Tanium™ Appliance Deployment Guide

Total Page:16

File Type:pdf, Size:1020Kb

Tanium™ Appliance Deployment Guide Tanium™ Appliance Deployment Guide Version 1.6.2 October 16, 2020 The information in this document is subject to change without notice. Further, the information provided in this document is provided “as is” and is believed to be accurate, but is presented without any warranty of any kind, express or implied, except as provided in Tanium’s customer sales terms and conditions. Unless so otherwise provided, Tanium assumes no liability whatsoever, and in no event shall Tanium or its suppliers be liable for any indirect, special, consequential, or incidental damages, including without limitation, lost profits or loss or damage to data arising out of the use or inability to use this document, even if Tanium Inc. has been advised of the possibility of such damages. Any IP addresses used in this document are not intended to be actual addresses. Any examples, command display output, network topology diagrams, and other figures included in this document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Please visit https://docs.tanium.com for the most current Tanium product documentation. This documentation may provide access to or information about content, products (including hardware and software), and services provided by third parties (“Third Party Items”). With respect to such Third Party Items, Tanium Inc. and its affiliates (i) are not responsible for such items, and expressly disclaim all warranties and liability of any kind related to such Third Party Items and (ii) will not be responsible for any loss, costs, or damages incurred due to your access to or use of such Third Party Items unless expressly set forth otherwise in an applicable agreement between you and Tanium. Further, this documentation does not require or contemplate the use of or combination with Tanium products with any particular Third Party Items and neither Tanium nor its affiliates shall have any responsibility for any infringement of intellectual property rights caused by any such combination. You, and not Tanium, are responsible for determining that any combination of Third Party Items with Tanium products is appropriate and will not cause infringement of any third party intellectual property rights. Tanium is committed to the highest accessibility standards to make interaction with Tanium software more intuitive and to accelerate the time to success. To ensure high accessibility standards, Tanium complies with the U.S. Federal regulations - specifically Section 508 of the Rehabilitation Act of 1998. We have conducted third-party accessibility assessments over the course of product development for many years, and most recently a comprehensive audit against the WCAG 2.1 / VPAT 2.3 standards for all major product modules was completed in September 2019. Tanium can make available any VPAT reports on a module-by-module basis as part of a larger solution planning process for any customer or prospect. © 2020 Tanium Inc. All Rights Reserved Page 2 As new products and features are continuously delivered, Tanium will conduct testing to identify potential gaps in compliance with accessibility guidelines. Tanium is committed to making best efforts to address any gaps quickly, as is feasible, given the severity of the issue and scope of the changes. These objectives are factored into the ongoing delivery schedule of features and releases with our existing resources. Tanium welcomes customer input on making solutions accessible based on your Tanium modules and assistive technology requirements. Accessibility requirements are important to the Tanium customer community and we are committed to prioritizing these compliance efforts as part of our overall product roadmap. Tanium maintains transparency on our progress and milestones and welcomes any further questions or discussion around this work. Contact your sales representative, email Tanium Support at [email protected], or email [email protected] to make further inquiries. Tanium is a trademark of Tanium, Inc. in the U.S. and other countries. Third-party trademarks mentioned are the property of their respective owners. © 2020 Tanium Inc. All rights reserved. © 2020 Tanium Inc. All Rights Reserved Page 3 Table of contents Tanium Appliance overview 22 Tanium Infrastructure types 22 Appliance roles 24 Topology 24 TanOS menus 25 Requirements 26 Tanium Appliance specifications 26 SSL certificates 26 Network connectivity and firewall 26 Internet access (direct or by proxy) 28 Proxies 28 Air gap 28 Getting started 29 Step 1: Install and configure the Tanium Appliance 29 Step 1: Set up the cloud environment 29 Step 2: Complete the initial setup 29 Step 3: Set up an Appliance Array 29 Step 4: Verify the installation 29 Completing the initial setup (hardware appliances) 30 Requirements 30 Configure temporary bootstrap network settings 30 View steps 30 Before you begin 31 © 2020 Tanium Inc. All Rights Reserved Page 4 Configure the temporary settings 31 Remote access to TanOS 31 Configure network and host settings 32 Configure user access 32 Before you begin 33 Change the default passwords 33 Add SSH keys 34 Add SSH keys for the tancopy user 34 Add SSH keys for TanOS users 37 Upload the license file (Tanium Core Platform 7.3 or earlier) 38 Steps for Tanium Core Platform 7.3 or earlier 38 Before you begin 39 Export the RAID controller security key 40 Export the grub key 43 Add TanOS system users 43 What to do next 44 Completing the initial setup (virtual appliances) 45 Requirements 45 Deploy the virtual image to the hypervisor 45 (Optional) Configure temporary bootstrap network settings 47 View steps 47 Before you begin 47 Configure the temporary settings 48 Remote access to TanOS 48 Configure network and host settings 48 © 2020 Tanium Inc. All Rights Reserved Page 5 Configure user access 49 Before you begin 50 Change the default passwords 50 Add SSH keys 50 Add SSH keys for the tancopy user 50 Add SSH keys for TanOS users 54 Upload the license file (Tanium Core Platform 7.3 or earlier) 55 Steps for Tanium Core Platform 7.3 or earlier 55 Before you begin 56 Export the grub key 57 Add TanOS system users 58 What to do next 58 Completing the initial setup (Tanium Cloud Appliance) 59 Requirements 59 Deploy the virtual image to the cloud provider 59 Remote access to TanOS 59 Configure network and host settings 60 Configure user access 60 Before you begin 61 Change the default passwords 61 Add SSH keys 61 Add SSH keys for the tancopy user 62 Add SSH keys for TanOS users 65 Upload the license file (Tanium Core Platform 7.3 or earlier) 66 Steps for Tanium Core Platform 7.3 or earlier 66 © 2020 Tanium Inc. All Rights Reserved Page 6 Before you begin 67 Export the grub key 68 Add TanOS system users 69 What to do next 69 Installing an Appliance Array 70 About Tanium clusters 70 Tanium cluster requirements and limitations 71 Before you begin 71 Import keys (optional) 72 Set up the Appliance Array 73 Create the array 73 Add members to the array 73 Assign roles 74 Install Tanium roles 74 Enable trust between Tanium Servers (Tanium Core Platform 7.4 and later) 75 Install the Zone Server Hubs 77 Configure AllowedHubs on the Tanium Zone Server appliances 77 Enable Zone Server trusts (Tanium Core Platform 7.4 and later) 78 Enable trust between the Tanium Servers and the Zone Server Hubs 78 Enable trust between the Zone Server and the Zone Server Hub 79 Set up TLS for the Tanium Server deployment (Tanium Core Platform 7.3 or earlier) 81 Tanium Core Platform version 7.3 or prior 81 Tanium Core Platform version 7.4 or later 81 What to do next 81 Installing a Tanium All-in-One role 82 © 2020 Tanium Inc. All Rights Reserved Page 7 Before you begin 82 Install the Tanium Server All-in-One role 83 What to do next 83 Installing an individual Tanium Server 84 Before you begin 84 Import keys (optional) 84 Install Tanium Server 85 Set up TLS for the Tanium Server deployment 86 Tanium Core Platform version 7.3 or prior 86 Tanium Core Platform version 7.4 or later 86 What to do next 86 Installing an individual Tanium Module Server 87 Before you begin 87 Install the Tanium Module Server 88 Configure the Tanium Server to use the remote Module Server 88 Enable the remote Module Server 88 What to do next 88 Installing an individual Tanium Zone Server 89 Overview 89 Before you begin 90 Install the Tanium Zone Server 90 Install the Zone Server 90 Import the Tanium Server public key file to the Zone Server 91 Import tanium.pub for Tanium Core Platform 7.3 and earlier 91 Import tanium-init.dat for Tanium Core Platform 7.4 and later 93 © 2020 Tanium Inc. All Rights Reserved Page 8 Install the Zone Server hub 94 Set up AllowedHubs on the Zone Server appliance 94 Configure trust mappings for 7.4 and later 95 Approve trust for the Zone Server Hub 95 Map the Zone Server to the Zone Server Hub 96 Set up TLS for the Tanium Zone Server 7.3 and earlier 99 Verifying the installation 100 Sign into the Tanium Console 100 Upload the Tanium license 101 Deploy the Tanium Client to your lab computers 101 Verify the basic deployment 101 Verify the Zone Server deployment 102 Verify a Tanium Cluster deployment 103 Deploying a standby Module Server 106 About the standby Module Server 106 Requirements and limitations 106 Before you begin 106 Set up the IPsec tunnel 107 Configure Sync 108 Perform a manual sync 108 Schedule sync jobs 108 View detailed status for Module Server sync 109 Add the Module server to the Appliance Array 109 Upgrading Tanium Appliance software 110 About Tanium Appliance software versions 110 © 2020 Tanium Inc.
Recommended publications
  • Backup4all Take Full Control of Your Backup
    Backup4all Take full control of your backup Backup4all User Manual Copyright © 2016 Softland Backup4all User Manual for Backup4all version 6 by Softland This user manual presents all the features in the Professional edition. If you own Lite, Standard or Portable, some of the features presented in this user manual might not be available in your edition. The Professional edition includes all the features. For a comparison between editions, please check the feature matrix topic. The information in this document is subject to change without notice. Although every precaution has been taken in the preparation of this book, Softland assumes no responsibility for errors and omissions. Nor is any liability assumed for damages resulting from the information contained herein. This documentation contains proprietary information of Softland. All rights reserved. Contents 3 Table of Contents Part I Introduction 9 1 Product Description................................................................................................................................... 9 2 System Requirements................................................................................................................................... 10 3 Installation ................................................................................................................................... 10 Command Line Parameters.......................................................................................................................................................... 11 4 Features
    [Show full text]
  • Brightstor Arcserve Backup for Linux Administrator Guide
    BrightStor® ARCserve® Backup for Linux Administrator Guide r11.5 D01211-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's informational purposes only and is subject to change or withdrawal by Computer Associates International, Inc. ("CA") at any time. This documentation may not be copied, transferred, reproduced, disclosed or duplicated, in whole or in part, without the prior written consent of CA. This documentation is proprietary information of CA and protected by the copyright laws of the United States and international treaties. Notwithstanding the foregoing, licensed users may print a reasonable number of copies of this documentation for their own internal use, provided that all CA copyright notices and legends are affixed to each reproduced copy. Only authorized employees, consultants, or agents of the user who are bound by the confidentiality provisions of the license for the software are permitted to have access to such copies. This right to print copies is limited to the period during which the license for the product remains in full force and effect. Should the license terminate for any reason, it shall be the user's responsibility to return to CA the reproduced copies or to certify to CA that same have been destroyed. To the extent permitted by applicable law, CA provides this documentation "as is" without warranty of any kind, including without limitation, any implied warranties of merchantability, fitness for a particular purpose or noninfringement. In no event will CA be liable to the end user or any third party for any loss or damage, direct or indirect, from the use of this documentation, including without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is expressly advised of such loss or damage.
    [Show full text]
  • Cumulus: Filesystem Backup to the Cloud
    Cumulus: Filesystem Backup to the Cloud Michael Vrable, Stefan Savage, and Geoffrey M. Voelker Department of Computer Science and Engineering University of California, San Diego Abstract uitous broadband now provides sufficient bandwidth re- In this paper we describe Cumulus, a system for effi- sources to offload the application. For small to mid-sized ciently implementing filesystem backups over the Inter- businesses, backup is rarely part of critical business pro- net. Cumulus is specifically designed under a thin cloud cesses and yet is sufficiently complex to “get right” that it assumption—that the remote datacenter storing the back- can consume significant IT resources. Finally, larger en- ups does not provide any special backup services, but terprises benefit from backing up to the cloud to provide only provides a least-common-denominator storage in- a business continuity hedge against site disasters. terface (i.e., get and put of complete files). Cumulus However, to price cloud-based backup services attrac- aggregates data from small files for remote storage, and tively requires minimizing the capital costs of data cen- uses LFS-inspired segment cleaning to maintain storage ter storage and the operational bandwidth costs of ship- efficiency. Cumulus also efficiently represents incremen- ping the data there and back. To this end, most exist- tal changes, including edits to large files. While Cumulus ing cloud-based backup services (e.g., Mozy, Carbonite, can use virtually any storage service, we show that its ef- Symantec’s Protection Network) implement integrated ficiency is comparable to integrated approaches. solutions that include backup-specific software hosted on both the client and at the data center (usually using 1 Introduction servers owned by the provider).
    [Show full text]
  • Backup4all User Manual
    Backup4all Take full control of your backup Backup4all User Manual Copyright © 2017 Softland Backup4all User Manual for Backup4all version 7 by Softland This user manual presents all the features in the Professional edition. If you own Lite, Standard or Portable, some of the features presented in this user manual might not be available in your edition. The Professional edition includes all the features. For a comparison between editions, please check the feature matrix topic. The information in this document is subject to change without notice. Although every precaution has been taken in the preparation of this book, Softland assumes no responsibility for errors and omissions. Nor is any liability assumed for damages resulting from the information contained herein. This documentation contains proprietary information of Softland. All rights reserved. Contents 3 Table of Contents Part I Introduction 9 1 Product Description................................................................................................................................... 9 2 System Requirements................................................................................................................................... 10 3 Installation ................................................................................................................................... 10 Command Line.......................................................................................................................................................... Parameters 12 4 Features
    [Show full text]
  • Hitachi Data Ingestor
    Hitachi Data Ingestor 6.4.7 Cluster Administrator's Guide This manual describes how to operate a Hitachi Data Ingestor (HDI) system in a cluster configuration. MK-90HDI038-30 July 2019 © 2017- 2019 Hitachi Vantara Corporation. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including copying and recording, or stored in a database or retrieval system for commercial purposes without the express written permission of Hitachi, Ltd., or Hitachi Vantara Corporation (collectively “Hitachi”). Licensee may make copies of the Materials provided that any such copy is: (i) created as an essential step in utilization of the Software as licensed and is used in no other manner; or (ii) used for archival purposes. Licensee may not make any other copies of the Materials. “Materials” mean text, data, photographs, graphics, audio, video and documents. Hitachi reserves the right to make changes to this Material at any time without notice and assumes no responsibility for its use. The Materials contain the most current information available at the time of publication. Some of the features described in the Materials might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Vantara Corporation at https://support.hitachivantara.com/en_us/contact-us.html. Notice: Hitachi products and services can be ordered only under the terms and conditions of the applicable Hitachi agreements. The use of Hitachi products is governed by the terms of your agreements with Hitachi Vantara Corporation. By using this software, you agree that you are responsible for: 1.
    [Show full text]
  • Open BAR a New Approach to Mobile Backup and Restore
    Universit`adegli Studi di Roma “Tor Vergata” Facolt`adi Ingegneria Dottorato di Ricerca in Informatica ed Ingegneria dell’Automazione Ciclo XXIII Open BAR A New Approach to Mobile Backup And Restore Vittorio Ottaviani A.A. 2010/2011 Docente Guida/Tutor: Prof. Giuseppe F. Italiano Coordinatore: Prof. Daniel P. Bovet to my parents because an example is worth a thousand words Abstract Smartphone owners use to save always more information, and more impor- tant data into the internal memory of their devices. Mobile devices are prone to be lost, stolen or broken; this causes the loss of all the information contained in it if these data are not backed up. While many solutions for making back- ups and restoring data are known for servers and desktops, mobile devices pose several challenges, mainly due to the plethora of devices, vendors, oper- ating systems and versions available in the mobile market. In this thesis, we propose a new backup and restores approach for mobile devices, which helps to reduce the effort in saving and restoring personal data and migrate from a device to another. Our approach is platform independent: in particular, we present some prototypes based on different mobile operating systems: Google Android, Windows Mobile 5 and 6 and Symbian S60. The approach grants the security of the information backed up and restored using novel cryptographic techniques optimized for mobile. Another feature of our approach lies in the capability of offering additional services to the final user or to administrator of the system. As an example, for users, we provide a service enabling the shar- ing of information in mobile devices among a group of selected persons.
    [Show full text]
  • Cloud Storage: the Risks and Rewards
    Cloud Storage: The Risks and Rewards Jérémy Legendre Norwich University School of Business and Management IS340 – Introduction to Information Assurance 2012-11-14 Copyright © 2012 Jeremy Legendre. All rights reserved. Page 1 Cloud Storage: The Risks and Rewards Contents Introduction ............................................................................................................................................................ 3 Why has Cloud Storage Become Popular? ................................................................................................... 3 Risks ........................................................................................................................................................................... 4 DropBox Compromises .................................................................................................................................. 4 iCloud Compromise ......................................................................................................................................... 4 Google Drive Compromises .......................................................................................................................... 5 Security of Data Transfers ................................................................................................................................. 6 FTP ......................................................................................................................................................................... 6 SSL
    [Show full text]
  • And Linux Tools for Backup O P S E R
    e s u y n a r o f e l b i s n o p s e r d l e h e b t o n n a c n o i s s i m m o C e h t d n a , r o h t u a e h t f o y l n o s w e i v e h t s t c e HOGSKOLAN ISKOVDE(HIS) Content createdby: see theIMSdeployedinourMoodle platform. the sources in ELP format (ExeLearning) or enjoy this cisoss.eu content. to Visit download Remember: This is not the best format to l f e r n o i t a c i l b u p . ) s / i 0 h . T 4 / . a n s o - i y s s b i / s m e s PILOT VERSION PILOT m n o e c C i l / n a g r e o p . o s r n u o E m e m h t o c m e o v r i t f a t e r r o c p / / p : s u s p t t h t h i ( w ” l d a e n d o . i n t n u i a f e n r r n e e e t h e t n b I d s e 0 a . n i h 4 a ) t e 8 n k i 5 o l 8 c A 5 n e 1 r o 0 i a - t h a 2 S 0 - m 2 r n o o A f i t n K i u - b 1 e i 0 r h t t S t f E A o - s 1 e - n d 5 o a 1 m 0 m 2 m e ( o b t c C y e a e j v o m i r t p h a c e s i i r h h C T w “ e s u y n a r o f e l b i s n o Backup systems p s e r d l Backup systems e h e b t Content created by: o n n a c HOGSKOLAN I SKOVDE (HIS) n o i s s i m 1.
    [Show full text]
  • Brightstor Arcserve Backup R11.5 for Windows Beta
    Data Sheet BrightStor® ARCserve® Backup r11.5 for Windows BrightStor® ARCserve® Backup for Windows offers world-class data protection for distributed servers, databases and applications, as well as clients for multiple environments, including Windows, UNIX, Linux, and NetWare. With its wide range of powerful, easy-to-use data protection tools, BrightStor ARCserve Backup ensures the integrity and availability of your most important asset—data Top Three Key Features As businesses grow, so do their Access to Information storage requirements, and data • Complete data protection solution Is Key to Success protection environments can become for Windows extremely complex. As a result, • Wide Platform and Application In an increasingly competitive businesses demand exceptional Support business environment, the availability flexibility from software tools. To meet • Centralized Management of the of information is often the differentiator the rising need to manage data growth Backup Environment between success and failure. The and provide around-the-clock proliferation of the Internet and the availability, many organizations are What’s New movement towards on-demand deploying the latest storage computing has only heightened the technologies, including Storage Area • Disk Staging Backup (D2D2T) need to effectively leverage Networks (SANs), Network-Attached • Microsoft SharePoint Agent information assets to increase revenue Storage (NAS) and Disk Arrays. • 64 bit platform support and profit opportunities. And at the heart of an organization’s information
    [Show full text]
  • Pii041409 Arc 125 A&O Prod Brief
    PRODUCT SUMMARY: CA ARCSERVE BACKUP R12.5 AGENTS AND OPTIONS CA ARCserve® Backup r12.5 Agents and Options CA ARCSERVE® BACKUP R12.5 OFFERS WORLD-CLASS HIGH PERFORMANCE DATA PROTECTION THAT COMBINES INNOVATIVE DATA DEDUPLICATION AND POWERFUL STORAGE RESOURCE MANAGEMENT (SRM) REPORTING WITH INDUSTRY LEADING SOFTWARE VTL BACKUP (D2D2T) AND COMPREHENSIVE SECURITY TOOLS; MAKING IT ONE OF THE MOST SECURE, RELIABLE AND EFFICIENT “OUT-OF-THE-BOX” BACKUP SOLUTIONS OFFERED FOR BOTH PHYSICAL AND VIRTUAL SERVERS. WITH ITS WIDE RANGE OF POWERFUL, EASY-TO-USE AND SINGLE MANAGEMENT DATA PROTECTION TOOLS, CA ARCSERVE BACKUP ENSURES THE INTEGRITY AND AVAILABILITY OF YOUR MOST IMPORTANT ASSET — DATA. CA ARCserve Backup Agents and Options You can easily tailor CA ARCserve Backup to fit your company's storage needs. Just choose from several powerful agents and options to build a solution that is as unique as your business. CA ARCserve Backup Agents let you extend protection to the specific applications you need to support. CA ARCserve Backup Options let you add extensive data protection features, including central management, advanced device and media management, disaster recovery and SAN management capabilities. CA’s unique pricing models let you reduce the complexity of procuring, installing, managing and tracking software product licensing keys so you don’t need to buy each technology you need individually. Choose from a la carte, Simplified Pricing (SIP) or Managed Capacity Pricing (MCP) models. For more information on the best ways to procure these technologies, see Buying the Right Agents & Options on page 5. Overview CA ARCserve Backup Agents and Options help you customize your storage environment, whether you have one server or many servers, or have an email server that is based on Microsoft Exchange or Lotus Notes, or if your environment runs Windows, NetWare or Linux.
    [Show full text]
  • Single Node Administrator's Guide
    Hitachi Data Ingestor Single Node Administrator's Guide Product Version Getting Help Contents MK-90HDI039-21 © 2013- 2017 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. Hitachi, Ltd., reserves the right to make changes to this document at any time without notice and assumes no responsibility for its use. This document contains the most current information available at the time of publication. When new or revised information becomes available, this entire document will be updated and distributed to all registered users. Some of the features described in this document might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Data Systems Corporation at https://support.hds.com/en_us/documents.html. Notice: Hitachi, Ltd., products and services can be ordered only under the terms and conditions of the applicable Hitachi Data Systems Corporation agreements. The use of Hitachi, Ltd., products is governed by the terms of your agreements with Hitachi Data Systems Corporation. Hitachi is a registered trademark of Hitachi, Ltd., in the United States and other countries. Hitachi Data Systems is a registered trademark and service mark of Hitachi, Ltd., in the United States and other countries. Archivas, Essential NAS Platform, HiCommand, Hi-Track, ShadowImage, Tagmaserve, Tagmasoft, Tagmasolve, Tagmastore, TrueCopy, Universal Star Network, and Universal Storage Platform are registered trademarks of Hitachi Data Systems Corporation.
    [Show full text]
  • Reducing Size and Complexity of the Security-Critical Code Base of File Systems
    Reducing Size and Complexity of the Security-Critical Code Base of File Systems Dissertation zur Erlangung des akademischen Grades Doktoringenieur (Dr.-Ing.) vorgelegt an der Technischen Universität Dresden Fakultät Informatik eingereicht von Dipl.-Inf. Carsten Weinhold geboren am 30. September 1980 in Dresden Betreuender Hochschullehrer: Prof. Dr. rer. nat. Hermann Härtig Technische Universität Dresden Gutachter: Prof. Dr. Scott Brandt University of California, Santa Cruz Fachreferent: Prof. Dr. Christof Fetzer Technische Universität Dresden Korrigierte Version vom 2. Juli 2014 (eingereicht am 5. Juli 2013, verteidigt am 14. Januar 2014) 2 Acknowledgements I want to thank my advisor Prof. Dr. rer. nat. Hermann Härtig for all the support and guidance over the years and for encouraging me in my work. I warmly thank Björn Döbel, Michael Roitzsch, Anna Krasnova, and Dr. Claude-Joachim Hamann for all the time and effort they put into proof reading draft versions of this thesis and for giving me so much valuable feedback for improving it. Thanks also go to Adam Lackorzynski and Alexander Warg for maintaining and continuously improving the platform of my work and the work of so many others. Everybody in the coffee area: thank you for all the interesting discussions (not only about work). Finally, my greatest thanks go to my family and to my friends for all their help, support, and patience, but especially for being so much fun to be with. Thank you all! 3 4 Contents 1 Introduction 13 1.1 Motivation ........................................ 13 1.2 A Virtual Private File System .............................. 15 1.3 Thesis Goals ....................................... 16 1.4 Non-Goals ........................................
    [Show full text]