON 1 Configurations OBJECTIVE DOMAIN MATRIX TECHNOLOGY SKILL OBJECtIVE DOMAIN DEsCRIPtION OBJECtIVE DOMAIN NUMBER Configuring Device Options Configure device options 1.1 • Understanding Microsoft Accounts • Configuring Control Panel • Configuring System Options • Changing Date and Time • Managing Devices Configuring Desktop Settings Configure desktop settings 1.2 • Configuring the Start Menu • Configuring User Profiles • Configuring Display Settings • Configuring Shortcuts • Understanding Group Policy Configuring Drive Encryption Configure drive encryption 1.3 • Preparing for File Encryption • Configuring BitLocker Configuring Updates Configure updates 1.4 • Understanding Windows Update • Understanding App Updates • Understanding Device System Updates COPYRIGHTED MATERIAL KEY TERMS Action Center Computer Configuration node encryption Active Directory accounts decryption Group Policy Administrative Tools device driver Group Policy objects (GPOs) BitLocker Drive Encryption Device Manager Internet Protocol Security (BDE) Devices and Printers folder (IPsec) Cortana domain‐based accounts Jump List Control Panel Encrypting File System (EFS) live previews 1 MOAC_Exam_98-368_c01.indd 1 12/26/2015 2:29:42 PM 2 | Lesson 1 live tiles Recycle Bin user account local user accounts resolution user profile local user profile roaming user profile User State Migration Tool mandatory user profile shortcut Windows Easy Transfer Microsoft accounts Secure Sockets Layer (SSL) Windows Server Update Microsoft Management Transport Layer Security (TLS) Service (WSUS) Console (MMC) Trusted Platform Module Windows Update Patch Tuesday (TPM) pin User Configuration node You work as an IT technician for the Contoso Corporation, which has hundreds of computers with a good mix between desktop computers and laptop computers. In addi‑ tion, several users use smartphones and tablets to access their emails and documents. As an administrator, you need to ensure that your computers are fully functional and secure.
    [Show full text]
  • When Powerful SAS Meets Powershell
    PharmaSUG 2018 - Paper QT-06 ® TM When Powerful SAS Meets PowerShell Shunbing Zhao, Merck & Co., Inc., Rahway, NJ, USA Jeff Xia, Merck & Co., Inc., Rahway, NJ, USA Chao Su, Merck & Co., Inc., Rahway, NJ, USA ABSTRACT PowerShell is an MS Windows-based command shell for direct interaction with an operating system and its task automation. When combining the powerful SAS programming language and PowerShell commands/scripts, we can greatly improve our efficiency and accuracy by removing many trivial manual steps in our daily routine work as SAS programmers. This paper presents five applications we developed for process automation. 1) Automatically convert RTF files in a folder into PDF files, all files or a selection of them. Installation of Adobe Acrobat printer is not a requirement. 2) Search the specific text of interest in all files in a folder, the file format could be RTF or SAS Source code. It is very handy in situations like meeting urgent FDA requests when there is a need to search required information quickly. 3) Systematically back up all existing files including the ones in subfolders. 4) Update the attributes of a selection of files with ease, i.e., change all SAS code and their corresponding output including RTF tables and SAS log in a production environment to read only after database lock. 5) Remove hidden temporary files in a folder. It can clean up and limit confusion while delivering the whole output folder. Lastly, the SAS macros presented in this paper could be used as a starting point to develop many similar applications for process automation in analysis and reporting activities.
    [Show full text]
  • How to Perform File System Backup and Restore with Netwrix File Server Change Reporter Technical Article
    HOW TO PERFORM FILE SYSTEM BACKUP AND RESTORE WITH NETWRIX FILE SERVER CHANGE REPORTER TECHNICAL ARTICLE Product Version: 3.3 April/2012 Copyright © 2012 NetWrix Corporation. All Rights Reserved. NetWrix File Server Change Reporter Technical Article Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from NetWrix Corporation of any features or functions discussed. NetWrix Corporation assumes no responsibility or liability for the accuracy of the information presented, which is subject to change without notice. NetWrix is a registered trademark of NetWrix Corporation. The NetWrix logo and all other NetWrix product or service names and slogans are registered trademarks or trademarks of NetWrix Corporation. Active Directory is a trademark of Microsoft Corporation. All other trademarks and registered trademarks are property of their respective owners. Disclaimers This document may contain information regarding the use and installation of non-NetWrix products. Please note that this information is provided as a courtesy to assist you. While NetWrix tries to ensure that this information accurately reflects the information provided by the supplier, please refer to the materials provided with any non-NetWrix product and contact the supplier for confirmation. NetWrix Corporation assumes no responsibility or liability for incorrect or incomplete information provided about non-NetWrix products. © 2012 NetWrix Corporation. All rights reserved. www.netwrix.com Copyright © 2012 NetWrix Corporation. All Rights Reserved Page 2 of 11 Suggestions or comments about this document? www.netwrix.com/feedback NetWrix File Server Change Reporter Technical Article Table of Contents 1. INTRODUCTION ................................................................................ 4 1.1. Overview .............................................................................. 4 1.2.
    [Show full text]
  • Windows Tool Reference
    AppendixChapter A1 Windows Tool Reference Windows Management Tools This appendix lists sets of Windows management, maintenance, configuration, and monitor- ing tools that you may not be familiar with. Some are not automatically installed by Windows Setup but instead are hidden away in obscure folders on your Windows Setup DVD or CD- ROM. Others must be downloaded or purchased from Microsoft. They can be a great help in using, updating, and managing Windows. We’ll discuss the following tool kits: ■ Standard Tools—Our pick of handy programs installed by Windows Setup that we think are unappreciated and not well-enough known. ■ Support Tools—A set of useful command-line and GUI programs that can be installed from your Windows Setup DVD or CD-ROM. ■ Value-Added Tools—Several more sets of utilities hidden away on the Windows Setup CD-ROM. ■ Windows Ultimate Extras and PowerToys for XP—Accessories that can be downloaded for free from microsoft.com. The PowerToys include TweakUI, a program that lets you make adjustments to more Windows settings than you knew existed. ■ Resource Kits—A set of books published by Microsoft for some versions of Windows that includes a CD-ROM containing hundreds of utility programs. What you may not have known is that in some cases you can download the Resource Kit program toolkits with- out purchasing the books. ■ Subsystem for UNIX-Based Applications (SUA)—A package of network services and command-line tools that provide a nearly complete UNIX environment. It can be installed only on Windows Vista Ultimate and Enterprise, and Windows Server 2003.
    [Show full text]
  • Vmware User Environment Manager Administrator's Guide
    User Environment Manager Administrator’s Guide ® VMware User Environment Manager V E R S I O N 8 . 7 .0 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product updates. Copyright © 2015 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com User Environment Manager Contents 1 Welcome ............................................................................................ 9 1.1 VMware User Environment Manager ................................................ 10 1.1.1 Application Configuration Management ....................................... 10 1.1.2 User Environment settings ........................................................ 10 1.1.3 Personalization ........................................................................ 11 1.1.4 Application Migration ................................................................ 11 1.1.5 Dynamic Configuration ............................................................. 11 2 Planning your deployment ............................................................... 12 2.1 VMware User Environment Manager terminology ............................... 12 2.2 User profile scenario considerations ................................................. 13 2.2.1 Mandatory profiles ................................................................... 13 2.2.2 Roaming profiles .....................................................................
    [Show full text]
  • OES 11 SP1: Novell Cluster Services 2.1 for Linux Administration Guide 1 1Overview of Novell Cluster Services
    www.novell.com/documentation Novell Cluster ServicesTM 2.1 for Linux Administration Guide Open Enterprise Server 11 SP1 October 3, 2012 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc., makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. See the Novell International Trade Services Web page (http://www.novell.com/info/exports/) for more information on exporting Novell software.
    [Show full text]