OES 11 SP2: Dynamic Storage Technology Administration Guide ( Documentation/Oes11/Stor Dst Lx/Data/Bookinfo.Html)

Total Page:16

File Type:pdf, Size:1020Kb

OES 11 SP2: Dynamic Storage Technology Administration Guide ( Documentation/Oes11/Stor Dst Lx/Data/Bookinfo.Html) Open Enterprise Server 11 SP3 Dynamic Storage Technology Administration Guide July 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.novell.com/company/legal/. Copyright © 2016 Novell, Inc. All Rights Reserved. Contents About This Guide 11 1 Overview of Dynamic Storage Technology 13 1.1 Understanding Dynamic Storage Technology . 14 1.1.1 Merged View of the File Tree. .14 1.1.2 File Systems . 16 1.1.3 File Access Protocols . 16 1.1.4 Secure File Access . 17 1.1.5 Local File Access for Backup and Archive. 17 1.2 Benefits of Dynamic Storage Technology. 17 1.2.1 Merged View File Access for End Users . 18 1.2.2 Policy-Based Migration between Primary and Secondary Storage Areas . 18 1.2.3 Faster and Smaller Backups of Important Data . 18 1.2.4 Faster Disaster Recovery . .19 1.2.5 More Efficient Use of Expensive Storage. 19 1.2.6 Fast Storage for Active Data and Slower, Less Expensive Storage for Old Data . 19 1.2.7 Moving Files from an Existing Secondary Volume. 19 1.2.8 Access to the Secondary Storage Area without the Performance Penalties of HSM Solutions . 20 1.3 Shadowing Scenarios . 20 1.3.1 Existing Volume as Primary with an Empty Volume as Secondary . 20 1.3.2 Empty Volume as Primary with an Existing Volume as Secondary . 21 1.4 DST Policy Scenarios . 22 1.4.1 Move Files Based on the Last Time Accessed or Modified . 22 1.4.2 Move Files Based on File Size . 22 1.4.3 Move Files Based on File Extensions . 23 1.4.4 Move Selected Files from Primary to Secondary. 23 1.5 DST Components. 23 1.5.1 NCP Engine . 23 1.5.2 Shadow Volume. 23 1.5.3 ShadowFS . 23 1.5.4 Policy Engine . 24 1.6 Management Tools. 24 1.7 What’s Next . 24 2 What’s New or Changed in Dynamic Storage Technology 25 2.1 What’s New (OES 11 SP3). 25 2.2 What’s New (OES 11 SP2). 25 2.3 What’s New (OES 11 SP1). 25 2.4 What’s New (OES 11) . 26 3 Planning Your Dynamic Storage Technology Server Environment 29 3.1 Novell Open Enterprise Server 11 SP3 . 29 3.2 NCP Server and Dynamic Storage Technology . 30 3.3 Novell Storage Services . 30 3.4 NetIQ eDirectory 8.8 SP8. 30 3.5 NCP File Access . 31 3.6 Novell CIFS File Access. 31 Contents 3 3.7 Novell Samba File Access with ShadowFS, FUSE, and LUM . 31 3.8 Supported Native Linux File Access Protocols with ShadowFS, FUSE, and LUM . 31 3.9 Novell AFP File Access (Not Supported) . 32 3.10 Linux User Management . 32 3.11 Novell Cluster Services for Linux . 32 3.12 Novell Remote Manager for Linux . 32 3.13 Novell iManager 2.7.7 for Linux . 32 3.14 SFCB and CIMOM . 33 3.15 Other OES Services. 33 4 Installing Dynamic Storage Technology 35 4.1 Installing DST on a New OES 11 SP3 Server . .35 4.2 Installing DST on an Existing OES 11 SP3 Server. 37 5 Using DST in a Virtual Environment 39 6 Management Tools for DST 41 6.1 Dynamic Storage Technology Plug-In for Novell Remote Manager for Linux . 41 6.1.1 Accessing Novell Remote Manager . 41 6.1.2 Starting, Stopping, or Restarting Novell Remote Manager on Linux . 42 6.1.3 Quick Reference for Dynamic Storage Technology Options . 43 6.1.4 Quick Reference for NCP Server Options . 45 6.1.5 Quick Reference for DST Global Policy Settings. 45 6.1.6 Shadow Volume Inventory and Trustee Reports . 46 6.2 NCP Console (NCPCON) Commands . 46 6.3 Management Tools for NSS Volumes . 46 6.3.1 Storage Plug-In for Novell iManager 2.7x . 46 6.3.2 Files and Folders Plug-In for Novell iManager 2.7x. 47 6.3.3 NSS Management Utility (NSSMU) . 47 6.3.4 Novell Linux Volume Manager (NLVM) Commands. 47 6.4 Management Tools for Clustering . 47 7 Configuring DST Global Policies 49 7.1 Replicating Branches of the Primary File Tree in the Secondary File Tree . 49 7.2 Shifting Files from the Secondary File Tree to the Primary File Tree. 50 7.2.1 Understanding Shift Parameters . ..
Recommended publications
  • PROYECTO FIN DE CARRERA Auditoría De Los Sistemas Y
    Escuela Politécnica Superior Departamento de Informática PROYECTO FIN DE CARRERA Ingeniería Técnica en Informática de Gestión Auditoría de los sistemas y la seguridad en entornos mixtos (Linux - Windows) Autor: Roberto Garrido Pelaz Tutor: Miguel Ángel Ramos González Leganés, Noviembre de 2014 ii Título: Auditoría de los sistemas y la seguridad en entornos mixtos (Linux - Windows) Autor: Roberto Garrido Pelaz Tutor: Miguel Ángel Ramos González EL TRIBUNAL Presidente: ___________________________________ Vocal: ______________________________________ Secretario: ___________________________________ Realizado el acto de defensa y lectura del Proyecto Fin de Carrera el día __ de ___________ de 2014 en Leganés, en la Escuela Politécnica Superior de la Universidad Carlos III de Madrid, acuerda otorgarle la CALIFICACIÓN de __________________. VOCAL SECRETARIO PRESIDENTE Agradecimientos Roberto Garrido Pelaz i A Rebeca, porque das sentido a mi vida. Gracias a Miguel y Carmen, mis padres, por vuestro trabajo de toda una vida, por haberme enseñado el valor del esfuerzo y el trabajo. También gracias a mi hermano Miguel, por servirme de inspiración para seguir mejorando. A mi tutor Miguel Ángel Ramos, por tu experiencia, por tu apoyo y paciencia. Gracias a todos los que habéis contribuido a mi crecimiento personal y profesional durante estos años. Y a la música, por acompañarme durante todos mis caminos andados. Roberto Garrido Pelaz ii Resumen Los sistemas de información son ya activos estratégicos para cualquier organización, y la ventaja actual reside en el gran número de alternativas para las organizaciones en cuanto a tecnologías de la información. Nos encontramos con entornos cada vez más heterogéneos y modelos más flexibles, con los que se intenta alcanzar una ventaja competitiva a todos los niveles, y donde es fundamental el uso de ciertos protocolos y estándares tecnológicos.
    [Show full text]
  • Micro Focus File Reporter 3.6 Installation Guide
    Micro Focus File Reporter 3.6 Installation Guide January 6, 2020 Legal Notices Condrey Corporation makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Condrey Corporation reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Condrey Corporation makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Condrey Corporation reserves the right to make changes to any and all parts of the software at any time, without obligation to notify any person or entity of such revisions or changes. See the Software EULA for full license and warranty information with regard to the Software. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. Condrey Corporation assumes no responsibility for your failure to obtain any necessary export approvals.
    [Show full text]
  • OES 2015 SP1: Installation Guide Is Available at the Open Enterprise Server 2015 SP1 Documentation Website
    Open Enterprise Server 2015 SP1 Installation Guide June 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.novell.com/company/legal/. Copyright © 2016 Novell, Inc., a Micro Focus company. All Rights Reserved. Contents About This Guide 9 1 What’s New or Changed in the OES Install 11 1.1 What’s New (Update 28-OES 2015 SP1). .11 1.2 What’s New (OES 2015 SP1) . 11 1.3 What’s New (January 2016 eDirectory 8.8 SP8 Patch 6 Hot Patch 1). 12 1.4 What’s New (OES 2015) . 12 2 Preparing to Install OES 2015 SP1 15 2.1 Before You Install . 15 2.2 Meeting All Server Software and Hardware Requirements . 15 2.2.1 Server Software . 15 2.2.2 Server Hardware . 16 2.3 NetIQ eDirectory Rights Needed for Installing OES. 17 2.3.1 Rights to Install the First OES Server in a Tree . 17 2.3.2 Rights to Install the First Three Servers in an eDirectory Tree . 17 2.3.3 Rights to Install the First Three Servers in any eDirectory Partition . 17 2.4 Installing and Configuring OES as a Subcontainer Administrator . 17 2.4.1 Rights Required for Subcontainer Administrators . 18 2.4.2 Providing Required Rights to the Subcontainer Administrator for Installing and Managing Samba. 20 2.4.3 Starting a New Installation as a Subcontainer Administrator . 22 2.4.4 Adding/Configuring OES Services as a Different Administrator.
    [Show full text]
  • Netiq Edirectory Installation Guide, See the Netiq Edirectory Online Documentation Web Site
    NetIQ® eDirectory™ Installation Guide February 2018 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.netiq.com/company/legal/. Copyright © 2018 NetIQ Corporation, a Micro Focus company. All Rights Reserved. Contents About this Book and the Library 7 About NetIQ Corporation 9 1 Install and Upgrade Features 11 Multiple Package Formats for Installing eDirectory 9.1. 11 Installing eDirectory 9.1 in a Custom Location . 12 Specifying a Custom Location for Application Files . 12 Specifying a Custom Location for Data Files . 13 Specifying a Custom Location for Configuration Files . 13 Non-root Install . 14 Standards Compliance . 14 FHS Compliance . 14 LSB Compliance . 15 Server Health Checks . 15 Need for Health Checks . 15 What Makes a Server Healthy? . 16 Performing Health Checks . 16 Types of Health Checks . 17 Categorization of Health. 17 Log Files. 18 SecretStore Integration with eDirectory . 19 eDirectory Instrumentation Installation . 20 For More Information . 20 2 Installing or Upgrading NetIQ eDirectory on Linux 21 System Requirements. 21 Prerequisites . 23 Hardware Requirements . 25 Forcing the Backlink Process to Run . 25 Upgrading eDirectory . 26 Server Health Checks . 26 Upgrading on Linux Servers Other Than OES. 27 Unattended Upgrade of eDirectory on Linux . .27 Upgrading the Tarball Deployment of eDirectory 9.1 . 28 Upgrading Multiple Instances. 29 Installing eDirectory . 30 Using SLP with eDirectory . 30 Using the nds-install Utility to Install eDirectory Components . 31 Non-root User Installing eDirectory 9.1 . 34 Using the ndsconfig Utility to Add or Remove the eDirectory Replica Server .
    [Show full text]
  • Oes 2018 Sp2)
    Open Enterprise Server 2018 SP2 Installation Guide August 2020 Legal Notices Copyright © 2017 - 2020 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are as may be set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Contents About This Guide 9 1 What’s New or Changed in the OES Install 11 1.1 What’s New or Changed (OES 2018 SP2) . .11 1.2 What’s New or Changed (OES 2018 SP1) . .11 1.3 What's New or Changed (Update 6 - OES 2018 - Recommended) . 12 1.4 What’s New or Changed (OES 2018) . 12 2 Preparing to Install OES 2018 SP2 13 2.1 Before You Install . 13 2.2 Meeting All Server Software and Hardware Requirements . 13 2.2.1 Server Software . 13 2.2.2 Server Hardware . 14 2.3 NetIQ eDirectory Rights Needed for Installing OES. .15 2.3.1 Rights to Install the First OES Server in a Tree . 15 2.3.2 Rights to Install the First Three Servers in an eDirectory Tree . 15 2.3.3 Rights to Install the First Three Servers in any eDirectory Partition . 15 2.4 Installing and Configuring OES as a Subcontainer Administrator . 15 2.4.1 Rights Required for Subcontainer Administrators . 16 2.4.2 Providing Required Rights to the Subcontainer Administrator for Installing and Managing Samba.
    [Show full text]
  • Novell Zenworks Mobile Management Datasheet
    Data Sheet Endpoint Management Novell ZENworks Mobile Management Extend your endpoint management to all the mobile devices in your IT environment from a single administrative console. Protect yourself from risk with security policies and manage both employee-owned and company-owned devices. Product Overview If you answered yes to any of these questions, System Requirements Novell® ZENworks® Mobile Management pro- you already know how valuable ZENworks Please visit www.novell.com/zmm for detailed vides advanced device controls and policy Mo bile Management can be: It meets all of product specifications and system requirements. man­­­agement for iOS and Android, and other these management challenges and many Ac tiveSync -enabled devices—all from a sin- more. track device use and the applications gle administrative console. The product ad- that users download onto their devices. dresses all of the pain points administrators Key Benefits BYOD support that helps you optimize and managers face to day, including bring- Novell ZENworks Mobile Management helps user productivity on a variety of device your-own-device policies (BYOD), security, your organization with: platforms—including iOS and Android, application management, asset and inventory and most other ActiveSync devices. management and compliance issues. Centralized management tools Security and compliance capabilities that make it easy to deploy new mobile that provide auditing and compliance Are your users bringing in their own iPads, devices in the workforce, whether the management tools so you know who is Androids and other devices, then asking devices are company issued or privately controlling what and how they are doing it. for access to corporate email? owned.
    [Show full text]
  • Enterprise Server Administration Guide
    Client for Open Enterprise Server Administration Guide May 2019 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.microfocus.com/about/legal/. Copyright © 2019 Micro Focus Software, Inc. All Rights Reserved. Contents About This Guide 7 1 Overview of the Client for Open Enterprise Server 9 1.1 Features and Benefits . 9 1.2 Rebranding Changes . 10 1.3 How the Client for Open Enterprise Server Differs from the Novell Client for Windows XP/2003 . 14 1.3.1 Novell Client for Windows XP/2003 Features Not Included in the Client for Open Enterprise Server . 14 1.3.2 Service Location Protocol (SLP) Differences. 15 1.3.3 LDAP Contextless Login Differences. 17 1.4 Features Not Included in the Client for Open Enterprise Server . 17 2 Advanced Installation Options 19 2.1 Understanding the Basic Client Installation (setup.exe). 19 2.1.1 Selecting a Language . 20 2.2 Understanding the Client Install Manager (nciman.exe) . 23 2.2.1 Creating the Client Properties File. 23 2.3 Using the Install.ini File . 24 2.4 Understanding Automatic Client Update (acu.exe) . 25 2.4.1 Setting Up the Client Update Agent . 26 2.5 Selecting a Network Server Distribution Option . 27 2.5.1 Distributing the Client Using Login Scripts. 27 2.5.2 Sample Client Installation Login Script . 28 2.6 Signing Requirements for the Client Installation . 28 2.6.1 Pre-distributing a Trusted Publisher Certificate for the Client Installation .
    [Show full text]
  • Netiq Imanager Installation Guide
    NetIQ® iManager Installation Guide December 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation.
    [Show full text]
  • Archive Manager 5.6 Installation and Configuration Guide for Groupwise © 2019 Quest Software Inc
    Quest® Archive Manager 5.6 Installation and Configuration Guide for GroupWise © 2019 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of Quest Software Inc. The information in this document is provided in connection with Quest Software products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest Software products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST SOFTWARE ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST SOFTWARE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest Software makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice.
    [Show full text]
  • Isendoorn College
    Customer Success Story ZENworks Configuration Management NetIQ eDirectory Open Enterprise Server Isendoorn College DEP capability in ZENworks® Configuration Management delivers a seamless Apple device deployment and configuration program. Overview LDAP directory to provide a scalable and agile Isendoorn College is a secondary school for platform to run the College’s identity infrastruc­ 1,800 students, specializing in the provision ture and multi­platform network services. of bilingual education. The successful bilin­ gual stream has earned Isendoorn College the Jan Hoetink, System Administrator at Isendoorn Junior School and Senior School Certificates College, explains how IT supports the learn­ for bilingual education of the European Plat­ ing environment: “We work with G Suite for At a Glance form (the organization for internationalization Education and are in the process of rolling out Industry in The Netherlands). managed iPads to all our students. We also support 350 school­owned Windows devices, Education Challenge so we needed a multi­platform management Location Isendoorn College is an IT pioneer, and was environment. Students were already bringing The Netherlands quick to deploy tablet devices as learning aids in their own devices for learning purposes, but and maintain an extensive Wi­Fi network for we have introduced a more structured process Challenge its students. so every student can access the same set of Consistently managing deployment and configuration applications without version or connectivity for student­owned Apple devices, while also The College worked closely with Micro Focus® issues. This means centralized configuration supporting school­owned Windows devices. Isendoorn College wanted to leverage DEP to introduce a modern technology suite.
    [Show full text]
  • [Product Name]
    Novell Open Enterprise Server 2015 Novell End User License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT. IF YOU DO NOT AGREE WITH THESE TERMS, YOU ARE NOT PERMITTED TO DOWNLOAD, INSTALL OR USE THE SOFTWARE AND YOU SHOULD NOTIFY THE PARTY FROM WHICH YOU PURCHASED THE SOFTWARE TO OBTAIN A REFUND. THE SOFTWARE MAY NOT BE SOLD, TRANSFERRED, OR FURTHER DISTRIBUTED EXCEPT AS AUTHORIZED BY LICENSOR. This End User License Agreement (“Agreement”) is a legal agreement between You (an entity or a person) and Novell, Inc. (“Licensor”). The software product identified in the title of this Agreement for which You have acquired licenses, any media and accompanying documentation (collectively the “Software”) is protected by the copyright laws and treaties of the United States (“U.S.”) and other countries and is subject to the terms of this Agreement. If the laws of Your country of origin require contracts to be in the local language to be enforceable, such local language version may be obtained from Licensor upon written request and shall be deemed to govern Your purchase of licenses to the Software. Any update, mobile application, module or adapter or support release to the Software that You may download or receive that is not accompanied by a license agreement is Software and governed by this Agreement. If the Software is an update or support release, then You must have validly licensed the version and quantity of the Software being updated or supported in order to install or use the update or support release.
    [Show full text]
  • Novell File Reporter
    Data Sheet File and Networking Services Novell File Reporter The enormous growth of network storage content is introducing enormous management challenges. Today’s enterprises not only need to know what files they are storing, but if they are protecting themselves from unauthorized access. They need to know if their storage infrastructure is optimized and if not, what measures they can take to improve it. Novell® File Reporter provides enterprise level file inventorying and reporting so you can optimize your network storage for efficiency and compliance. Product Overview rights to folders and consequently, the files DIRECTORY SERVICES ENABLED Novell File Reporter inventories network file that are contained within. SECURITY REPORTING systems and delivers the detailed file storage Novell File Reporter integrates with the net­ intelligence you need to optimize and secure Key Benefits work’s directory service (NetIQ eDirectory or your network for efficiency and compliance. Novell File Reporter introduces an extensive Active Directory) to ascertain and report on Engineered for enterprise file system report­ set of features and benefits unavailable in rights and permissions tied to the file system. ing, Novell File Reporter gathers data across other network reporting solutions. Novell File Reporter can even report across the millions of files and folders scattered storage residing in eDirectory and Active among the network storage devices that ENTERPRISE REPORTING Directory at the same time. make up your network. Flexible reporting, Unlike other reporting solutions that limit filtering, and querying options then present reporting to individual storage devices, Security reports can indicate: the exact findings you need so you can dem­ Novell File Reporter lets you report on files onstrate compliance or take corrective action.
    [Show full text]